unofficial mirror of guile-user@gnu.org 
 help / color / mirror / Atom feed
From: Michael Titke <michael.tiedtke@o2online.de>
To: guile-user@gnu.org
Subject: Human Typable Shared Secret (make-passwd.scm)
Date: Thu, 18 Jun 2015 07:56:21 +0200	[thread overview]
Message-ID: <55825D85.5030209@o2online.de> (raw)

[-- Attachment #1: Type: text/plain, Size: 1288 bytes --]


Whenever you would like to do something very very important you probably 
will need a new password for subscribing to a mailing list, creating 
another on-line account and else. After some passwords you start to 
develop a scheme on how to easily create new passwords in your mind but 
it remains daunting. The password storage and retrieval is already done 
by Firefox, Thunderbird, Key Chain and Account Managers but the password 
creation is still left to the user who - as a matter of fact - only 
needs to memorize his master password.

To fill the gap I have written a small command line utility in Guile 
Scheme which serves my needs.


Human Typable Shared Secret (System Scheme)

This implementation creates a human typable shared secret
especially for protecting online accounts and it should be used in
conjunction with keychains or password managers. It is defined to
not use certain special characters which are known to be difficult
to find if the keyboard layout in software doesn't match the actual
inscriptions on the keys. It is designed to remain usable on
paper backups. Its shared secrets have the property of being
hard (but not impossible) to communicate by oral speech. They are
also hard to memorize especially when you can look at them only for
a short time.



[-- Attachment #2: make-passwd.scm --]
[-- Type: text/x-scheme, Size: 4297 bytes --]

#!/usr/bin/guile -s
!#

;;
;; mti's Crypto Sweet: Human Typable Shared Secret (System Scheme)
;; (make-passwd.scm)
;;
;; Functional Programming seemed to be orthogonal to system
;; programming where data is passed in /pipelines/ and similar
;; concepts.
;;
;; This software is in the Public Domain as granted by the original
;; author.
;;
;; This implementation creates a human typable shared secret
;; especially for protecting online accounts and it should be used in
;; conjunction with keychains or password managers. It is defined to
;; not use certain special characters which are known to be difficult
;; to find if the keyboard layout in software doesn't match the actual
;; inscriptions on the keys. It is designed to be usable with
;; secondary backups. Its shared secrets have the property of being
;; hard (but not impossible) to communicate by oral speech. They are
;; also hard to memorize especially when you can look at them only for
;; a short time. There might be other algorithms based on the
;; knowledge of the syllable structure of common western (and perhaps
;; other) languages that could produce secure /master passwords/ not
;; be held within keychains and password managers.
;;
;; The magnitude of the space of distinct shared secrets is high
;; enough to be considered secure with current authentication routines
;; in use on the Internet. For the original implementation with 65
;; characters and 12 positions it should be: (expt 65 12) which is
;; greater than
;;
;;   (expt 64 12) => (expt (expt 2 6) 12) => (expt 2 72)
;;
;; You can improve it by adding your own preferred special
;; characters. TODO: It should take a command line argument
;; representing the length of the desired shared secret.
;;
;; Please consider changing the shared secrets (Soup of Letters) to
;; your needs: sometimes they force you to use special characters in
;; passwords although real randomness - as employed by this
;; implementation - allows shared secrets without them. Do not change
;; this implementation but add the needed characters to the final
;; shared secret yourself at some random position. A further useful
;; adaption would be insert spaces but beware that they might be
;; difficult to read on secondary backups.
;;

;; No abbreviations here: I want to see the characters.
(define *characters*
  (append (string->list "ABCDEFGHIJKLMNOPQRSTUVWXYZ")
          (string->list "abcdefghijklmnopqrstuvwxyz")
          (string->list "1234567890")
          (string->list "!,.")))
(define *number-of-characters* (length *characters*))
(define *length-of-password* 12)

(display "make-passwd: number-of-characters: ")
(display *number-of-characters*)
(display "; shared secret size: ")
(display *length-of-password*)
(newline)


(define (throw-dices randomness-port)
  (let throw-dices ((n *length-of-password*))
    (if (<= n 0)
        '()
        (cons (read-char randomness-port)
              (throw-dices (- n 1))) )))
(define dices->seed list->string)

(display "make-passwd: Throwing Dices")
(define randomness-device "/dev/urandom") ; should be non-blocking pool access
;; /call-with-input-file/ opens the input device in text mode but see
;; the description of binary mode: no difference on UNIX systems.  If
;; this changes perhaps due to Unicode system libraries we might get a
;; bias into our random data but as we use the dices only as the seed
;; for the randomizer we might get away with it. Please check your
;; system's source code for further information.
(define my-dices (call-with-input-file randomness-device
                                       throw-dices))
(display " => the seeds have been thrown: #")
(display (length my-dices))
(newline)


(define (get-new-state)
  (if (null? my-dices)
    (display "make-passwd: Oh dear, we failed! --")
    (let ((dice (car my-dices)))
      (set! my-dices (cdr my-dices))
      (seed->random-state (dices->seed (list dice))) )))
(define (x n)
  "This procedure is undocumented."
  (if (<= n 0)
      '()
      (cons (random *number-of-characters* (get-new-state))
            (x (- n 1))) ))
(define (soup n)
  (map (lambda (index)
         (list-ref *characters* index))
       (x n)))


(define (make-passwd)
  (display "Soup of Letters: ")
  (display (list->string (soup 12)))
  (newline))

(make-passwd)

             reply	other threads:[~2015-06-18  5:56 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-06-18  5:56 Michael Titke [this message]
2015-06-19  3:08 ` Human Typable Shared Secret (make-passwd.scm) Nala Ginrut

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://www.gnu.org/software/guile/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55825D85.5030209@o2online.de \
    --to=michael.tiedtke@o2online.de \
    --cc=guile-user@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).