Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Q: How do you save a drowning lawyer? A: Throw him a rock.


sci / sci.crypt / Re: Memorizing a 128 bit / 256 bit hex key

SubjectAuthor
* Memorizing a 128 bit / 256 bit hex keyStefan Claas
+* Re: Memorizing a 128 bit / 256 bit hex keyRich
|`* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| `* Re: Memorizing a 128 bit / 256 bit hex keyRich
|  +* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|  |`* Re: Memorizing a 128 bit / 256 bit hex keyRich
|  | `* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|  |  `* Re: Memorizing a 128 bit / 256 bit hex keyRich
|  |   +* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|  |   |`* Re: Memorizing a 128 bit / 256 bit hex keyRich
|  |   | `* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|  |   |  `* Re: Memorizing a 128 bit / 256 bit hex keyRich
|  |   |   `* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|  |   |    `- Re: Memorizing a 128 bit / 256 bit hex keyRich
|  |   `- Re: Memorizing a 128 bit / 256 bit hex keyPaul Leyland
|  `* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
|   +* Re: Memorizing a 128 bit / 256 bit hex keyRich
|   |`* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
|   | +* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|   | |`- Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
|   | `- Re: Memorizing a 128 bit / 256 bit hex keyRich
|   `* Re: Memorizing a 128 bit / 256 bit hex keyCri-Cri
|    `- Re: Memorizing a 128 bit / 256 bit hex keyRich
+* Re: Memorizing a 128 bit / 256 bit hex keyChris M. Thomasson
|`* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| +* Re: Memorizing a 128 bit / 256 bit hex keyRich
| |+* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| ||`* Re: Memorizing a 128 bit / 256 bit hex keyRich
| || `- Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| |`- Re: Memorizing a 128 bit / 256 bit hex keyChris M. Thomasson
| `- Re: Memorizing a 128 bit / 256 bit hex keyChris M. Thomasson
+* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
|+* Re: Memorizing a 128 bit / 256 bit hex keyPeter Fairbrother
||`- Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
|`* Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| +* Re: Memorizing a 128 bit / 256 bit hex keyPeter Fairbrother
| |`- Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
| `- Re: Memorizing a 128 bit / 256 bit hex keyStefan Claas
+- Re: Memorizing a 128 bit / 256 bit hex keyOscar
`- Re: Memorizing a 128 bit / 256 bit hex keyPeter Fairbrother

Pages:12
Subject: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 13:55 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 15:55:55 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4s3ld$bu48$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 13:55:57 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="391304"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

You thoughts please, gentlemen.

Let's say you travel and do not want to store your secret hex key on your
device and recreate it from memory.

What do you think about this proposal?

$ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.

One has to remember only the dates (times are optional) and then simply run the
one liner.

The encryption software can be downloaded when one arrives at his destination.

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 14:05 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 16:05:06 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4s46k$bu48$2@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 14:05:08 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="391304"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

Stefan Claas wrote:

> You thoughts please, gentlemen.
>
> Let's say you travel and do not want to store your secret hex key on your
> device and recreate it from memory.
>
> What do you think about this proposal?
>
> $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
>
> One has to remember only the dates (times are optional) and then simply run the
> one liner.

And use that as a seed for Argon2id key creation.

>
> The encryption software can be downloaded when one arrives at his destination.
>

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 14:37 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 16:37:14 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4s62s$c1if$1@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s46k$bu48$2@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 14:37:16 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="394831"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
View all headers

Stefan Claas wrote:

> Stefan Claas wrote:
>
> > You thoughts please, gentlemen.
> >
> > Let's say you travel and do not want to store your secret hex key on your
> > device and recreate it from memory.
> >
> > What do you think about this proposal?
> >
> > $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
> >
> > One has to remember only the dates (times are optional) and then simply run the
> > one liner.
>
> And use that as a seed for Argon2id key creation.
>
> >
> > The encryption software can be downloaded when one arrives at his destination.
> >
>

I think diceware passwords with Argon2id are the solution, because one can
recreate the Argon2id hex key with with the memorized diceware passphrase. :-)

