[messaging] "Pseudoword" base32 fingerprints
rransom.8774 at gmail.com
Wed Feb 5 17:52:09 PST 2014
On 2/5/14, Tony Arcieri <bascule at gmail.com> wrote:
> On Wed, Feb 5, 2014 at 5:35 PM, Trevor Perrin <trevp at trevp.net> wrote:
>> Do you have an example wordlist? With a 65K dictionary you'll need 8
>> words for a 128-bit security level.
> What if you were to derive a 128-bit key (or more) using less entropy (e.g.
> 64-bits) but employing a password hashing function like scrypt?
Trevor is talking about generating a ‘human-friendly’ human-verifiable
‘fingerprint’ of a *public* key, not generating a password from which
a *symmetric* key can be derived.
More information about the Messaging