GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    F4GRX Sébastien (f4grx@chaos.social)'s status on Saturday, 13-Dec-2025 20:01:56 JST F4GRX Sébastien F4GRX Sébastien
    • Ryan Castellucci (they/them) :nonbinary_flag:

    @ryanc 'heck no'

    In conversation about 2 months ago from chaos.social permalink
    • Embed this notice
      Ryan Castellucci (they/them) :nonbinary_flag: (ryanc@infosec.exchange)'s status on Saturday, 13-Dec-2025 20:01:54 JST Ryan Castellucci (they/them) :nonbinary_flag: Ryan Castellucci (they/them) :nonbinary_flag:
      in reply to

      @f4grx I note that there are implementations that exist, but they are bad.

      In conversation about 2 months ago permalink
    • Embed this notice
      Ryan Castellucci (they/them) :nonbinary_flag: (ryanc@infosec.exchange)'s status on Sunday, 14-Dec-2025 17:12:42 JST Ryan Castellucci (they/them) :nonbinary_flag: Ryan Castellucci (they/them) :nonbinary_flag:
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Hovav Shacham
      • Erin 💽✨

      @hovav @f4grx @erincandescent @brouhaha Indeed. A 256 bit seed is good enough for anything.

      In conversation about 2 months ago permalink
    • Embed this notice
      Hovav Shacham (hovav@infosec.exchange)'s status on Sunday, 14-Dec-2025 17:12:43 JST Hovav Shacham Hovav Shacham
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Ryan Castellucci (they/them) :nonbinary_flag:
      • Erin 💽✨

      @f4grx @erincandescent @ryanc @brouhaha That is very much not what a 256-bit PRNG gives you. Rather, the output is indistinguishable from truly random by any adversary not capable of 2256 computation—which is all of them.

      In conversation about 2 months ago permalink
    • Embed this notice
      F4GRX Sébastien (f4grx@chaos.social)'s status on Sunday, 14-Dec-2025 17:12:45 JST F4GRX Sébastien F4GRX Sébastien
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Ryan Castellucci (they/them) :nonbinary_flag:
      • Erin 💽✨

      @erincandescent @ryanc @brouhaha 256 bits of entropy to generate a 25519 key is okay, it's just bit tumbling. 256 bits of entropy to generate a full RSA2048 key is not, it means only one in 4 bits is random.

      In conversation about 2 months ago permalink
    • Embed this notice
      Erin 💽✨ (erincandescent@akko.erincandescent.net)'s status on Sunday, 14-Dec-2025 17:12:46 JST Erin 💽✨ Erin 💽✨
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Ryan Castellucci (they/them) :nonbinary_flag:

      @f4grx @brouhaha @ryanc i don’t see any problem with using a e.g. 256-bit seed to a DRBG into a known algorithm to generate the private key

      in fact this is how e.g. ed25519 and ML-KEM are defined.

      In conversation about 2 months ago permalink
    • Embed this notice
      F4GRX Sébastien (f4grx@chaos.social)'s status on Sunday, 14-Dec-2025 17:12:47 JST F4GRX Sébastien F4GRX Sébastien
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Ryan Castellucci (they/them) :nonbinary_flag:

      @brouhaha @ryanc yeah the idea that a whole private key can be found from a potentially very much shorter seed is frightening. salting does not even help here. the whole idea sounds *very bad* , I'm not even sure what "we do it on purpose" would work here.

      In conversation about 2 months ago permalink
    • Embed this notice
      🇺🇦 haxadecimal 🚫👑 (brouhaha@mastodon.social)'s status on Sunday, 14-Dec-2025 17:12:48 JST 🇺🇦 haxadecimal 🚫👑 🇺🇦 haxadecimal 🚫👑
      in reply to
      • Ryan Castellucci (they/them) :nonbinary_flag:

      @ryanc @f4grx
      You mean, bad beyond the fact that the whole concept is bad?

      In conversation about 2 months ago permalink
    • Embed this notice
      Ryan Castellucci (they/them) :nonbinary_flag: (ryanc@infosec.exchange)'s status on Sunday, 14-Dec-2025 21:28:39 JST Ryan Castellucci (they/them) :nonbinary_flag: Ryan Castellucci (they/them) :nonbinary_flag:
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Hovav Shacham
      • Erin 💽✨

      @erincandescent @f4grx @hovav @brouhaha Absolutely. Though I am a bit focused on generation based on a seed plus a set of arbitrary key/value pairs.

      In conversation about 2 months ago permalink
    • Embed this notice
      Erin 💽✨ (erincandescent@akko.erincandescent.net)'s status on Sunday, 14-Dec-2025 21:28:41 JST Erin 💽✨ Erin 💽✨
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Hovav Shacham
      • Ryan Castellucci (they/them) :nonbinary_flag:

      @ryanc @hovav @f4grx @brouhaha it would be nice if an algo were written down as per e.g. https://github.com/C2SP/C2SP/blob/main/det-keygen.md for ECDSA

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
        C2SP/det-keygen.md at main · C2SP/C2SP
        Community Cryptography Specification Project. Contribute to C2SP/C2SP development by creating an account on GitHub.
    • Embed this notice
      Ryan Castellucci (they/them) :nonbinary_flag: (ryanc@infosec.exchange)'s status on Sunday, 14-Dec-2025 22:17:38 JST Ryan Castellucci (they/them) :nonbinary_flag: Ryan Castellucci (they/them) :nonbinary_flag:
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Hovav Shacham
      • Erin 💽✨

      @f4grx @erincandescent @hovav @brouhaha Until computers are made of something other than matter and occupy something other than space.

      In conversation about 2 months ago permalink
    • Embed this notice
      F4GRX Sébastien (f4grx@chaos.social)'s status on Sunday, 14-Dec-2025 22:17:40 JST F4GRX Sébastien F4GRX Sébastien
      in reply to
      • 🇺🇦 haxadecimal 🚫👑
      • Hovav Shacham
      • Ryan Castellucci (they/them) :nonbinary_flag:
      • Erin 💽✨

      @ryanc @erincandescent @hovav @brouhaha thanks for all your remarks, it's true that 2^256 is still a lot of security.

      In conversation about 2 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.