Andrew Gallagher wrote:
 
> Entropy checkers only provide an *estimate* of randomness, at best an upper 
> bound. Once you know that someone has used a
> particular key expansion algorithm, the entropy estimate can go down 
> dramatically. This is because randomness is a measure of
> ignorance, and new information changes the calculation (cf the Monty Hall 
> problem).

Thanks for the info, much appreciated!

I must admit that I have not looked how GnuPG saves passwords, or better pass 
phrases. I would assume
that GnuPG does also additional salting and/or stretching.

The questions for me would be how those password cracking databases store 
passwords, when doing brute force.

Do they store the information, like I do with my humble approach? I have read 
years ago that for example
the NSA is capable of searching for seven billion passwords per second.

Additionally I could use my humble approach and tell people the following:

(Let's assume I would use 'Holidays Day 1, 2, 3 etc.') I could tell them also L 
or R 3 (delete 3 chars
at left or right from the strong string, and add 'house' and 'mouse' to the 
left and/or right.

This would then IMHO not match the database strings anymore, in case they look 
like my approach.

Regards
Stefan

-- 
my 'hidden' service gopherhole:
gopher://iria2xobffovwr6h.onion

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to