On 2013-08-25 alser...@inbox.ru wrote:
On Sat, 24 Aug 2013, Krisztián Pintér wrote:
has anybody done something like that already? does it have a name?
There was a ECC program from the previous century that worked as you
described: the private key was derived solely from the user password.
Seccure: http://point-at-infinity.org/seccure/
It doesn't do any key stretching plus has a number of implementation
problems, but I used it a little for backups until it corrupted some and I
found the scrypt utility. Seccure seemed nice from a usability
perspective other than that you couldn't quite decrypt and pipe the result
to less reliably. There were command line arguments for curve and MAC
length that you just had to get right or it didn't work. It could even do
ECDH.
I wish there were more simple command line crypto utilities.
-Matt
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography