Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Search for public/private keypairs that use standard RFC 8032 formatting rather than Tor formatting #63

Closed
yasuiniko opened this issue Dec 19, 2021 · 1 comment

Comments

@yasuiniko
Copy link

Can this code be modified easily to search for non-Tor keypairs? C is not my strong suit and I haven't been able to decipher the code, but I can at least describe the desired modification.

If I understand correctly, there are a couple ways to represent the info (scalar a, key1 h, key2 A) needed to sign with ED25519. Tor designates (a, h) as its (priv, pub) keypair, and calculates A = a * G at sign-time, where G is the standard base point (a fixed known number). Many other implementations designate a different (priv, pub) keypair (seed, A), and calculate (a, h) = SHA512(seed) at sign-time.

I imagine the code currently uses this simplified algorithm:

  1. Generate (seed, A) using some ed25519 library
  2. Convert to the Tor keypair (a, h) = SHA512(seed)
  3. Search public key h for the user-provided search prefixes

How hard would it be to allow the code to skip step 2 and search A instead of h for the search prefixes?

@yasuiniko
Copy link
Author

oops this is a duplicate of #31 and you explained the difficulties and why you aren't working on it over there. closing this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant