![]() |
![]() |
#1 |
Aug 2015
2E16 Posts |
![]()
I realise this is computer science related, and may be more appropriate in a cryptographic forum, but I'm hoping to establish a mathematical foundational knowledge of the subject before I then consider it's application.
I imagine the application would relate to something similar to: https://superuser.com/questions/8022...eople-into-one My basic understanding of private/public key encryption is that two prime numbers are generated, one which enables encoding of data which the other can decode. I'm wondering whether it is mathematically possible to create a keyring of multiple public/private keys, which can be derived from a single master key. The rationale is that the different public/private key-pairs could then be associated to different personas for peer-to-peer social media or other uses. e.g. pre-teen me, teenage me, young-adult me, parent me, grandparent me, professional me, dating me, legal me. These persona keys would be created from a master me key-pair, which is turn could be recoverable using something similar to a 24-word cryptographic recovery phrase. The 24 words could then, for example, be held in a Will, or individually entrused to others. It would be even better if the derived keys each in turn had their own 6 or 12 word recovery phrases, derived from the 24 words. |
![]() |
![]() |
![]() |
#2 | |
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
17·619 Posts |
![]() Quote:
Hint: PK crypto need not use primes at all. Any group in which the discrete logarithm problem is hard will serve. I strongly recommend that you read and understand https://arxiv.org/pdf/0711.3941.pdf Go away, learn more about PK crypto, and then rephrase your questions if you still have them. Last fiddled with by xilman on 2020-11-10 at 13:28 Reason: Minor tweaks. |
|
![]() |
![]() |
![]() |
#3 | |
Aug 2015
2E16 Posts |
![]() Quote:
Though could you confirm whether this document answers my question? And if so, which section addresses automatic generation/recovery of keyrings? Thanks |
|
![]() |
![]() |
![]() |
#4 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
22·32·167 Posts |
![]() Quote:
Practically, no. Keys should not be derived from some sort of master code, better that they are each generated randomly. There should be no master key, that would make them insecure. |
|
![]() |
![]() |
![]() |
#5 | |
Aug 2015
1011102 Posts |
![]() Quote:
The master key is what I'm describing as a compound key, so if there's 10 persona key pairs, the master key could be massive, and the recovery phrase could be hundreds of words. Could you elaborate on your response? |
|
![]() |
![]() |
![]() |
#6 | |
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
17·619 Posts |
![]() Quote:
Security is not a binary quality and it encompasses many more aspects than computational effort. Last fiddled with by xilman on 2020-11-10 at 16:34 |
|
![]() |
![]() |
![]() |
#7 |
Sep 2009
1,987 Posts |
![]()
A better way to do it is to generate several public/private key pairs, each independently generated from random noise. Then encrypt the private keys with a symmetric key generated from a secure passphrase.
That way the private keys all have the same (maximum) strength. And stealing one of them gives no help cracking the rest. As long as the master keyphrase is securely locked away and unguessable you are as secure as possible. In practice you would need to keep a copy of the pair you are using now unencrypted (or encrypted with a different passphrase). That would be more vulnerable but there is no way round that. Your first step should be to look for existing key management products that will do what you want. It's not easy to build a DIY system without making any mistakes. And read up on cryptography so you know what you are doing. Chris |
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Unique Groupings found in the first 49 mersenne numbers | ONeil | ONeil | 27 | 2018-12-03 01:52 |
RDS's unique pedagogic ways | R.D. Silverman | Soap Box | 137 | 2012-01-07 07:52 |
Factors for unique exponents? | Dubslow | Information & Answers | 15 | 2011-10-17 02:53 |
A unique bug probably never before seen | fivemack | Msieve | 1 | 2009-08-19 19:59 |
Unique Logic circuit grid. | mfgoode | Math | 6 | 2006-10-03 17:10 |