On Tue, Feb 07, 2006 at 08:14:29PM +0100, Ludwig H?gelsch?fer wrote:
> Hi,
>
> On 07.02.2006 20:05 Uhr, Oskar L. wrote:
>
> > This is of course only true if the attacker knows it is exactly 15
> > characters long. If not, then it should be calculated like this: 95^1 +
> > 95^2 + 95^3 + ... + 95^1
Hi,
On 07.02.2006 20:05 Uhr, Oskar L. wrote:
> This is of course only true if the attacker knows it is exactly 15
> characters long. If not, then it should be calculated like this: 95^1 +
> 95^2 + 95^3 + ... + 95^15.
Right, this gives exactly 95^16 - 1. This is not a dramatic improvement
compare
"Gabriele Alberti" <[EMAIL PROTECTED]> wrote:
> Keeping in mind my password can be composed with all 95 writeable ascii
> chars,
> using for example a 15 chars password gives me a "password space" of
> 95^15,
> that is 463291230159753366058349609375 passwords..*much* smaller than the
> 256
> bit
(I know. We already have lots of threads about the net on password length).
Heres my two cents, from someone who has zero security/cryptographic
background (:
Bruteforcing 256bit keys is on a level of hardness that pretty much
renders it impossible.
So I wouldn't really bother trying to make a p
Hello,
I am not a crypto expert; i have this paranoia since some time though..
If i use _symmetric_ cyphers (lets say a 256 bit) how long my password has to
be?
Keeping in mind my password can be composed with all 95 writeable ascii chars,
using for example a 15 chars password gives me a "passwor