> I certainly have several nonsensical words / names for my cats. None
> of them contain numbers or punctuation or anything associated with a
> strong passphrase. The longest of these is probably about 12
> characters. And a system that can try a billion RSA keys per second is
> going to quickly exhaust the relatively short combination of these,
> even brute forcing. And you're right -- as I also alluded above, the

assuming the attackers have a dictionary of only 500000 words that
contains your nonsense words and assuming unicase and no spaces
or other punctuation you get 18.9 bits/word.  for a neat 3 word phrase,
that's 56.8 bits.

for a login, that's plenty since there should be some protection
against password guessers.  general slowness or just a slow connection
should be enough to prevent 1e9 guesses/sec.

> People have enough difficulty remembering short passwords. Or creating
> "good" passwords in the first place. Upper bounds along with enforcing
> permutations are placed to reduce peoples' likelihood of forgetting
> them while still providing some level of security. It's not the best
> approach, but until people start treating passwords like an ATM card
> with a PIN, it's not going to matter much anyway. (Ignoring that PINs
> for most cards are only have 9990 or fewer permutations.)

people will learn.  real computer passwords have not
been common for very long.

also, an atm card is a 2-factor authentication scheme.  and
you get 3 guesses.  assuming you can steal the card your chances
of success are about 3/10000.  (wiki says 6/10000 due to unused
numbers http://en.wikipedia.org/wiki/Pin_number#PIN_security)

a better attack might be to shoulder surf and then socially
engineer the bank into sending you a card.  say by stealing
it out of the mailbox.

- erik

Reply via email to