David Tomaschik wrote (in part):

> If you value your OpenPGP key, I would not trust it to 24 bits of 
> entropy.  My off-card backup of my key is protected by a 32-character
>  passphrase that I believe to be highly resistant to dictionary
> attack (and contains sufficient special characters that I believe its
> entropy to be close to the optimal 6.5 bits per symbol).  But perhaps
> I'm delusional.
> 
I do not know about delusional.

But in a sense, was it not unwise to tell me your passphrase length? I
will now set up my hypothetical exhaustive search cracker not to bother
with passphrases less than 32 characters or longer than 32 characters.
This reduces the size of the search space I must examine. Of coarse, the
shorter ones can be tested faster than the longer ones.

-- 
  .~.  Jean-David Beyer          Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A         Registered Machine   241939.
 /( )\ Shrewsbury, New Jersey    http://counter.li.org
 ^^-^^ 09:35:01 up 4 days, 18:08, 4 users, load average: 5.13, 5.25, 5.22

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to