Hi, John.

Your scheme is pretty insecure. You are taking the security of, say,  
2048-bit primes (about 128 bits of randomness) and replacing it with  
the randomness of the passphrase (about 40-60 bits of randomness if  
you are lucky). Plus, you are implicitly assuming that the RNG seeded  
with different values will give different primes, but you have no real  
basis for that assumption.

Why not store the private keys on the server but encrypt them with a  
hash of the passphrase? That would offer the same amount of security.

_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to