[messaging] "Pseudoword" base32 fingerprints

Robert Ransom rransom.8774 at gmail.com
Wed Feb 5 17:52:09 PST 2014

On 2/5/14, Tony Arcieri <bascule at gmail.com> wrote:
> On Wed, Feb 5, 2014 at 5:35 PM, Trevor Perrin <trevp at trevp.net> wrote:
>> Do you have an example wordlist?  With a 65K dictionary you'll need 8
>> words for a 128-bit security level.

> What if you were to derive a 128-bit key (or more) using less entropy (e.g.
> 64-bits) but employing a password hashing function like scrypt?

Trevor is talking about generating a ‘human-friendly’ human-verifiable
‘fingerprint’ of a *public* key, not generating a password from which
a *symmetric* key can be derived.

Robert Ransom

More information about the Messaging mailing list