On 02/01/15 13:14, sben1783 wrote:
> What I'd like to do is: create a public key so that the corresponding private
> key equals my given password.

This is possible with elliptic curve cryptography, although you should realise
that a passphrase usually contains a lot less entropy than a private key based
on random numbers. This means it is possible to try passphrases for your public
key and try them out as the secret key, which is not possible with ordinary
secret keys.

OpenPGP and GnuPG do not support this, though.

An example of software using this property of ECC keys is SECCURE[1]. This is
not a recommendation, and I'm also not recommending against it. I simply make no
statement as to its security. Other than what I will say now, that is.

The only input to key generation in SECCURE is your password; there is no
salting. The same password leads to the same public key.

If you were to use, for instance, PBKDF2 to generate the public key, you'd at
least strengthen the password against a number of attacks such as rainbow
tables. I don't know why the author of SECCURE didn't use that; it would
increase the size of the public key by at least 13 characters (making it 50%
longer) but it seems a good tradeoff to me.

Cheers,

Peter.

[1] http://point-at-infinity.org/seccure/

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to