Deutsch English Français Italiano |
<v506r5$2cucm$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Rich <rich@example.invalid> Newsgroups: sci.crypt Subject: Re: Memorizing a 128 bit / 256 bit hex key Date: Thu, 20 Jun 2024 03:14:45 -0000 (UTC) Organization: A noiseless patient Spider Lines: 55 Message-ID: <v506r5$2cucm$1@dont-email.me> References: <v4s3ld$bu48$1@i2pn2.org> <v4vb9v$2478p$1@dont-email.me> <v4vbth$fvtf$1@i2pn2.org> <v4vcm5$24hrj$2@dont-email.me> <v4vh27$g5tv$3@i2pn2.org> Injection-Date: Thu, 20 Jun 2024 05:14:46 +0200 (CEST) Injection-Info: dont-email.me; posting-host="5bdc0c3dfc9fa55cdda166dac217f191"; logging-data="2521494"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18ZqqKU/jmLe/hbP2EO7dHL" User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64)) Cancel-Lock: sha1:5BzwDN6dIvW/BMDs73KuqTg0sYw= Bytes: 3897 Stefan Claas <pollux@tilde.club> wrote: > Rich wrote: > >> Stefan Claas <pollux@tilde.club> wrote: >> > Chris M. Thomasson wrote: >> >> Generate a hex key from a password? It seems like my site can do it: >> >> >> >> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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 >> >> >> >> It encrypts a key using the default password. The key is generated >> >> using the same program. This example basically generates a key >> >> using the default password, then encrypts said key using a different >> >> password. >> >> >> >> Everybody can decrypt the generated key because the ciphertext in >> >> the link uses the default password: >> >> >> >> https://i.ibb.co/BybrYDw/image.png >> >> >> >> The plaintext is: >> >> >> >> A key: >> >> >> >> f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd >> > >> > Your site says it does key generation from 64 random bytes. How do >> > you remember the key when traveling, with no device? >> >> > Or how can you trust your site, when your are on annual leave, out of >> > your country, and some bad boy customized your site? >> >> A valid question -- and one that *also* applies to your argon2id on >> github. How can you be sure that some cracker did not change the >> argon2id present there while you are away on holiday. >> >> Or, how can you trust that a github/microsoft insider with admin level >> access did not swap out your good argon2id with a malicious argon2id. >> >> Or that a three letter agency, having taken interest in you for some >> reason, has not gotten a secret court order to swap the argon2id >> with a cracked one, and included a court ordered gag to prevent >> github/microsoft from informing you of the swap? > > Prior upload and departure I can write down on a piece of paper the > shasum and once arrived at my destination I can compare the shasum > from the download with the shasum on paper. That would work, presuming the border crossing guards do not question your shasum paper.... > Only problem would be IMHO, if the shasum would no longer match and I > have no plan B. True, but at least you can recognize you've been targeted, and know not to trust the binary currently on github.