-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Francisco,

On 30/07/13 23:09, Francisco Ruiz wrote:
> 4. A revamped Key strength meter, which won't give a perfect score
> until the user has appended his/her email to the Key. This is to
> combat a powerful attacker (like the NSA) who might be able to make
> a rainbow table containing public keys for a whole dictionary's
> worth of likely private keys (Thanks, Michael; not quite the same
> as adding a random salt, but I think this achieves the objective
> without inconveniencing the user too much).

This is a neat solution to increase the difficulty of dictionary
attacks without increasing the burden on the user's memory. However,
I'm still concerned that dictionary attacks (without rainbow tables)
would be quite easy to carry out. See the following article, for
example, which describes current techniques for cracking salted passwords:

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

I'd recommend using PBKDF2 or scrypt with a high iteration count to
increase the cost of dictionary attacks. Perhaps the iteration count
could be determined automatically using your password strength
estimation algorithm, so weaker passwords would use more iterations?

Cheers,
Michael

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJR+kNXAAoJEBEET9GfxSfMYnMH+wRWKY+gPIPyWGMyWhQkuOCb
5LtGHNnyJoCuvBN8z563HF8gjaMIDcsi6r4Z9qoBKh47Q3DN6WgAOqB13brKKBg0
VhfcjgGW8sRpvw1FGRUgg+O91ZQg+KsmvBjQetQ+u7HSj2TomreN1HV9UJWbNFUr
QwYzzhXs7DoXCGkrBwfOLqNIh2CrygPrBcP77PMTCc+NdmLm5mpLd5e1N8UAiL1u
ZKiBQUU7zknmRayjRbr4EjqEotQ41dTpjICcrAvRBxD5n5kz5sule/J+F6WiYDRA
Yk8LcQOQmXFmMdUWPKaC1NZCyPZGiaQGWcD7n/l6fk1bzX0ZD0gpNv5vFye4XYk=
=mPeB
-----END PGP SIGNATURE-----
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to