William Yager [ARCHIVE] on Nostr: 📅 Original date posted:2014-04-24 📝 Original message:Gmaxwell pointed out that ...
📅 Original date posted:2014-04-24
📝 Original message:Gmaxwell pointed out that we could safely front-load all the key
pre-stretching. The spec has been updated to take advantage of this.
The user's password is now protected by 10,000 rounds of salted
PBKDF2-HMAC-SHA512, as well as the main KDF (which ranges from scrypt
2^14/8/8 to scrypt 2^18/16/16 and PBKDF2-HMAC-SHA512 2^16 to 2^21).
Will
On Mon, Apr 21, 2014 at 7:05 PM, William Yager <will.yager at gmail.com> wrote:
>
> The idea is that more powerful devices (mobile phones, laptops, etc.) can
> do all the key-stretching on their own, whereas weaker devices with access
> to another device with more computing power (like Trezors) do a fair amount
> of key-stretching on their own, but can safely export the rest of the
> key-stretching to the other device.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140424/22603d98/attachment.html>
Published at
2023-06-07 15:19:16Event JSON
{
"id": "a5f1577d06de60c5fa7d9f4c397229798880d9be4ca6e502184e454f5bff3c5b",
"pubkey": "dac5021a7b00b2588f37695f479d6d47ad5dbacbb4f6beec1ddd295ae976e83c",
"created_at": 1686151156,
"kind": 1,
"tags": [
[
"e",
"cdd59bf8e32bbb76a78cedc662081f2d30622696211df6dad1392bfa40a02bd2",
"",
"root"
],
[
"e",
"5b2da7c92a3d33b9662a7c8f93aff021c5c1501398716e649e020967ad8a6fd5",
"",
"reply"
],
[
"p",
"dac5021a7b00b2588f37695f479d6d47ad5dbacbb4f6beec1ddd295ae976e83c"
]
],
"content": "📅 Original date posted:2014-04-24\n📝 Original message:Gmaxwell pointed out that we could safely front-load all the key\npre-stretching. The spec has been updated to take advantage of this.\n\nThe user's password is now protected by 10,000 rounds of salted\nPBKDF2-HMAC-SHA512, as well as the main KDF (which ranges from scrypt\n2^14/8/8 to scrypt 2^18/16/16 and PBKDF2-HMAC-SHA512 2^16 to 2^21).\n\nWill\n\nOn Mon, Apr 21, 2014 at 7:05 PM, William Yager \u003cwill.yager at gmail.com\u003e wrote:\n\n\u003e\n\u003e The idea is that more powerful devices (mobile phones, laptops, etc.) can\n\u003e do all the key-stretching on their own, whereas weaker devices with access\n\u003e to another device with more computing power (like Trezors) do a fair amount\n\u003e of key-stretching on their own, but can safely export the rest of the\n\u003e key-stretching to the other device.\n\u003e\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140424/22603d98/attachment.html\u003e",
"sig": "a56f4cf2ab1fae29999dd08ebd9ec2725ed93152f84a9c65eba9815abab393dd6755b935362785e52b2ef72168b48f5d02ce6abb22dde68e915061545a62ca0a"
}