Re: As a fan of GnuPG ...
Ángel wrote: > On 2020-06-18 at 16:54 +0200, Stefan Claas wrote: > > charlie derr wrote: > > > > > Is getting those first 5 characters into the output of this string > > > really that amazing? Or am i missing something significant about what > > > the rest of the seemingly random characters represent? > > > > Well, it is just for fun and maybe people find it cool. At least it is > > a brute-force method to find words in such hashed and base64 encoded > > strings. > > > Each base64 character encodes 6 bits. So on average you can expect to > get those 5 characters there once in 2^(5*6) inputs, thus requiring > about 2²⁹ operations. > > Note you can do the same with gpg keys, getting such vanity keyids. I used a Vanity Generator this year, on Palindrome Day, and my fingerprint for my current key is: 02022020D638E78F4DFE737C419F025C897DB2E6 :-) Certified by Governikus at the *same* day. :-) Regards Stefan -- my 'hidden' service gopherhole: gopher://iria2xobffovwr6h.onion ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: As a fan of GnuPG ...
On 2020-06-18 at 16:54 +0200, Stefan Claas wrote: > charlie derr wrote: > > > Is getting those first 5 characters into the output of this string > > really that amazing? Or am i missing something significant about what > > the rest of the seemingly random characters represent? > > Well, it is just for fun and maybe people find it cool. At least it is > a brute-force method to find words in such hashed and base64 encoded > strings. Each base64 character encodes 6 bits. So on average you can expect to get those 5 characters there once in 2^(5*6) inputs, thus requiring about 2²⁹ operations. Note you can do the same with gpg keys, getting such vanity keyids. Best regards ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: As a fan of GnuPG ...
charlie derr wrote: > Is getting those first 5 characters into the output of this string > really that amazing? Or am i missing something significant about what > the rest of the seemingly random characters represent? Well, it is just for fun and maybe people find it cool. At least it is a brute-force method to find words in such hashed and base64 encoded strings. I have a Golang version of the program and can let it run for a while and with 'grep' I can look for words and save the strings in a file. Not so fast as those GPU BTC-vanity generators, but fun and interesting IMHO. Regards Stefan -- my 'hidden' service gopherhole: gopher://iria2xobffovwr6h.onion ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: As a fan of GnuPG ...
On 6/18/20 9:33 AM, Stefan Claas wrote: > ... you should try this out in your terminal and look at the beginning > of the output: > > $ echo 1fccaf3d | xxd -r -p | openssl dgst -sha256 -binary | openssl enc > -base64 > > :-) > > P.S. A friend of mine came up with a shell script to do this. > > Regards > Stefan > Is getting those first 5 characters into the output of this string really that amazing? Or am i missing something significant about what the rest of the seemingly random characters represent? spoiler, my output was: GnuPGCfA8srqYMiMWAFrWTvP0n0pbfSGRdUIA7kv/1U= somewhat confused, ~c -- Charlie Derr Director, Instructional Technology 413-528-7344 https://www.simons-rock.edu Bard College at Simon's Rock Encryption key: http://hope.simons-rock.edu/~cderr/ Personal writing: https://medium.com/@cderr pronouns: either he/him or they/them is acceptable Home landline: 860-435-1427 signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users