Re: [cryptography] no-keyring public

2013-09-13 Thread Samuel Neves
On 25-08-2013 13:38, Alexander Klimov wrote: > There was a ECC program from the previous century that worked as you > described: the private key was derived solely from the user password. > Unfortunately, I cannot recall its name (and I suspect it already > vanished from the net since it was not

Re: [cryptography] no-keyring public

2013-08-26 Thread stef
On Sun, Aug 25, 2013 at 08:13:51AM -0400, Matthew Orgass wrote: > On 2013-08-25 alser...@inbox.ru wrote: > >On Sat, 24 Aug 2013, Krisztián Pintér wrote: > >>has anybody done something like that already? does it have a name? > > > >There was a ECC program from the previous century that worked as you

Re: [cryptography] no-keyring public

2013-08-25 Thread Natanael
Bitcoin Brainwallet software creates ECDSA keys that you can use for multiple purposes, not only for Bitcoin. A link to Phidelius, which was previously mentioned: http://dankaminsky.com/2012/01/03/phidelius/ --- I would like to see some standardized hierarchial deterministic scheme to generate v

Re: [cryptography] no-keyring public

2013-08-25 Thread Matthew Orgass
On 2013-08-25 alser...@inbox.ru wrote: On Sat, 24 Aug 2013, Krisztián Pintér wrote: has anybody done something like that already? does it have a name? There was a ECC program from the previous century that worked as you described: the private key was derived solely from the user password. Se

Re: [cryptography] no-keyring public

2013-08-25 Thread Alexander Klimov
On Sat, 24 Aug 2013, Krisztián Pintér wrote: > has anybody done something like that already? does it have a name? There was a ECC program from the previous century that worked as you described: the private key was derived solely from the user password. Unfortunately, I cannot recall its name (an

Re: [cryptography] no-keyring public

2013-08-24 Thread James A. Donald
On 2013-08-25 7:58 AM, James A. Donald wrote: On 2013-08-25 2:30 AM, � wrote: hi list, i had an epiphany today, and i wonder if such a thing already exists or not. so the usual thing is to create a key pair, store the private key encripted with a password. we automatically get a two factor

Re: [cryptography] no-keyring public

2013-08-24 Thread James A. Donald
On 2013-08-25 2:30 AM, � wrote: hi list, i had an epiphany today, and i wonder if such a thing already exists or not. so the usual thing is to create a key pair, store the private key encripted with a password. we automatically get a two factor authentication, we have a "know" and a "have". o

Re: [cryptography] no-keyring public

2013-08-24 Thread Krisztián Pintér
aha, i'm not that original after all. my attention was called to Dan Kaminsky's "Phidelius" too. > It's very similar (as Greg Rose noted) to IBE, and thus pretty much what I > did in: > http://middleware.internet2.edu/pki05/proceedings/callas-conventional_ibe.pdf _

Re: [cryptography] no-keyring public

2013-08-24 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I like it, myself. It's very similar (as Greg Rose noted) to IBE, and thus pretty much what I did in: http://middleware.internet2.edu/pki05/proceedings/callas-conventional_ibe.pdf Jon -BEGIN PGP SIGNATURE- Version: PGP Universal 3

Re: [cryptography] no-keyring public

2013-08-24 Thread Ben Laurie
On 24 August 2013 19:55, Krisztián Pintér wrote: > > > Can it not? A distributed store for salts seems possible... > > but then distributed keyring is also possible, is it not? > Yes. Or at least cloud storage for secrets. ___ cryptography mailing list

Re: [cryptography] no-keyring public

2013-08-24 Thread Jeffrey Goldberg
On August 24, 2013 at 1:41:27 PM, Ben Laurie (b...@links.org) wrote: On 24 August 2013 19:14, Krisztián Pintér  wrote: > 1. In your system the KDF for creating the seed to PRNG can’t be > salted. nope, it can't be. Can it not? A distributed store for salts seems possible... OK, “can’t” was too

Re: [cryptography] no-keyring public

2013-08-24 Thread Krisztián Pintér
> Can it not? A distributed store for salts seems possible... but then distributed keyring is also possible, is it not? ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] no-keyring public

2013-08-24 Thread Ben Laurie
On 24 August 2013 19:14, Krisztián Pintér wrote: > > adjisten :) > > > 1. In your system the KDF for creating the seed to PRNG can’t be > > salted. > > nope, it can't be. > Can it not? A distributed store for salts seems possible... ___ cryptography ma

Re: [cryptography] no-keyring public

2013-08-24 Thread Krisztián Pintér
adjisten :) > 1. In your system the KDF for creating the seed to PRNG can’t be > salted. nope, it can't be. > And so two people with the same password will end up with > the same key pair. for this reason, and others, a really strong key phrase is needed for that reason. this is definitely a

Re: [cryptography] no-keyring public

2013-08-24 Thread Jeffrey Goldberg
Szervusz Kristián. On August 24, 2013 at 11:29:57 AM, Krisztián Pintér (pinte...@gmail.com) wrote: so the usual thing is to create a key pair, store the private key encripted with a password. we automatically get a two factor authentication, we have a "know" and a "have".  Yep. We need both the

Re: [cryptography] no-keyring public

2013-08-24 Thread Greg Rose
On Aug 24, 2013, at 9:30 , Krisztián Pintér wrote: > > hi list, > > i had an epiphany today, and i wonder if such a thing already exists or not. > > so the usual thing is to create a key pair, store the private key encripted > with a password. we automatically get a two factor authentication

Re: [cryptography] no-keyring public

2013-08-24 Thread William Yager
On Aug 24, 2013, at 11:30 AM, Krisztián Pintér wrote: > we can do that. how about this? stretch the password with some KDF, derive a > seed to a PRNG, and use the PRNG to create the the key pair. if the algorithm > is fixed, it will end up with the same keypair every time. voila, no-keyring >

[cryptography] no-keyring public

2013-08-24 Thread Krisztián Pintér
hi list, i had an epiphany today, and i wonder if such a thing already exists or not. so the usual thing is to create a key pair, store the private key encripted with a password. we automatically get a two factor authentication, we have a "know" and a "have". okay, but what if we don't want th