Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test Data: Visual Fingerprints #8

Open
tomrittervg opened this issue May 25, 2014 · 1 comment
Open

Test Data: Visual Fingerprints #8

tomrittervg opened this issue May 25, 2014 · 1 comment

Comments

@tomrittervg
Copy link
Owner

We should extract and adapt the OpenSSH Visual Host Keys code to generate fingerprints. It should also generate two fingerprints that are matches to 2^80 complexity.

  • One 'match' should have the difference completely at random
  • One 'match' should have the location of the characters as close as possible, but the less 'computation' expended on the type of character
@trevp
Copy link

trevp commented May 28, 2014

In addition to OpenSSH fingerprints we should consider "vash" and "Hash Visualization":

https://github.com/thevash/vash
https://moderncrypto.org/mail-archive/messaging/2014/000217.html

Hash Visualization:
https://sparrow.ece.cmu.edu/group/pub/old-pubs/validation.pdf

The OpenSSH algorithm is described here:
http://aarontoponce.org/drunken_bishop.pdf

Figuring out which is best, and then how to simulate a 2^80 attack seems like a ton of work, probably a study / research project in itself. Dunno if we have the resources for this, or maybe we should scale back and just focus on the text formats?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants