[78705] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

deriving multiple keys from one passphrase

daemon@ATHENA.MIT.EDU (Travis H.)
Sat Feb 3 10:58:07 2007

Date: Thu, 1 Feb 2007 15:01:00 -0600
From: "Travis H." <travis+ml-cryptography@subspacefield.org>
To: Cryptography <cryptography@metzdowd.com>
Mail-Followup-To: Cryptography <cryptography@metzdowd.com>


--hHWLQfXTYDoKhP50
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hey, quick question.

If one wants to have multiple keys, but for ease-of-use considerations
want to only have the user enter one, is there a preferred way to
derive multiple keys that, while not independent, are "computationally
independent"?

I was thinking of hashing the passphrase with a unique string for each
one; is this sufficient?  If sufficient, is a cryptographically strong
hash necessary?

I got a clarification about the "use CRCs to process passphrase" idea
someone mentioned.  The salient bit is that he was using several CRCs
(not sure if it's random or carefully chosen), and each one is run on
the passphrase, and the output of all of them concatenated to
initialize a PRNG seed.  The passphrase and seed are both secret, so
according to him there's no need to use a cryptographically strong
hash, and CRCs have a well-understood mathematical basis.

I presume this would be insufficient for deriving independent keys,
but perhaps there is a way to do that with careful selection of the
CRC polys?

--=20
The driving force behind innovation is sublimation.
-><- <URL:http://www.subspacefield.org/~travis/>
For a good time on my UBE blacklist, email john@subspacefield.org.

--hHWLQfXTYDoKhP50
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (OpenBSD)
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=cqTx
-----END PGP SIGNATURE-----

--hHWLQfXTYDoKhP50--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post