Re: [cryptography] Password non-similarity?

2012-01-05 Thread mhey...@gmail.com
On Sat, Dec 31, 2011 at 5:02 PM, Landon ljrhur...@gmail.com wrote: A lot of the password reuse is simply adding +1 or something on the end. Since the base of the password stays the same, couldn't you just hash the first and second halves of the new and old passwords separately and compare

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Thor Lancelot Simon
On Thu, Jan 05, 2012 at 12:45:14PM +1300, Peter Gutmann wrote: Thor Lancelot Simon t...@panix.com writes: However, while looking at it I have been wondering why something simpler and better analyzed than the folded SHA should not be used. Folding the output is belt-and-suspenders security,

[cryptography] Please critique my proposal for a login system for decentralized web apps

2012-01-05 Thread Vladimir Sedach
Hello, I've been thinking about how a mostly decentralized web application (such as Facebook) would work like. Assumptions so far: 1. You have your own computer, which has your private key 2. You and your friends share public keys 3. Your and your friends' computers all run an application that

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread ianG
On 6/01/12 03:56 AM, Thor Lancelot Simon wrote: On Thu, Jan 05, 2012 at 12:45:14PM +1300, Peter Gutmann wrote: Thor Lancelot Simont...@panix.com writes: However, while looking at it I have been wondering why something simpler and better analyzed than the folded SHA should not be used.

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Thor Lancelot Simon
On Fri, Jan 06, 2012 at 07:59:30AM +1100, ianG wrote: The way I treat this problem is that it is analogous to inventing ones own algorithm. From that perspective, one can ask: What is? The folded SHA, or the use of HMAC? You do understand why it's important to obscure what's mixed back in,

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Steven Bellovin
On Jan 5, 2012, at 4:46 PM, Thor Lancelot Simon wrote: On Fri, Jan 06, 2012 at 07:59:30AM +1100, ianG wrote: The way I treat this problem is that it is analogous to inventing ones own algorithm. From that perspective, one can ask: What is? The folded SHA, or the use of HMAC? You do

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Marsh Ray
On 01/05/2012 03:46 PM, Thor Lancelot Simon wrote: I am asking whether the use of HMAC with two different, well known keys, one for each purpose, is better or worse than using the folded output of a single SHA invocation for one purpose and the unfolded output of that same invocation for the

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Marsh Ray
On 01/05/2012 05:59 PM, Thor Lancelot Simon wrote: FWIW, using HMAC like this is the extract step of the two-step extract-expand HMAC based construction that is HKDF From http://tools.ietf.org/html/draft-krawczyk-hkdf-01 2.2. Step 1: Extract PRK = HKDF-Extract(salt, IKM) Options:

Re: [cryptography] folded SHA1 vs HMAC for entropy extraction

2012-01-05 Thread Sandy Harris
On Thu, Jan 5, 2012 at 1:47 AM, Thor Lancelot Simon t...@panix.com wrote: Eventually I will replace it with a multi-pool implementation like Fortuna.  However, I'm trying to make incremental improvements while waiting for that mythical great extent of free time to appear. Why do you want to