tomrittervg / crypto-usability-study

29 stars 4 forks source link

Test Data: Visual Fingerprints #8

Open tomrittervg opened 10 years ago

tomrittervg commented 10 years ago

We should extract and adapt the OpenSSH Visual Host Keys code to generate fingerprints. It should also generate two fingerprints that are matches to 2^80 complexity.

trevp commented 10 years ago

In addition to OpenSSH fingerprints we should consider "vash" and "Hash Visualization":

https://github.com/thevash/vash https://moderncrypto.org/mail-archive/messaging/2014/000217.html

Hash Visualization: https://sparrow.ece.cmu.edu/group/pub/old-pubs/validation.pdf

The OpenSSH algorithm is described here: http://aarontoponce.org/drunken_bishop.pdf

Figuring out which is best, and then how to simulate a 2^80 attack seems like a ton of work, probably a study / research project in itself. Dunno if we have the resources for this, or maybe we should scale back and just focus on the text formats?