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 14:41 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 16:41:59 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4s6bp$c1if$2@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s46k$bu48$2@i2pn2.org>
<v4s62s$c1if$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 14:42:01 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="394831"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
View all headers

Stefan Claas wrote:
> I think diceware passwords with Argon2id are the solution, because one can
> recreate the Argon2id hex key with with the memorized diceware passphrase. :-)
>

For German speaking readers:

https://github.com/dys2p/wordlists-de

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Tue, 18 Jun 2024 15:05 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 15:05:35 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <v4s7nv$1cvio$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org>
Injection-Date: Tue, 18 Jun 2024 17:05:35 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8d6c210f11a82313bfe46bbb2da75273";
logging-data="1474136"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/bkc+Nxy3CEgN1i4DglyPA"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:tAgq8t2sQNLftVhc5EKiQYDoQuA=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> You thoughts please, gentlemen.
>
> Let's say you travel and do not want to store your secret hex key on
> your device and recreate it from memory.
>
> What do you think about this proposal?
>
> $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4
> or 8 times.
>
> One has to remember only the dates (times are optional) and then
> simply run the one liner.

While it is likely one might remember four or eight random dates more
easily than a 16 or 32 character hex key, there's still the problem of
remembering 4 or 8 random dates. Most folks remember "dates" because
something of importance happened on said date, and not just "a date",
so this might make the effort easier, but it is still possible to
'forget' one of the four, or eight, dates.

Given that the "dates" chunk the long string into "blocks", it might be
reasonable to use an erasure coding algorithm on the "blocks", and append
one or more blocks (i.e., dates) that are the erasure codes. Then
forgetting (or misremembering) one or two of the dates might still
allow for recovery of the original key (or at least allow for detection
of a misremembering situation).

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 17:25 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 19:25:51 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4sfv1$celq$1@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s7nv$1cvio$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 17:25:53 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="408250"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
View all headers

Rich wrote:
> Given that the "dates" chunk the long string into "blocks", it might be
> reasonable to use an erasure coding algorithm on the "blocks", and append
> one or more blocks (i.e., dates) that are the erasure codes. Then
> forgetting (or misremembering) one or two of the dates might still
> allow for recovery of the original key (or at least allow for detection
> of a misremembering situation).

Well, I guess this would then need a program to handle, right?

My Idea is to use no program for that, so that no evidence can be
found on the device, in case someone is looking at it.

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Tue, 18 Jun 2024 19:42 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 19:42:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <v4snug$1gjt3$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org>
Injection-Date: Tue, 18 Jun 2024 21:42:08 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8d6c210f11a82313bfe46bbb2da75273";
logging-data="1593251"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/VQ365QO5UE/rKBQW41KuL"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:fYNSmN2O3z4AnDfi1p5REs7cPdg=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>
>> Given that the "dates" chunk the long string into "blocks", it might be
>> reasonable to use an erasure coding algorithm on the "blocks", and append
>> one or more blocks (i.e., dates) that are the erasure codes. Then
>> forgetting (or misremembering) one or two of the dates might still
>> allow for recovery of the original key (or at least allow for detection
>> of a misremembering situation).
>
> Well, I guess this would then need a program to handle, right?

Yes, but you also need a program to handle the conversion from dates to
hex and back. Granted, few would suspect that the "date" command was
used to convert the dates back into a 'key'.

> My Idea is to use no program for that, so that no evidence can be
> found on the device, in case someone is looking at it.

It could be a generic erasure coding program, and the exact parameters
(block size, amount of redundancy, etc.) are remembered and specified
only when it is run to 'check' the output. Then it would, presumably,
be no more suspicious than the 'date' command itself (other than what
suspicion might be raised by the fact that most OS'es don't ship with
an erasure coder by default).

