Skip to main content

Questions tagged [passwords]

Passwords are secret keys which human beings can memorize.

0 votes
0 answers
87 views

I would like to ask for a technical review of a key-derivation construction that we developed while designing a multi-chain wallet and an E2EE identity layer. This construction is part of a broader ...
Jason's user avatar
  • 1
2 votes
3 answers
219 views

I am using Gnupg with AES256 symmetric encryption. There is a passphrase for each kind of files to encrypt, e.g. the passphrase for all work-related documents might be MyWorkRelatedPass19, whereas ...
Mephisto's user avatar
  • 192
3 votes
4 answers
466 views

The problem I am trying to solve is the transportation of an unprotected password from its entry point to the point of compare with the salted and hashed password. e.g. User enters a password in a ...
AnthonyVO's user avatar
  • 131
0 votes
2 answers
144 views

If a random password, using a selection of all 94 printable ascii characters (I don't use spaces), is encoded using the Vigenère Cipher, is it unbreakable as there would be no common words or letters ...
Zonnkq Shad's user avatar
1 vote
1 answer
272 views

I'm currently studying the security mechanisms used by 1Password, particularly the Two-Secret Key Derivation (2SKD) sequence as described in section 8.2.1 of their white paper. Here's the specific ...
gradientsearch's user avatar
2 votes
2 answers
280 views

So, I randomly sampled a password out of a space of $N$ many candidates, and handed its hash to an adversary. My password's entropy is $\log_2N$ bits. The adversary brute-forced the 1st half of ...
caveman's user avatar
  • 751
1 vote
0 answers
67 views

I've read in multiple articles that one benefit of passkey over password is that in the passkey implementation the server only stores the public key, therefore, the user won't lose any secret even if ...
SamTest's user avatar
  • 167
0 votes
0 answers
70 views

I would like to ask about vulnerabilities of the following algorithm for a password manager. It is structured as follows: There is a master password UTF-8 10 characters long, not to be stored anywhere....
Fabius Wiesner's user avatar
3 votes
1 answer
159 views

If the server is honest-but-curious, it can attempt to guess the user’s password $\mathsf{pw}$ by computing $\mathsf{rw} = H(\mathsf{pw}, H'(\mathsf{pw})^s)$,where $s$ is the server's OPRF key. Then, ...
frost.crystal's user avatar
3 votes
2 answers
472 views

Suppose: We are using an application that stores sensitive private key information in a standard Java PKCS #12 keystore. Users are expected to provide an overall store password and also a password ...
mikera's user avatar
  • 141
1 vote
1 answer
244 views

I need help wrapping my head around this notions on the key lengths and size. Exercise: Key sizes Task 1: Key size What is the key size of key for sequences of 10 ASCII characters? What is the ...
Simone Tosatto's user avatar
3 votes
1 answer
288 views

I am using the NIST suite to test the randomness of binary numbers and I have a 64KB dataset. I am confused with the results in finalAnalysisReport.txt. I have the ...
yuting zhang's user avatar
2 votes
2 answers
503 views

I've been reading up on different authentication protocols recently while I implemented the sign-in functionality for my website. Many of the suggested methods password-based authentication seem to ...
n-l-i's user avatar
  • 1,124
2 votes
1 answer
347 views

I'm working on a local, client-side password manager. I want to hash a master password with argon2 to store it safely in an SQLite database. This will be how a user could login and be authenticated. (...
dvub's user avatar
  • 123
2 votes
2 answers
839 views

If I convert a long sentence (>50 characters) to c and use the result (128 hex characters) as a password, how secure is it?
NewLinux's user avatar
  • 121

15 30 50 per page
1
2 3 4 5
36