On 26 Jan 2016, at 23:03, Matthieu Weber wrote:

On Tue 26.01.2016 at 10:14:46PM +0700, Allan Odgaard wrote:
Furthermore, even with a 12 byte passphrase, it is user generated,
so it is unlikely to be truly random, which decrease the search
space (often significantly).

http://world.std.com/~reinhold/diceware.html solves that problem.

This is basically suggesting 25-30 throws of the dice for a truly random password resulting in 65-77 bit keys: log2((6^5)^5)

The “dicelist” is there to make it possible for people to remember a 65-77 bit random number, but good luck convincing people to use this scheme and also to have them generate a new passphrase for each new application.

So in practice, I think asymmetric encryption is the better/stronger
choice.

You only displace the problem, by having to protect your private key
with a passphrase.

Which is still better since an attacker will need to steal your key before they can brute-force your passphrase, and if you are worried about this, you can move the key to a physical token, so now this physical token needs to be stolen for someone to decrypt your files, and this physical token can have its own security requiring specialized tools in order to break them.
_______________________________________________
Password-Store mailing list
[email protected]
http://lists.zx2c4.com/mailman/listinfo/password-store

Reply via email to