Bitcoin Forum
November 05, 2024, 12:00:35 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: BIPS38 Encrypted Paper Wallet From Bitaddress.org  (Read 1596 times)
Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 12:55:02 AM
 #1

If I make a BIPS38 encrypted paper wallet from bitaddress.org on a clean, offline computer with a secure password, is there any realistic possibility of theft? Would it also be safe to upload a .jpg of the wallet to the cloud?
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
January 21, 2014, 01:31:32 AM
 #2

It's still as weak as your password

Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 01:46:08 AM
 #3

It's still as weak as your password

I know, but is it as strong as my password? If my password is unable to be cracked by brute force, is there any other way I could lose my bitcoins (besides torture or me forgetting my password)?
Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 01:48:08 AM
 #4

It's still as weak as your password

I am considering using a password like this:


1. memorable phrase

[i'll suck cock for bitcoin]

2. SHA-256 hash of memorable phrase

[904cc478b74282c130faaac1c205f19fa618e353a3e98c2a12b96192307b8825]

3. First 6 characters of hash output, dot, significant date

[904cc4.20140115]

4. SHA-256 hash again

[70ce70b2a9e41f3b16f817ed5d604a388db995ae5d85da77e54ccd0f012e827c]

5. That hash output, dot, significant person

[70ce70b2a9e41f3b16f817ed5d604a388db995ae5d85da77e54ccd0f012e827c.andreasantonop]

6. Hash again for final password

[f3e03c29384847dbbb88ec6d3b9420edee46159c2c4452b84f032057884f0e17]


Could it possibly be brute forced?
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
January 21, 2014, 01:54:11 AM
 #5

Unless encryption is compromised no

Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 02:08:17 AM
 #6

Unless encryption is compromised no

How strong is BIPS38 encryption compared to SHA-256? Are they related or totally different?
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
January 21, 2014, 02:46:32 AM
 #7

Unless encryption is compromised no

How strong is BIPS38 encryption compared to SHA-256? Are they related or totally different?

Sha is a hash, not encryption

Not sure what cipher but I do know it adds like another 1000 hashes

Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 03:18:39 AM
 #8

Unless encryption is compromised no

How strong is BIPS38 encryption compared to SHA-256? Are they related or totally different?

Sha is a hash, not encryption

Not sure what cipher but I do know it adds like another 1000 hashes

OK thanks for your help.
MNDan
Full Member
***
Offline Offline

Activity: 287
Merit: 101



View Profile
January 21, 2014, 03:51:25 AM
 #9

I'm more concerned about not being able to decode my BIPS38 private key due to the encryption plugin not working anymore on whatever browser/OS. I know about LiveCD and offloading BitAddress and whatnot, but what if you go to decrypt your paper wallet key and you can't get the java script working to decrypt it or you can't install your old version of LiveCD to a newer machine? Paranoia... hehe. Seriously, though.
Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 04:43:59 AM
 #10

I'm more concerned about not being able to decode my BIPS38 private key due to the encryption plugin not working anymore on whatever browser/OS. I know about LiveCD and offloading BitAddress and whatnot, but what if you go to decrypt your paper wallet key and you can't get the java script working to decrypt it or you can't install your old version of LiveCD to a newer machine? Paranoia... hehe. Seriously, though.

I have experimented with decrypting BIPS38 private keys on blockchain.info and Mycelium android wallet with complete success. I cannot imagine why that would ever stop working. Also, couldn't you just save a copy of the encryption/decryption software to use at the time in the future that you need it?
cp1
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500


Stop using branwallets


View Profile
January 21, 2014, 04:47:17 AM
 #11


I am considering using a password like this:


1. memorable phrase
2. SHA-256 hash of memorable phrase
3. First 6 characters of hash output, dot, significant date
4. SHA-256 hash again
5. That hash output, dot, significant person
6. Hash again for final password

Could it possibly be brute forced?


Probably not, but you're not going to remember that in 5 years so it doesn't matter.

Guide to armory offline install on USB key:  https://bitcointalk.org/index.php?topic=241730.0
canton
Sr. Member
****
Offline Offline

Activity: 261
Merit: 285



View Profile WWW
January 21, 2014, 04:52:19 AM
 #12

I cannot imagine why that would ever stop working.

Unfortunately, it is a valid concern. Not hugely widespread, but still concerning. See:

https://bitcointalk.org/index.php?topic=416324.0
Siegfried (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile
January 21, 2014, 04:57:21 AM
 #13


I am considering using a password like this:


1. memorable phrase
2. SHA-256 hash of memorable phrase
3. First 6 characters of hash output, dot, significant date
4. SHA-256 hash again
5. That hash output, dot, significant person
6. Hash again for final password

Could it possibly be brute forced?


Probably not, but you're not going to remember that in 5 years so it doesn't matter.

Yes, I would.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!