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Cri-Cri
Newsgroups: sci.crypt
Organization: Easynews - www.easynews.com
Date: Tue, 18 Jun 2024 19:58 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-4.nntp.ord.giganews.com!border-3.nntp.ord.giganews.com!nntp.giganews.com!news-out.netnews.com!s1-1.netnews.com!peer03.iad!feed-me.highwinds-media.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Newsgroups: sci.crypt
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.157 (Mariinka; 7c3c6087)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 19
Message-ID: <jFlcO.57814$bHO6.27194@fx06.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Tue, 18 Jun 2024 19:58:07 GMT
X-Received-Bytes: 1584
X-Original-Bytes: 1360
View all headers

On Tue, 18 Jun 2024 19:42:08 -0000 (UTC), Rich wrote:

> only when it is run to 'check' the output. Then it would, presumably,
> be no more suspicious than the 'date' command itself (other than what
> suspicion might be raised by the fact that most OS'es don't ship with an
> erasure coder by default).

But many (most?) Linux distributions ship with Python (or it's easy to
acquire), which can be used to obfuscate such things.

>>> import hashlib as h
>>> h.sha256(b'this is my secret key I DO remember').hexdigest()[::-1]
'6a8aabb884123762ccf20e6445fddfe58446ba47b4622a315b7d22bae992f965'

So little code you don't have to save anything to disk. The secret key is
almost longer. :)

--
Cri-Cri

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 20:01 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 22:01:19 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4sp2f$cnon$1@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org>
<v4snug$1gjt3$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 20:01:19 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="417559"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
View all headers

Rich wrote:

> Stefan Claas <pollux@tilde.club> wrote:

> > Well, I guess this would then need a program to handle, right?
>
> Yes, but you also need a program to handle the conversion from dates to
> hex and back. Granted, few would suspect that the "date" command was
> used to convert the dates back into a 'key'.

And in case people are looking at bash's history, for to many date
usages, I have a 'del' command in my .bashrc. :-)

alias del=">~/.bash_history;history -cw;"

> > My Idea is to use no program for that, so that no evidence can be
> > found on the device, in case someone is looking at it.
>
> It could be a generic erasure coding program, and the exact parameters
> (block size, amount of redundancy, etc.) are remembered and specified
> only when it is run to 'check' the output. Then it would, presumably,
> be no more suspicious than the 'date' command itself (other than what
> suspicion might be raised by the fact that most OS'es don't ship with
> an erasure coder by default).

I guess, instead of an erasure program, I will only use date and put
the output in my argon2id program, for key generation, which also has
the option to overwrite the clipboard.

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Tue, 18 Jun 2024 20:04 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 20:04:14 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 36
Message-ID: <v4sp7u$1gttp$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <v4sp2f$cnon$1@i2pn2.org>
Injection-Date: Tue, 18 Jun 2024 22:04:14 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8d6c210f11a82313bfe46bbb2da75273";
logging-data="1603513"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+yHzOd1iEtvXuLbXLYp1fp"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:TBiEw6DNGSmhV0XB1Gty/C57cJc=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>
>> Stefan Claas <pollux@tilde.club> wrote:
>
>> > Well, I guess this would then need a program to handle, right?
>>
>> Yes, but you also need a program to handle the conversion from dates to
>> hex and back. Granted, few would suspect that the "date" command was
>> used to convert the dates back into a 'key'.
>
> And in case people are looking at bash's history, for to many date
> usages, I have a 'del' command in my .bashrc. :-)
>
> alias del=">~/.bash_history;history -cw;"

Yes, you would want to clear the history, or configure bash to not save
those specific invocations in the first place.

>> > My Idea is to use no program for that, so that no evidence can be
>> > found on the device, in case someone is looking at it.
>>
>> It could be a generic erasure coding program, and the exact parameters
>> (block size, amount of redundancy, etc.) are remembered and specified
>> only when it is run to 'check' the output. Then it would, presumably,
>> be no more suspicious than the 'date' command itself (other than what
>> suspicion might be raised by the fact that most OS'es don't ship with
>> an erasure coder by default).
>
> I guess, instead of an erasure program, I will only use date and put
> the output in my argon2id program, for key generation, which also has
> the option to overwrite the clipboard.

Which means you /do/ have another program available, that could be
'looked for'....

