You can not lose your private key, if you drop it first

by imcottonon 8/16/2024, 1:44 AMwith 4 comments

by BobbyTables2on 8/16/2024, 3:36 AM

What rubbish is this?

Does the author not understand entropy or probability?

Deriving an RSA key from the product of two memorizable numbers makes it brute-force-able, and sends us back to 1990s export controlled encryption strength.

Tattoo-ing a key on one’s arm (however ridiculous) would be better than the methods here.

by imcottonon 8/16/2024, 5:50 AM

In case one not digging into the source code, the key stretching here is PBKDF2-HMAC-SHA512 with 400,000 iterations (OWASP recommended 210,000).

The reason for not using Argon2 or scrypt is because PBKDF2 is native provide by Webcrypto yet FIPS-140 compliance.