Deutsch   English   Français   Italiano  
<v4vb9v$2478p$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 12:24:47 -0700
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <v4vb9v$2478p$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 19 Jun 2024 21:24:48 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c0855a90345f22abd4db42c5674212bf";
	logging-data="2235673"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18yf0YzHzCDe4rfIRlTKHjZ2kG5mIxc58U="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:YnnIlIPB2RM77W4hAYM/hLILI1U=
In-Reply-To: <v4s3ld$bu48$1@i2pn2.org>
Content-Language: en-US
Bytes: 2798

On 6/18/2024 6:55 AM, Stefan Claas wrote:
> You thoughts please, gentlemen.
> 
> Let's say you travel and do not want to store your secret hex key on your
> device and recreate it from memory.
> 
> What do you think about this proposal?
> 
> $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
> 
> One has to remember only the dates (times are optional) and then simply run the
> one liner.
> 
> The encryption software can be downloaded when one arrives at his destination.
> 

Generate a hex key from a password? It seems like my site can do it:

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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

It encrypts a key using the default password. The key is generated using 
the same program. This example basically generates a key using the 
default password, then encrypts said key using a different password.

Everybody can decrypt the generated key because the ciphertext in the 
link uses the default password:

https://i.ibb.co/BybrYDw/image.png

The plaintext is:

A key:

f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd