Oleksandr Gavenko -> debian-russian@lists.debian.org  @ Mon, 30 Nov 2015 
16:46:11 +0200:
 >>A password is not strong because it is long; it is strong because it includes
 >>a lot of randomness.

 OG> Есть ли метр, выдающий сколько бит энтропии в пароле?

 OG> По условиям для последовательности слов:

 OG>   http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf

 OG>   Entropy varies greatly depending on whether a password is selected by a 
user
 OG>   or is generated randomly. Statistically, guessing the first character of 
a
 OG>   password selected by a user is tough, but guessing the second is easier 
and
 OG>   the third is easier yet. The NIST guidelines give the first character 4 
bits
 OG>   of entropy when using the 94 characters available on standard keyboards, 
but
 OG>   only 2 bits for each of the next seven characters, and so on.

 OG>   Randomly selected passwords do not display patterns, so each character
 OG>   carries the same level of entropy, about 6.6 bits.

 OG> пароль в 64-bit будет длиной 31 символ - 5/6 слов. Против 10 случайных
 OG> символов от генератора (которые фиг запомнишь).

"Юзер набирает пароль с пятого раза, а хакер подбирает с третьего".  Ты
попробуй пару раз безошибочно ввести 31 символ, не видя реакции на
ввод...

Ответить