On Sat, 14 Jun 2014 22:32:16 -0400 Jerry Stuckle <jstuc...@attglobal.net> wrote:
> On 6/14/2014 2:06 PM, Patrick Chkoreff wrote: ... > > Here's a way to generate a *truly* random password that is *also* memorable: > > > > http://diceware.com > > > > Instead of using your computer to generate allegedly random bits, you > > use five six-sided dice to generate truly random bits. > > > > > > -- Patrick > > > > > > Not good at all. With 5 dice, you have 6^5 or 7,776 possible > combinations. Just figuring 5 upper and lower case characters and > numbers, you have 62^5 or 916,132,832 (more if you add special > characters). Even a 3 alphanumeric (upper and lower) case character > password has 238,328 possible combinations. > > I wouldn't even consider this a weak password. It's much worse than > that. The fact you can have combinations of words doesn't add that much > security, especially if someone thinks you're using the diceware list. I think there's a miscommunication here; the diceware instructions are to use five dice *per word*, and recommend either five or six words as a minimum: http://world.std.com/~reinhold/diceware.html http://world.std.com/~reinhold/dicewarefaq.html#howlong Celejar -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140617194106.5ef67321f1bb2bec946b4...@gmail.com