Deutsch English Français Italiano |
<v4vb9v$2478p$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: Memorizing a 128 bit / 256 bit hex key Date: Wed, 19 Jun 2024 12:24:47 -0700 Organization: A noiseless patient Spider Lines: 34 Message-ID: <v4vb9v$2478p$1@dont-email.me> References: <v4s3ld$bu48$1@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Wed, 19 Jun 2024 21:24:48 +0200 (CEST) Injection-Info: dont-email.me; posting-host="c0855a90345f22abd4db42c5674212bf"; logging-data="2235673"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18yf0YzHzCDe4rfIRlTKHjZ2kG5mIxc58U=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:YnnIlIPB2RM77W4hAYM/hLILI1U= In-Reply-To: <v4s3ld$bu48$1@i2pn2.org> Content-Language: en-US Bytes: 2798 On 6/18/2024 6:55 AM, Stefan Claas wrote: > You thoughts please, gentlemen. > > Let's say you travel and do not want to store your secret hex key on your > device and recreate it from memory. > > What do you think about this proposal? > > $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times. > > One has to remember only the dates (times are optional) and then simply run the > one liner. > > The encryption software can be downloaded when one arrives at his destination. > Generate a hex key from a password? It seems like my site can do it: http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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 It encrypts a key using the default password. The key is generated using the same program. This example basically generates a key using the default password, then encrypts said key using a different password. Everybody can decrypt the generated key because the ciphertext in the link uses the default password: https://i.ibb.co/BybrYDw/image.png The plaintext is: A key: f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd