Bitcoin Forum
June 24, 2018, 09:28:29 AM
 News: Latest stable version of Bitcoin Core: 0.16.1  [Torrent]. (New!)
 Home Help Search Donate Login Register
 Pages: [1]
 Author Topic: ---  (Read 1162 times)
unchi
Newbie

Offline

Activity: 29
Merit: 0

 August 19, 2015, 03:39:05 AM

---
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1529832509
Hero Member

Offline

Posts: 1529832509

Ignore
 1529832509

1529832509
 Report to moderator
johoe
Full Member

Offline

Activity: 217
Merit: 103

 August 19, 2015, 06:24:47 AM

To brute force every 2-character alphanumeric passphrase with no salt, you would have to run the scrypt function 38.4 billion times (each with 2^16 iterations). Adding an email address as your salt could make it impractical to brute force.

In my short test, the time-consuming part (at least in the javascript implementation) seems to be the iteration of the PIN.  Now by your construction one doesn't have to brute-force this part, since computing this part for PIN=9999999 will also compute this part for all smaller PINs.

Wouldn't it be better to just append the PIN to the salt and instead increase the number of scrypt iterations until the code has roughly the same run-time as before with a seven digit PIN?

Donations to 1CF62UFWXiKqFUmgQMUby9DpEW5LXjypU3
Kazimir
Legendary

Offline

Activity: 1176
Merit: 1000

 August 19, 2015, 08:03:10 AM

Code:
for(n=1;n<=PIN;n++) {passphrase=sha256(passphrase+salt)}

I would do:

Code:
for (n=1; n≤PIN; n++) { passphrase = hmac_sha256(passphrase, PIN+salt) }

Or perhaps even:

Code:
key = '';
for (n=1; n≤PIN; n++) { key = hmac_sha256(key+passphrase, PIN+salt) }

And make the 216 scrypt iterations depend on PIN as well.

hmac_sha256 is stronger than just plain sha256, and mixing in the original passphrase every iteration (instead of just hashing the previous hash value) could avoid some loss of entropy.

GUI-wise I would initially only show the address, and hide the private key (WIF + QR) with a button "Show Private Key".

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
Kazimir
Legendary

Offline

Activity: 1176
Merit: 1000

 August 19, 2015, 08:28:27 AM

By the way, just saying: https://keybase.io/warp has been around for more than a year and it seems to do a pretty decent job.

In theory, there's no difference between theory and practice. In practice, there is.
Insert coin(s): 1KazimirL9MNcnFnoosGrEkmMsbYLxPPob
TheButterZone
Legendary

Offline

Activity: 2184
Merit: 1008

Pay with SegWit!

 August 20, 2015, 06:27:10 AM

By the way, just saying: https://keybase.io/warp has been around for more than a year and it seems to do a pretty decent job.

Scroll to the bottom of their page and they have a BTC20 wallet with an unsolved passphrase.

NBA Store coupons here!
Saying that you don't trust someone because of their behavior is completely valid.
peligro
Hero Member

Offline

Activity: 596
Merit: 500

1NoBanksLuJPXf8Sc831fPqjrRpkQPKkEA

 August 20, 2015, 05:18:39 PM

I would be already happy when a website would offer the signature verification tool. It was a very quick and easy way to copy paste a signature and check it there. Wallets and coinig need 3 times copy past, including carefully chosing the signs to copy.

I would like to have this tool. I don't need anything other that was on brainwallet.org. I guess bringing that tool online would be no risk at the moment right? So hopefully someone does.
 Pages: [1]
 « previous topic next topic »