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Tue, 18 Jun 2024 20:06 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 20:06:21 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <v4spbt$1gttp$2@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <jFlcO.57814$bHO6.27194@fx06.ams4>
Injection-Date: Tue, 18 Jun 2024 22:06:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8d6c210f11a82313bfe46bbb2da75273";
logging-data="1603513"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX180xm/uNkK3/zi4YbaXgfYM"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:jYKCNZ8u2iiQAb+rT9cpybxUUlU=
View all headers

Cri-Cri <cri@cri.cri.invalid> wrote:
> On Tue, 18 Jun 2024 19:42:08 -0000 (UTC), Rich wrote:
>
>> only when it is run to 'check' the output. Then it would, presumably,
>> be no more suspicious than the 'date' command itself (other than what
>> suspicion might be raised by the fact that most OS'es don't ship with an
>> erasure coder by default).
>
> But many (most?) Linux distributions ship with Python (or it's easy to
> acquire), which can be used to obfuscate such things.
>
>>>> import hashlib as h
>>>> h.sha256(b'this is my secret key I DO remember').hexdigest()[::-1]
> '6a8aabb884123762ccf20e6445fddfe58446ba47b4622a315b7d22bae992f965'
>
> So little code you don't have to save anything to disk. The secret key is
> almost longer. :)

Also true, and a way to convert something potentially more memerable
than a set of random dates into a 'key'.

And so long as one's python REPL does not save history (or you turn off
history before running the above) you leave no trace behind.

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Tue, 18 Jun 2024 20:10 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Tue, 18 Jun 2024 22:10:44 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4spk4$cnon$2@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org>
<v4snug$1gjt3$1@dont-email.me>
<v4sp2f$cnon$1@i2pn2.org>
<v4sp7u$1gttp$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 18 Jun 2024 20:10:44 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="417559"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
Finger: tilde.club/~pollux/
View all headers

Rich wrote:

> > I guess, instead of an erasure program, I will only use date and put
> > the output in my argon2id program, for key generation, which also has
> > the option to overwrite the clipboard.
>
> Which means you /do/ have another program available, that could be
> 'looked for'....

Well, I am starting to put my binaries also on GitHub, in the
respective repositories. That allows one then to download the
programs, for temporary usage.

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Cri-Cri
Newsgroups: sci.crypt
Organization: Easynews - www.easynews.com
Date: Tue, 18 Jun 2024 21:38 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!peer03.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Newsgroups: sci.crypt
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me>
<jFlcO.57814$bHO6.27194@fx06.ams4> <v4spbt$1gttp$2@dont-email.me>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.157 (Mariinka; 7c3c6087)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 19
Message-ID: <r7ncO.57940$bHO6.34837@fx06.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Tue, 18 Jun 2024 21:38:31 GMT
X-Received-Bytes: 1822
View all headers

On Tue, 18 Jun 2024 20:06:21 -0000 (UTC), Rich wrote:

> And so long as one's python REPL does not save history (or you turn off
> history before running the above) you leave no trace behind.

Perhaps try something like PuppyLinux that I think still keep a version
that only runs in RAM around. You can install it on a drive, but one of
its more interesting features was that RAM thing.

There are other systems out there, equally small, or even smaller:
http://tinycorelinux.net/ - not sure how old it is, it's like English
speaking people who own web sites have some general allergy towards
mentioning a date and when they do, it's in some weird, impossible to sort
as text format with characters that on many systems are illegal to use for
file names. Really useful. At the bottom of the front page it says 2008,
but I don't think that's accurate.

