(I'll try to start a new thread from the following quotes.)

On Sat, Nov 28, 2009 at 8:50 AM, Robert J. Hansen <r...@sixdemonbag.org> wrote:
> Matt wrote:
>> If I had a sufficiently good passphrase, would Google returning my
>> secret key as the first hit result for every search for a day still be
>> secure?
>
> "Secure" is not a very good word to use.  It means so many different
> things to so many different people.  "Secure" really means "in
> accordance with my security policies" -- the use of the word is
> inherently subjective.


    Related to the same problem (strength of the secret key data
encryption measures), I've posted some months ago an email on the
scy.crypt Usenet group, but I didn't got a satisfactory (that is
factual) answer. (See below.)

    Maybe someone could clear this out (at least from GnuPG part). (My
original post was related with both GnuPG an OpenSSH).

~~~~~~~~~~ Original post:

    (I have a very basic question that to most of the persons reading
this news-group might seem trivial. But anyway...)

    My concern (as stated in the subject) is related to the security
strength of GnuPG and OpenSSH secret / private keys in the following
context:
    * the secret / private keys are encrypted by using a password that
only me (the owner) knows;
    * an attacker is in possession of my secret / private key files;
    * the attacker wants to gain access to the secret / private key
(thus being able to impersonate me);
    * the attacker chooses as attack method to brute-force the files
off-line, by trying to guess my password;
    * (by guessing the password I mean trying all possible passwords
that fit a given pattern; the password is not a dictionary word, but
instead is (truly) randomly created (i.e. DiceWare);)

    The question is: what does GnuPG or OpenSSH do to slow down
password brute-force? I mean does the password derivation function use
some iterations? If so how many? Can I configure them? I guess so but
I couldn't find any data on the net on a quick search. (Any references
are appreciated.)

    Also, how many bits of security should my password have in order
to withstand an attack from a small / medium enterprise? (Government
is out of the question as they could get access to my infrastructure
by force...)

    Thank you for your patience and your wisdom,
    Ciprian Craciun.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to