[tahoe-dev] [pycryptopp] #2: deterministic generation of private key from small seed

pycryptopp trac at allmydata.org
Tue Sep 1 09:22:39 UTC 2009


#2: deterministic generation of private key from small seed
------------------------+---------------------------------------------------
Reporter:  zooko        |           Owner:  zooko
    Type:  enhancement  |          Status:  new  
Priority:  major        |         Version:  0.4.0
Keywords:               |   Launchpad_bug:       
------------------------+---------------------------------------------------

Comment(by warner):

 I'm starting to write code for this. So far I've got the existing (Tiger-
 based) KDF pulled out into a separate function, with a debug hook in place
 to let us call the KDF function (alone) from unit tests. The plan is to
 invoke the KDF function with some different seeds, and compare the result
 (the private exponent) against the same algorithm implemented in python
 code.

 To actually do that would require exposing SHA512 to python, however.

 Is it important to use "-d" on both extractor and expander? I have to
 figure out how to implement the double-hash in C++.

 Also, are you still happy with using Tiger as the actual message-digest
 hash? (i.e. using Tiger as the second template parameter argument). I
 don't know how/if to change that, for consistency, to SHA256 or whatever.

-- 
Ticket URL: <http://allmydata.org/trac/pycryptopp/ticket/2#comment:8>
pycryptopp <http://allmydata.org/trac/pycryptopp>
Python bindings for the Crypto++ library


More information about the tahoe-dev mailing list