--
Cri-Cri

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Cri-Cri
Newsgroups: sci.crypt
Organization: Easynews - www.easynews.com
Date: Tue, 18 Jun 2024 21:41 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!news.bawue.net!npeer.as286.net!npeer-ng0.as286.net!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Newsgroups: sci.crypt
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me>
<v4sp2f$cnon$1@i2pn2.org>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.157 (Mariinka; 7c3c6087)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 10
Message-ID: <6ancO.57941$bHO6.14582@fx06.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Tue, 18 Jun 2024 21:41:22 GMT
X-Received-Bytes: 1131
View all headers

On Tue, 18 Jun 2024 22:01:19 +0200, Stefan Claas wrote:

> alias del=">~/.bash_history;history -cw;"

Can't you stop Bash from ever creating a history?

https://www.cyberciti.biz/faq/disable-bash-shell-history-linux/

--
Cri-Cri

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Cri-Cri
Newsgroups: sci.crypt
Organization: Easynews - www.easynews.com
Date: Tue, 18 Jun 2024 21:48 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Newsgroups: sci.crypt
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me>
<v4sp2f$cnon$1@i2pn2.org> <v4sp7u$1gttp$1@dont-email.me>
<v4spk4$cnon$2@i2pn2.org>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.157 (Mariinka; 7c3c6087)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 16
Message-ID: <TgncO.57942$bHO6.51997@fx06.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Tue, 18 Jun 2024 21:48:35 GMT
X-Received-Bytes: 1569
View all headers

On Tue, 18 Jun 2024 22:10:44 +0200, Stefan Claas wrote:

> Well, I am starting to put my binaries also on GitHub, in the respective
> repositories. That allows one then to download the programs, for
> temporary usage.

Or perhaps install KeePassXC that can use a binary file as part of a
complete key, some image somewhere, like a company logo, an mp3 file or
whatever. Store your GPG private key in a KeePassXC container and lock it
with a long key and that binary file.

Then again, if you are a wannabe spy, you of course won't have any
knowledge about neither KeePassXC nor linux.

--
Cri-Cri

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 02:53 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 02:53:34 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 8
Message-ID: <v4th7d$1p20n$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <jFlcO.57814$bHO6.27194@fx06.ams4> <v4spbt$1gttp$2@dont-email.me> <r7ncO.57940$bHO6.34837@fx06.ams4>
Injection-Date: Wed, 19 Jun 2024 04:53:34 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="30a8cfe1c385c01859adef0a92bea9ae";
logging-data="1869847"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19r45mYu6dvAky0Vnbc4W92"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:+eCSMaMeP1apN3PQQQlU8mnWQzM=
View all headers

Cri-Cri <cri@cri.cri.invalid> wrote:
>it's like English speaking people who own web sites have some general
>allergy towards mentioning a date

It's not just "english speaking people". This mentality seems to
perfuse across the entire web ecosystem. Something about the relative
/ease/ of putting up a web page causes by far too many of those people
to omit publication dates from anywhere on their page(s).

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 02:54 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 02:54:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v4th9t$1p20n$2@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <v4sp2f$cnon$1@i2pn2.org> <v4sp7u$1gttp$1@dont-email.me> <v4spk4$cnon$2@i2pn2.org>
Injection-Date: Wed, 19 Jun 2024 04:54:53 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="30a8cfe1c385c01859adef0a92bea9ae";
logging-data="1869847"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/XvA7Qj3LGnQbho0bHIlf6"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:JOHDLVIPZXRV3VMr3BoWOcP2VK8=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>
>> > I guess, instead of an erasure program, I will only use date and
>> > put the output in my argon2id program, for key generation, which
>> > also has the option to overwrite the clipboard.
>>
>> Which means you /do/ have another program available, that could be
>> 'looked for'....
>
> Well, I am starting to put my binaries also on GitHub, in the
> respective repositories. That allows one then to download the
> programs, for temporary usage.

In which case, one could do the same with an erasure coding program, to
avoid issues of being "found" with a computing device containing the
program during, say, a border crossing.

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 02:59 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 02:59:13 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <v4thi1$1p20n$3@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <v4sp2f$cnon$1@i2pn2.org> <6ancO.57941$bHO6.14582@fx06.ams4>
Injection-Date: Wed, 19 Jun 2024 04:59:13 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="30a8cfe1c385c01859adef0a92bea9ae";
logging-data="1869847"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DElFRacBjggHyAZqxCvMu"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:r3k75n6OSMOwA/tbwPhvG3Vj148=
View all headers

Cri-Cri <cri@cri.cri.invalid> wrote:
> On Tue, 18 Jun 2024 22:01:19 +0200, Stefan Claas wrote:
>
>> alias del=">~/.bash_history;history -cw;"
>
> Can't you stop Bash from ever creating a history?
>
> https://www.cyberciti.biz/faq/disable-bash-shell-history-linux/

You can, and for a special purpose system intended for "key access"
doing so is probably the best practice.

