BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Password managers
- Subject: [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- Date: Wed, 6 May 2020 21:50:17 -0400
- In-reply-to: <31156b7d-880c-f77f-0972-f1ebbe4ab837@borg.org>
- References: <9c4a5c7e-55aa-8ae1-da3b-4512cb2ae85c@gmail.com> <5eb1f81d.1c69fb81.80c8b.07ca@mx.google.com> <CANiupv686GBC5EZVsiEf831-b4i0E3NjZ3fnsDToM02z1zjUNg@mail.gmail.com> <5eb223cd.1c69fb81.6fa04.3ab5@mx.google.com> <0cbc8403-48a5-14bd-524c-a4eded6b64fa@borg.org> <e2be00f8-8de6-4645-e71b-a5d14f78ede7@borg.org> <5eb2d4b7.1c69fb81.c9540.9f0b@mx.google.com> <2fc76d5b-e5bd-2aa4-7002-7e7b65461d76@borg.org> <5eb2f4ba.1c69fb81.676b1.a824@mx.google.com> <bc8f39ad-543c-9be6-169b-b8b2c13261a9@borg.org> <5eb2fac0.1c69fb81.34622.b7dd@mx.google.com> <31156b7d-880c-f77f-0972-f1ebbe4ab837@borg.org>
On 5/6/20 7:32 PM, Kent Borg wrote: > 16-random characters? Which? Let's assume just lower case ASCII > alphabetics. > > ?26^16 is 43608742899428874059776L > > That is a big number. (Add uppercase and numbers and other printable > stuff...and 52**16 and 96**16 are both crazy bigger.) > > If your attacker started brute forcing that lowercase password at the > start of the universe, and had been checking 100K guesses per second > ever since, your attacker would be finishing up any millennium now. > > What is the point? Encryption keys are different. There is no rate-limiting (nor remote server crashing under your load), you can copy the encrypted file across as many machines as you like. ?- The rate at which you can test a password is determined by some external sever you don't control. ?- The rate at which you can test an encryption key is limited only by your budget. In 1998 the $250,000 EFF's Deep Crack broke DES (56-bits) in under 3-days. (That was an impressive feat.) Put a $10,000,000 machine on it and that would be under 2-hours. Have an NSA-style budget and $100,000,000 key cracking machine seems likely, and it takes less than 10-minutes. These numbers are way out of date, but the principle still stands: Once you have a copy of the encrypted data you can divide up the work and do it in parallel. To defend against a brute force search, make the encryption key longer. AES is 128-bits or 256-bits. But your passphrase gets turned into the real key, and if it is "password1234" it can be one of the first ones tried. Make encryption passphrases crazy, nasty, un-typeable monsters to really be safe. -kb
- References:
- [Discuss] Password managers
- From: j.natowitz at gmail.com (Jerry Natowitz)
- [Discuss] Password managers
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Password managers
- From: sweetser at alum.mit.edu (Doug)
- [Discuss] Password managers
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Password managers
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Password managers
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Password managers
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Password managers
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Password managers
- Prev by Date: [Discuss] Password managers
- Next by Date: [Discuss] Password managers
- Previous by thread: [Discuss] Password managers
- Next by thread: [Discuss] Password managers
- Index(es):