Hi, John. Your scheme is pretty insecure. You are taking the security of, say, 2048-bit primes (about 128 bits of randomness) and replacing it with the randomness of the passphrase (about 40-60 bits of randomness if you are lucky). Plus, you are implicitly assuming that the RNG seeded with different values will give different primes, but you have no real basis for that assumption.
Why not store the private keys on the server but encrypt them with a hash of the passphrase? That would offer the same amount of security. _______________________________________________ FDE mailing list FDE@www.xml-dev.com http://www.xml-dev.com/mailman/listinfo/fde