You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We should extract and adapt the OpenSSH Visual Host Keys code to generate fingerprints. It should also generate two fingerprints that are matches to 2^80 complexity.
One 'match' should have the difference completely at random
One 'match' should have the location of the characters as close as possible, but the less 'computation' expended on the type of character
The text was updated successfully, but these errors were encountered:
Figuring out which is best, and then how to simulate a 2^80 attack seems like a ton of work, probably a study / research project in itself. Dunno if we have the resources for this, or maybe we should scale back and just focus on the text formats?
We should extract and adapt the OpenSSH Visual Host Keys code to generate fingerprints. It should also generate two fingerprints that are matches to 2^80 complexity.
The text was updated successfully, but these errors were encountered: