Private Key Generation from Passwords/phrases

Allen netsecurity at sound-by-design.com
Wed Jan 17 18:07:49 EST 2007


Joseph,

The whole issue of entropy is a bit vague for me - I don't 
normally work at that end of things - so could you point to a 
good tutorial on the subject, or barring having a reference 
handy, could you give an overview?

Thanks,

Allen

Joseph Ashwood wrote:
> ----- Original Message ----- From: "Matthias Bruestle" 
> <mbruestle at masktech.de>
> Subject: Private Key Generation from Passwords/phrases
> 
> 
>> What do you think about this?
> 
> I think you need some serious help in learning the difference between 
> 2^112 and 112, and that you really don't seem to have much grasp of the 
> entire concept. 112 bits of entropy is 112 bits of entropy, not 76 bits 
> of entropy, 27 bits of bull, 7 bits of cocaine, and a little bit of 
> alcohol, and the 224 bits of ECC is approximate anyway, as you noted the 
> time units are inconsistent. Basically just stop fiddling around trying 
> to convince yourself you need less than you do, and locate 112 bits of 
> apparent entropy, anything else and you're into the world of trying to 
> prove equivalence between entropy and work which work in physics but 
> doesn't work in computation because next year the work level will be 
> different and you'll have to redo all your figures.
>                    Joe
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
> 
> 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list