Meanwhile, if one is doing key access on a system also used for other,
general purpose purposes, fully disabling history does remove a *very*
useful feature in the general case.

The workaround can be to configure bash to not store commands that
begin with a space:

HISTCONTROL
A colon-separated list of values controlling how
commands are saved on the history list. If the list of
values includes ignorespace, lines which begin with a
space character are not saved in the history list.

Of course then one does have to remember to prefix any command that
should not be saved in history with a space.

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Cri-Cri
Newsgroups: sci.crypt
Organization: Easynews - www.easynews.com
Date: Wed, 19 Jun 2024 16:13 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx04.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Newsgroups: sci.crypt
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me>
<jFlcO.57814$bHO6.27194@fx06.ams4> <v4spbt$1gttp$2@dont-email.me>
<r7ncO.57940$bHO6.34837@fx06.ams4> <v4th7d$1p20n$1@dont-email.me>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.157 (Mariinka; 7c3c6087)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 12
Message-ID: <8tDcO.113085$FND7.27302@fx04.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Wed, 19 Jun 2024 16:13:56 GMT
X-Received-Bytes: 1451
View all headers

On Wed, 19 Jun 2024 02:53:34 -0000 (UTC), Rich wrote:

> It's not just "english speaking people". This mentality seems to
> perfuse across the entire web ecosystem. Something about the relative
> /ease/ of putting up a web page causes by far too many of those people
> to omit publication dates from anywhere on their page(s).

Yes, maybe you're right. I read maybe 95% English web stuff so that's why
I notice them more.

--
Cri-Cri

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Wed, 19 Jun 2024 16:22 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 18:22:54 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4v0kv$fg85$1@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4s7nv$1cvio$1@dont-email.me>
<v4sfv1$celq$1@i2pn2.org>
<v4snug$1gjt3$1@dont-email.me>
<v4sp2f$cnon$1@i2pn2.org>
<v4sp7u$1gttp$1@dont-email.me>
<v4spk4$cnon$2@i2pn2.org>
<TgncO.57942$bHO6.51997@fx06.ams4>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 19 Jun 2024 16:22:55 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="508165"; mail-complaints-to="usenet@i2pn2.org";
posting-account="Cql5xXq+1B7GYqFCkkYQTE9ttzQmzqt9PRBXcODTV+U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

Cri-Cri wrote:

> On Tue, 18 Jun 2024 22:10:44 +0200, Stefan Claas wrote:
>
> > Well, I am starting to put my binaries also on GitHub, in the respective
> > repositories. That allows one then to download the programs, for
> > temporary usage.
>
> Or perhaps install KeePassXC that can use a binary file as part of a
> complete key, some image somewhere, like a company logo, an mp3 file or
> whatever. Store your GPG private key in a KeePassXC container and lock it
> with a long key and that binary file.

I must admit I can't follow you, nor do I use GPG (I use modern 'age',
available at GitHub :-)).

In case of my GitHub binaries. Argon2id is stored there, so users can
then use, under Windows, the program along with a an additional download
of GNU's coreutils 'date', for Windows, to get an even stronger encryption
key to memorize, than with 'date' only.

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 19:24 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 12:24:47 -0700
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <v4vb9v$2478p$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 19 Jun 2024 21:24:48 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c0855a90345f22abd4db42c5674212bf";
logging-data="2235673"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18yf0YzHzCDe4rfIRlTKHjZ2kG5mIxc58U="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:YnnIlIPB2RM77W4hAYM/hLILI1U=
In-Reply-To: <v4s3ld$bu48$1@i2pn2.org>
Content-Language: en-US
View all headers

On 6/18/2024 6:55 AM, Stefan Claas wrote:
> You thoughts please, gentlemen.
>
> Let's say you travel and do not want to store your secret hex key on your
> device and recreate it from memory.
>
> What do you think about this proposal?
>
> $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
>
> One has to remember only the dates (times are optional) and then simply run the
> one liner.
>
> The encryption software can be downloaded when one arrives at his destination.
>

Generate a hex key from a password? It seems like my site can do it:

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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

It encrypts a key using the default password. The key is generated using
the same program. This example basically generates a key using the
default password, then encrypts said key using a different password.

