| Deutsch English Français Italiano |
|
<v5p8p7$3vp41$1@stefan.eternal-september.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feeds.phibee-telecom.net!2.eu.feeder.erje.net!3.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!stefan.eternal-september.org!.POSTED!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: Speaking of long-ish passwords Date: Sat, 29 Jun 2024 15:20:50 -0000 Organization: =?UTF-8?b?4oSt8J2UpfCdlKbwnZSj8J2Uo/CdlK/wnZSi8J2UrfCdlLLwnZSr8J2UqA==?= =?UTF-8?b?8J2UsA==?= Lines: 29 Message-ID: <v5p8p7$3vp41$1@stefan.eternal-september.org> References: <FKXcO.332464$ujOb.302447@fx16.ams4> <v51jpr$2kvgs$2@dont-email.me> <qe5dO.139761$2RJ6.85607@fx05.ams4> <v52np1$2uvck$2@dont-email.me> <VD5dO.139762$2RJ6.117477@fx05.ams4> <v52t0l$3022a$1@dont-email.me> <jzjdO.86399$bHO6.65183@fx06.ams4> <v54nvb$3b20l$1@dont-email.me> <v563fp$3m80k$1@dont-email.me> <v56bpt$3nrg5$1@dont-email.me> <v56t4u$3quo7$3@dont-email.me> MIME-Version: 1.0 Injection-Date: Sat, 29 Jun 2024 17:21:12 +0200 (CEST) Injection-Info: stefan.eternal-september.org; posting-host="fdfa068e910204aeb1ebbb3b03a8a669"; logging-data="4187265"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19z3tZp4OCavP/WNWggG/Ov6HfKvv3TJoU=" User-Agent: flnews/1.3.0pre4 (for GNU/Linux) Cancel-Lock: sha1:pf111F4fUaMTQlu/mL35M9dJAyE= X-Ed25519-Sig: 16a61d257d30dd985df0ce2b0e5b79908670e4f7e14c3ee1509032ce7aa8c9c7 e853c38dd6be1acd785d2568294a5a54a091a1dd352e512462373c844c7bf50c X-Ed25519-Pub: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117 X-Date: It's Sat 11260 Sep 1993 05:20:50 PM CEST, the September that never ends X-Finger: tilde.club/~pollux/ Bytes: 2799 Rich wrote: > Oscar <oxxxxxxxxxxxs@gmail.com> wrote: > > Op 22-6-2024 om 10:54 schreef Richard Harnden: > > > On 21/06/2024 21:31, Chris M. Thomasson wrote: > > > > ... generating a > > > > complex password from a simple password... > > > > > > You can't actually increase the entropy > > > > > > > Perhaps, but the recent discussions here seem to boil down to "password > > based key derivation functions" which may frustrate bruteforce attacks a > > bit. > > The thread has kind of drifted in that direction. It began as a way to > try to "remember" a complex password by encoding it as "something else" > such that one might not need to worry should the stazi examine your > papers and find the "something else" in your possession. Well, regarding "password based key derivation functions". I have uploaded 'red' to my GitHub repositories, which allows users to generate deterministic Ed25519 key pairs, in hex notation. and then sign, for example, Usenet messages (like this one). :-) https://github.com/stefanclaas/red -- Regards Stefan