| Deutsch English Français Italiano |
|
<v4vbth$fvtf$1@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: Memorizing a 128 bit / 256 bit hex key Date: Wed, 19 Jun 2024 21:35:12 +0200 Organization: =?UTF-8?b?4oSt8J2UpfCdlKbwnZSj8J2Uo/CdlK/wnZSi8J2UrfCdlLLwnZSr8J2UqA==?= =?UTF-8?b?8J2UsA==?= Message-ID: <v4vbth$fvtf$1@i2pn2.org> References: <v4s3ld$bu48$1@i2pn2.org> <v4vb9v$2478p$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Injection-Date: Wed, 19 Jun 2024 19:35:13 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="524207"; mail-complaints-to="usenet@i2pn2.org"; posting-account="Cql5xXq+1B7GYqFCkkYQTE9ttzQmzqt9PRBXcODTV+U"; Finger: tilde.club/~pollux/ X-Spam-Checker-Version: SpamAssassin 4.0.0 Bytes: 3052 Lines: 43 Chris M. Thomasson wrote: > On 6/18/2024 6:55 AM, Stefan Claas wrote: > > You thoughts please, gentlemen. > > > > Let's say you travel and do not want to store your secret hex key on your > > device and recreate it from memory. > > > > What do you think about this proposal? > > > > $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times. > > > > One has to remember only the dates (times are optional) and then simply run the > > one liner. > > > > The encryption software can be downloaded when one arrives at his destination. > > > > Generate a hex key from a password? It seems like my site can do it: > > http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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 > > It encrypts a key using the default password. The key is generated using > the same program. This example basically generates a key using the > default password, then encrypts said key using a different password. > > Everybody can decrypt the generated key because the ciphertext in the > link uses the default password: > > https://i.ibb.co/BybrYDw/image.png > > The plaintext is: > > A key: > > f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd Your site says it does key generation from 64 random bytes. How do you remember the key when traveling, with no device? Or how can you trust your site, when your are on annual leave, out of your country, and some bad boy customized your site? -- Regards Stefan