Deutsch   English   Français   Italiano  
<v506r5$2cucm$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Rich <rich@example.invalid>
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Thu, 20 Jun 2024 03:14:45 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 55
Message-ID: <v506r5$2cucm$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4vb9v$2478p$1@dont-email.me> <v4vbth$fvtf$1@i2pn2.org> <v4vcm5$24hrj$2@dont-email.me> <v4vh27$g5tv$3@i2pn2.org>
Injection-Date: Thu, 20 Jun 2024 05:14:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="5bdc0c3dfc9fa55cdda166dac217f191";
	logging-data="2521494"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18ZqqKU/jmLe/hbP2EO7dHL"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:5BzwDN6dIvW/BMDs73KuqTg0sYw=
Bytes: 3897

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
> 
>> Stefan Claas <pollux@tilde.club> wrote:
>> > Chris M. Thomasson wrote:
>> >> Generate a hex key from a password? It seems like my site can do it:
>> >> 
>> >> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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
>> >> 
>> >> It encrypts a key using the default password.  The key is generated 
>> >> using the same program.  This example basically generates a key 
>> >> using the default password, then encrypts said key using a different 
>> >> password.
>> >> 
>> >> Everybody can decrypt the generated key because the ciphertext in 
>> >> the link uses the default password:
>> >> 
>> >> https://i.ibb.co/BybrYDw/image.png
>> >> 
>> >> The plaintext is:
>> >> 
>> >> A key:
>> >> 
>> >> f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd
>> > 
>> > Your site says it does key generation from 64 random bytes.  How do 
>> > you remember the key when traveling, with no device?
>> 
>> > Or how can you trust your site, when your are on annual leave, out of 
>> > your country, and some bad boy customized your site?
>> 
>> A valid question -- and one that *also* applies to your argon2id on 
>> github.  How can you be sure that some cracker did not change the 
>> argon2id present there while you are away on holiday.
>> 
>> Or, how can you trust that a github/microsoft insider with admin level
>> access did not swap out your good argon2id with a malicious argon2id.
>> 
>> Or that a three letter agency, having taken interest in you for some 
>> reason, has not gotten a secret court order to swap the argon2id 
>> with a cracked one, and included a court ordered gag to prevent 
>> github/microsoft from informing you of the swap?
> 
> Prior upload and departure I can write down on a piece of paper the 
> shasum and once arrived at my destination I can compare the shasum 
> from the download with the shasum on paper.

That would work, presuming the border crossing guards do not question 
your shasum paper.... 

> Only problem would be IMHO, if the shasum would no longer match and I 
> have no plan B.

True, but at least you can recognize you've been targeted, and know not 
to trust the binary currently on github.