• by BobbyTables2 on 8/16/2024, 3:36:36 AM

    What rubbish is this?

    Does the author not understand entropy or probability?

    Deriving an RSA key from the product of two memorizable numbers makes it brute-force-able, and sends us back to 1990s export controlled encryption strength.

    Tattoo-ing a key on one’s arm (however ridiculous) would be better than the methods here.

  • by imcotton on 8/16/2024, 5:50:59 AM

    In case one not digging into the source code, the key stretching here is PBKDF2-HMAC-SHA512 with 400,000 iterations (OWASP recommended 210,000).

    The reason for not using Argon2 or scrypt is because PBKDF2 is native provide by Webcrypto yet FIPS-140 compliance.