[tahoe-dev] [pycryptopp] #2: deterministic generation of private key from small seed
pycryptopp
trac at allmydata.org
Tue Sep 1 02:22:39 PDT 2009
#2: deterministic generation of private key from small seed
------------------------+---------------------------------------------------
Reporter: zooko | Owner: zooko
Type: enhancement | Status: new
Priority: major | Version: 0.4.0
Keywords: | Launchpad_bug:
------------------------+---------------------------------------------------
Comment(by warner):
I'm starting to write code for this. So far I've got the existing (Tiger-
based) KDF pulled out into a separate function, with a debug hook in place
to let us call the KDF function (alone) from unit tests. The plan is to
invoke the KDF function with some different seeds, and compare the result
(the private exponent) against the same algorithm implemented in python
code.
To actually do that would require exposing SHA512 to python, however.
Is it important to use "-d" on both extractor and expander? I have to
figure out how to implement the double-hash in C++.
Also, are you still happy with using Tiger as the actual message-digest
hash? (i.e. using Tiger as the second template parameter argument). I
don't know how/if to change that, for consistency, to SHA256 or whatever.
--
Ticket URL: <http://allmydata.org/trac/pycryptopp/ticket/2#comment:8>
pycryptopp <http://allmydata.org/trac/pycryptopp>
Python bindings for the Crypto++ library
More information about the tahoe-dev
mailing list