On 07/24/2013 10:32 AM, Kent Borg wrote:
I don't know current estimations, but I would use the following guidelines for an encryption key:

  32-bits of entropy:          stops a naive individual with a day-job
  80-bits of entropy:          stops a small organization
  100-bits of entropy:        stops a big organization
  128-bits of entropy:        stops the NSA
  256-bits of entropy:        paranoid's goal

Reading a New York Times story on Snowden contacting the film maker Laura Poitras, Snowden is quoted as advising a strong passphrase: "Assume your adversary is capable of a trillion guesses a second."

Interesting. So they can brute-force an entire 32-space in a fraction of a second and a 64-bit space in a bit over a half a year. But an 80-bit space can't be completely traversed in 38,000 years. Even if the NSA is really really angry and the president says to get the bastard...just 80-bits is pretty dang good.

I guess I left some room for error in the above.

-kb

P.S. Again, estimating entropy by looking at a passphrase is a doomed exercise. The only way to know the entropy of a passphrase is to know how it was generated and count many random decisions were made driving that process.

_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss

Reply via email to