-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Werewolf escribió:
> myself about password, url, username, etc. Down side, the secring.gpg
> ring stored on it as well. Will have invistigate making a secring only
> for decrypting, (sub keys) with the primary sec key stored else where.
http://tj
On Wed, Oct 22, 2008 at 06:11:23PM +0200, Bernhard Kleine wrote:
>
> With respect to randomness, do you have an idea how passphrases which
> use first letters of e.g. songs or poems (with lower and uppercase
> letters in german) are rated?
>
It all depends on how big a pool of songs/poems you hav
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Myself, use apg or wapg depending on what OS I'm on at the moment. wapg
is a windows version of apg that'll run from a ubs drive, also run
portable version of gpg from same usb drive, then just encrypt info to
myself about password, url, username, etc
Morton D. Trace wrote:
[...]
> here are some random 20char ASCII pass phrases
>
> bash-3.00$ apg -a 1 -M S -n 20 -m 20
> ^;@_*-<|./|;&/._;}.!
> ?<&!\+~&;[//.~_-!|+]
[...]
I do actually use some passphrases like this, though usually with more
letters and numbers in them (generated with gp
Am Mittwoch, den 22.10.2008, 15:40 +0200 schrieb Morton D. Trace:
> ^;@_*-<|./|;&/._;}.!
> ?<&!\+~&;[//.~_-!|+]
> %/<|;*=#&_).$<$;~.}*
> - -$/\&{%#$)[EMAIL PROTECTED]:}]
> %\#`%%.[<&~!"*~}>.'_
> &>$\({-`]$$``/^):|\^
> :}$~$],|?)&>^`!>!:.,
> )+'[,/=*':%("|-{.?/!
> !-_'/^?^?&>|?#'|&
> - -:,&~,}**[%%(
On Wed, Oct 22, 2008 at 08:15:13AM -0400, Robert J. Hansen wrote:
> Glyph = one symbol in a language. It could be a single English letter,
> a single Chinese ideogram, or a single Hangul phoneme. The more glyphs
> in your passphrase, the more entropy you have (usually). English
> accumulates abo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen wrote:
> John W. Moore III wrote:
>> Robert is a professional Mathematician and actually _loves_ Numbers.
>
> I'm a software engineer nowadays, although my college degrees are on the
> math-heavy side of theoretical computer science.
John W. Moore III wrote:
> Robert is a professional Mathematician and actually _loves_ Numbers.
I'm a software engineer nowadays, although my college degrees are on the
math-heavy side of theoretical computer science. I think it's fair to
call me a mathematician, but I'm not sure I can be said to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert J. Hansen wrote:
> Morton D. Trace wrote:
>> Dear list readers I just found this article.
>
> Be careful of anything you get off the internet. This article is not
> especially good.
Mega Dittos! [I know this sounds like Rush Limbaugh 'list
Morton D. Trace wrote:
> Dear list readers I just found this article.
Be careful of anything you get off the internet. This article is not
especially good.
> Calculating the entropy of a password is here well explained,
> I don't know if it is mathematically correct,
[shrugs] Yes. No.
The re
On Wed, 2008-10-22 at 01:00 +0200, Morton D. Trace wrote:
> Measuring the strength of a randomly selected password
>
>
> Dear list readers I just found this article.
>
> http://www.redkestrel.co.uk/Articles/RandomPasswordStrength.html
>
>
> Measuring the strength of a randomly selected passwor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen wrote:
> Faramir wrote:
>> IIRC, once I saw somebody saying 128 bits is more than enough for a
>> good passphrase. And that beyond that lenght, there was no real strengh
>> gains... But maybe I am not recalling it correctly...
>
> Thi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen escribió:
> Of course, the trick there is 128 bits _of entropy_, not 128 bits _of
> passphrase_. Conservatively speaking, there are probably about 1.5 bits
> of entropy per letter of English text, meaning you'd need about an
> 80-cha
Faramir wrote:
> IIRC, once I saw somebody saying 128 bits is more than enough for a
> good passphrase. And that beyond that lenght, there was no real strengh
> gains... But maybe I am not recalling it correctly...
This is something you've heard from a lot of people, probably, myself
included. 12
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
David Shaw escribió:
> On Oct 20, 2008, at 10:15 PM, Morton D. Trace wrote:
...
>> GnuPG needs a pass phrase to protect the primary and
>> subordinate private keys that you keep in your possession.
...
>> What to do if the pass phrase needs to be stro
passphrase:
There is no limit on the length of a passphrase,
===
is this true?
There is no limit in OpenPGP for a passphrase length, beyond that of
the inherent limit imposed by the hash used for string-to-key
conversion. So, for SHA-1, the passphrase can be up to 2^64-1 bits,
or just under
:
There is no limit on the length of a passphrase,
===
is this true?
any file system always has a maximum file size.
even ZFS has that. a Zetabyte cannot easily be neglected.
The total sum of all elementary particles in the entire universe
(open or closed) also is estimated to have an upper limit
17 matches
Mail list logo