[cryptography] no-keyring public

William Yager will.yager at gmail.com
Sat Aug 24 12:53:50 EDT 2013

On Aug 24, 2013, at 11:30 AM, Krisztián Pintér <pinterkr at gmail.com> wrote:

> we can do that. how about this? stretch the password with some KDF, derive a seed to a PRNG, and use the PRNG to create the the key pair. if the algorithm is fixed, it will end up with the same keypair every time. voila, no-keyring password-only public key cryptography.
> do you see any downsides to that, besides the obvious ones that follow from the no-keyring requirement? (slow, weak password.)

You mean like a Bitcoin brain wallet? 

And yes, the downside is that they're very susceptible to brute force attacks. I suppose this is more the case with Bitcoin wallets than with other signature schemes.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20130824/37837b23/attachment.asc>

More information about the cryptography mailing list