Everybody can decrypt the generated key because the ciphertext in the
link uses the default password:

https://i.ibb.co/BybrYDw/image.png

The plaintext is:

A key:

f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Stefan Claas
Newsgroups: sci.crypt
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨𝔰
Date: Wed, 19 Jun 2024 19:35 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 21:35:12 +0200
Organization: ℭ𝔥𝔦𝔣𝔣𝔯𝔢𝔭𝔲𝔫𝔨
𝔰
Message-ID: <v4vbth$fvtf$1@i2pn2.org>
References: <v4s3ld$bu48$1@i2pn2.org>
<v4vb9v$2478p$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 19 Jun 2024 19:35:13 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="524207"; mail-complaints-to="usenet@i2pn2.org";
posting-account="Cql5xXq+1B7GYqFCkkYQTE9ttzQmzqt9PRBXcODTV+U";
Finger: tilde.club/~pollux/
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

Chris M. Thomasson wrote:

> On 6/18/2024 6:55 AM, Stefan Claas wrote:
> > You thoughts please, gentlemen.
> >
> > Let's say you travel and do not want to store your secret hex key on your
> > device and recreate it from memory.
> >
> > What do you think about this proposal?
> >
> > $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
> >
> > One has to remember only the dates (times are optional) and then simply run the
> > one liner.
> >
> > The encryption software can be downloaded when one arrives at his destination.
> >
>
> Generate a hex key from a password? It seems like my site can do it:
>
> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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
>
> It encrypts a key using the default password. The key is generated using
> the same program. This example basically generates a key using the
> default password, then encrypts said key using a different password.
>
> Everybody can decrypt the generated key because the ciphertext in the
> link uses the default password:
>
> https://i.ibb.co/BybrYDw/image.png
>
> The plaintext is:
>
> A key:
>
> f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd

Your site says it does key generation from 64 random bytes. How do you remember the key
when traveling, with no device? Or how can you trust your site, when your are on annual leave, out of your country, and some bad boy customized your site?

--
Regards
Stefan

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 19:43 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 19:43:09 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <v4vccd$24hrj$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4s7nv$1cvio$1@dont-email.me> <v4sfv1$celq$1@i2pn2.org> <v4snug$1gjt3$1@dont-email.me> <jFlcO.57814$bHO6.27194@fx06.ams4> <v4spbt$1gttp$2@dont-email.me> <r7ncO.57940$bHO6.34837@fx06.ams4> <v4th7d$1p20n$1@dont-email.me> <8tDcO.113085$FND7.27302@fx04.ams4>
Injection-Date: Wed, 19 Jun 2024 21:43:09 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="30a8cfe1c385c01859adef0a92bea9ae";
logging-data="2246515"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+XuF0HRnOOeRlkA35S79to"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:cbVqIDHDAF/NUejH5Xr6ocnrsw4=
View all headers

Cri-Cri <cri@cri.cri.invalid> wrote:
> On Wed, 19 Jun 2024 02:53:34 -0000 (UTC), Rich wrote:
>
>> It's not just "english speaking people". This mentality seems to
>> perfuse across the entire web ecosystem. Something about the relative
>> /ease/ of putting up a web page causes by far too many of those people
>> to omit publication dates from anywhere on their page(s).
>
> Yes, maybe you're right. I read maybe 95% English web stuff so that's why
> I notice them more.

Agreed, English is the majority language, so in sheer numbers there
will be more that omit dates, but the "omission" itself I believe
occurs everywhere.

And, sadly, it even happens with websites that *should* know better,
i.e., the traditional newspaper websites far too often have no dates on
their articles on the web, meanwhile for their legacy paper they date
each physical paper as of the day it was published.

