Private Key Generation from Passwords/phrases
Allen
netsecurity at sound-by-design.com
Wed Jan 17 18:07:49 EST 2007
Joseph,
The whole issue of entropy is a bit vague for me - I don't
normally work at that end of things - so could you point to a
good tutorial on the subject, or barring having a reference
handy, could you give an overview?
Thanks,
Allen
Joseph Ashwood wrote:
> ----- Original Message ----- From: "Matthias Bruestle"
> <mbruestle at masktech.de>
> Subject: Private Key Generation from Passwords/phrases
>
>
>> What do you think about this?
>
> I think you need some serious help in learning the difference between
> 2^112 and 112, and that you really don't seem to have much grasp of the
> entire concept. 112 bits of entropy is 112 bits of entropy, not 76 bits
> of entropy, 27 bits of bull, 7 bits of cocaine, and a little bit of
> alcohol, and the 224 bits of ECC is approximate anyway, as you noted the
> time units are inconsistent. Basically just stop fiddling around trying
> to convince yourself you need less than you do, and locate 112 bits of
> apparent entropy, anything else and you're into the world of trying to
> prove equivalence between entropy and work which work in physics but
> doesn't work in computation because next year the work level will be
> different and you'll have to redo all your figures.
> Joe
>
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
>
>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list