Calculating magic hashes for https://www.whitehatsec.com/blog/magic-hashes/. These strings should probably be put into a blacklist preventing users from using them as passwords to mitigate PHP evaluating hashes starting with "0e" as floats.
#!/usr/bin/python | |
import hashlib | |
nonce = 0 | |
key = 'f3q4uszyt67cfatq' | |
pad = hashlib.sha256(str(nonce)+key).digest() | |
# encrypt | |
plaintext = 'the quick brown fox jumped over.' |
Each generator yields 128-bit security passwords. Each generator can take an optional numeric
password to generate that many passwords. They should be placed in your ~/.zshrc
. They are not
portable across other shells.
gen-monkey-pass
generates visually unambiguous random meaningless strings using Crockford's
base32. Requires only ZSH:
% gen-monkey-pass
9cws91tjck93f0xymjn33cjt7m
% gen-monkey-pass 3
This document shows how we can create Bitcoin wallet mnemonic seeds by hand in a provably secure way. It follows the BIP-39 specification. The steps are straight forward, and we'll go into each of them in detail with this doc.
The steps are as follows:
- Generate cryptographically secure bits
- Divide into 11-bit bytes
10,000 seconds RE:
Zone | HR | RE | Ratio |
---|---|---|---|
1 | 80 | 15 | 0.0015 |
1 | 85 | 17 | 0.0017 |
1 | 90 | 19 | 0.0019 |
1 | 95 | 22 | 0.0022 |
1 | 100 | 24 | 0.0024 |
1 | 105 | 26 | 0.0026 |
First column is HR, second column is RE for 10,000 seconds at that HR. | |
Header is formula from the lowest HR to the max HR in that segment wihout the intermediate points. | |
There are 7 separate jumps. | |
8x/15-83/3 | |
========== | |
80: 15 | |
85: 17 | |
90: 19 | |
95: 22 |
- December 1974
- Asmussen, Erling, and Flemming Bonde-Petersen
- "Apparent Efficiency and Storage of Elastic Energy in Human Muscles during Exercise"
- https://doi.org/10.1111/j.1748-1716.1974.tb05776.x
- June 1, 1977
- Cavagna, G. A., and M. Kaneko
- “Mechanical work and efficiency in level walking and running.”
- https://doi.org/10.1113/jphysiol.1977.sp011866
- November 1, 1982
- Williams, Keith R., and Peter R. Cavanagh
test_name | ntup | OptiHash | SHA-256 | urandom |
---|---|---|---|---|
diehard_birthdays | 0 | 🟥 | 🟢 | 🟢 |
diehard_operm5 | 0 | 🟥 | 🟥 | 🟥 |
diehard_rank_32x32 | 0 | 🟥 | 🟥 | 🟥 |
diehard_rank_6x8 | 0 | 🟥 | 🟥 | 🟥 |
diehard_bitstream | 0 | 🟥 | 🟥 | 🟥 |
diehard_opso | 0 | 🟥 | 🟥 | 🟥 |
diehard_oqso | 0 | 🟥 | 🟥 | 🟥 |
diehard_dna | 0 | 🟥 | 🟢 | 🟥 |