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 19:48 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 19:48:21 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 40
Message-ID: <v4vcm5$24hrj$2@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org> <v4vb9v$2478p$1@dont-email.me> <v4vbth$fvtf$1@i2pn2.org>
Injection-Date: Wed, 19 Jun 2024 21:48:21 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="30a8cfe1c385c01859adef0a92bea9ae";
logging-data="2246515"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX189L049UtXmepoKaI9wqrdo"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:pQfBey37raCrxY/SHbmeqowJ4rw=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Chris M. Thomasson wrote:
>> Generate a hex key from a password? It seems like my site can do it:
>>
>> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=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
>>
>> It encrypts a key using the default password. The key is generated
>> using the same program. This example basically generates a key
>> using the default password, then encrypts said key using a different
>> password.
>>
>> Everybody can decrypt the generated key because the ciphertext in
>> the link uses the default password:
>>
>> https://i.ibb.co/BybrYDw/image.png
>>
>> The plaintext is:
>>
>> A key:
>>
>> f65952b125ba6860e21aef9c55e69e0612b153e5fd2599ac00b67945f9bec7563d5edf8bf9fa0db27aeb78b0c8f40f0a6a69b2cd720d59ecc73a01c1ccad0933cfe9e014dda35db6eaba760c9dbdff0f4ad24c5b702baab8e225189179b8bd
>
> Your site says it does key generation from 64 random bytes. How do
> you remember the key when traveling, with no device?

> Or how can you trust your site, when your are on annual leave, out of
> your country, and some bad boy customized your site?

A valid question -- and one that *also* applies to your argon2id on
github. How can you be sure that some cracker did not change the
argon2id present there while you are away on holiday.

Or, how can you trust that a github/microsoft insider with admin level
access did not swap out your good argon2id with a malicious argon2id.

Or that a three letter agency, having taken interest in you for some
reason, has not gotten a secret court order to swap the argon2id with a
cracked one, and included a court ordered gag to prevent
github/microsoft from informing you of the swap?

Subject: Re: Memorizing a 128 bit / 256 bit hex key
From: Peter Fairbrother
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 19 Jun 2024 19:57 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: peter@tsto.co.uk (Peter Fairbrother)
Newsgroups: sci.crypt
Subject: Re: Memorizing a 128 bit / 256 bit hex key
Date: Wed, 19 Jun 2024 20:57:56 +0100
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <v4vd84$249vl$1@dont-email.me>
References: <v4s3ld$bu48$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 19 Jun 2024 21:57:56 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="11e83ddfa5707c6a85053169736b452d";
logging-data="2238453"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/nQYNssEbV6YqMP4y93jvwxZRucdgagPU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:dQVSWjCQRCuxlPgdBncSW1aNaDQ=
In-Reply-To: <v4s3ld$bu48$1@i2pn2.org>
Content-Language: en-GB
View all headers

On 18/06/2024 14:55, Stefan Claas wrote:
> You thoughts please, gentlemen.
>
> Let's say you travel and do not want to store your secret hex key on your
> device and recreate it from memory.
>
> What do you think about this proposal?
>
> $ printf '%x' $(date -u -d '1979-01-01 12:34:56' +%s) $(date ...) 4 or 8 times.
>
> One has to remember only the dates (times are optional) and then simply run the
> one liner.
>
> The encryption software can be downloaded when one arrives at his destination.
>

Pravda - well, Pravda - Pravda said: (Russian double-talk) It stinks.

Dates mostly come in 19xx or 20xx sizes, so those 19.. or 20.. digits
are guessable. The 0 in the month 01 (I am using month first) is mostly
an 0, or else it is a 1. The 0 of the date is either 0,1,2 or 3, so the
entropy is lower.

Plus people will use dates they remember - the Moon landing, their
birthdays, their children's birthdays, and so on.

And remembering the dates and the order is, to be pernickety, hard.

Peter Fairbrother

Pages:12

rocksolid light 0.9.8
clearnet tor