Conversation

Lazyweb, crypto question. When storing private keys encrypted with a passphrase, is there a compelling reason to do so in a way that makes it easily testable whether the passphrase was correct?
3
Obviously there's a positive ux reason, so what I'm asking is if there's a compelling argument that the loss of security by doing so is inconsequential.
2
Replying to
Under duress, you can give the wrong passphrase resulting in deriving a different key. BIP39 seed phrases use this for an optional passphrase added to the end of the seed phrase. Trezor (who created BIP39) treat it as an advanced feature since it can result in harmful mistakes.
1
2
Replying to
Yeah, I'm aware there are situations where this property is an advantage. I'm asking about the other direction - whether there are situations where there's a compelling argument that it doesn't matter if the attacker can see if passphrase is right or wrong without testing it.
1
Replying to
The only use I can think of is an example like twitter.com/DanielMicay/st. For example, law enforcement compromises a server used by something like Silk Road. They got assorted public keys and someone having the private key would be pretty strong evidence they're that person.
Quote Tweet
Replying to @DanielMicay and @RichFelker
So you can give the attacker one or more valid passphrases they can confirm are valid while still having ones you didn't tell them. Could be relevant to a use case like SSH. Could have some server not tied to you that they compromised so they have pubkey but can't prove it's you.
1
Replying to
This is all very interesting but doesn't really answer the original question (about compelling arguments that it doesn't matter in some cases, not about compelling arguments that it does matter in others).
1
Show replies