BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] ssh keys question
- Subject: [Discuss] ssh keys question
- From: bill.n1vux at gmail.com (Bill Ricker)
- Date: Sat, 18 Jun 2016 00:21:26 -0400
- In-reply-to: <5764B1A1.7000704@borg.org>
- References: <mailman.11.1466179204.26887.discuss@blu.org> <ee255849986a8455a436c0cff185444c.squirrel@webmail.ci.net> <5764883F.3030807@borg.org> <90b46e0e-dbf6-0aa7-abeb-e89294b389fb@horne.net> <5764B1A1.7000704@borg.org>
On Fri, Jun 17, 2016 at 10:27 PM, Kent Borg <kentborg at borg.org> wrote: > Out of curiosity, please tell me how entropy is measured, >> > > I count decisions. ?Mathematically a very defensible position.? Each binary decision is one binary bit , which is the (usual) unit of entropy as well as of information. If my passwords cycle through bill1, bill2, bill3, bill4, there's only 2 bits of information or entropy once you have my algorithm. 123456 has maybe 3-5 bits entropy .. 12345 is very popular but not 50% of all passwords. It should be in the first 8-32 passwords tried ... -- Bill Ricker bill.n1vux at gmail.com https://www.linkedin.com/in/n1vux
- References:
- [Discuss] ssh keys question
- From: richb at pioneer.ci.net (Rich Braun)
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- From: bill at horne.net (Bill Horne)
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- Prev by Date: [Discuss] ssh keys question
- Next by Date: [Discuss] ssh keys question
- Previous by thread: [Discuss] ssh keys question
- Next by thread: [Discuss] ssh keys question
- Index(es):