A better way to think about passwords
Faramir
faramir.cl at gmail.com
Mon Apr 18 13:02:47 CEST 2011
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
El 17-04-2011 20:27, Andre Amorim escribió:
> On 17 April 2011 23:58, Robert J. Hansen <rjh at sixdemonbag.org> wrote:
>>> Summary: A 3-word password (e.g., "quick brown fox") is secure against
>>> cracking attempts for 2,537 years.
>>
>> I am giving a great big yuk to his methodology. There's no reference to the entropy of text, for instance. His example of a three common word password, "this is fun," amounts to a total of 11 letters
>
> I was thinking about that, between words, there is only a BLANK
> SYMBOL, same value of any other given symbol. Well, from point of view
> of math, nothing changes, all "data", but from "knowledge" point of
> view about human behaviour it is possible that it's have some kind of
> relevance.
And I was thinking that before attempting to bruteforce something, we
should try using symbols as separators between words, it is easier to
type wordnumbersymbolword than to put numbers and symbols between words...
Fortunately, I have not found a password cracking tool, for free,
capable of doing that.
Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQEcBAEBCAAGBQJNrBpXAAoJEMV4f6PvczxAM5MIAII4kEX6cPC1eCw5oKZmu/2R
uoLWCV/UfP0hSaUrwhb1jLdZTrsvG/j36TaA4G5fEgZXRcEXKJZ0OcXVVMlb8ILz
4+e/Kh+qAGyfGC93BAYUNlvjor7cTwp1sq6xG/8ganfYkhtfVByLOa6Txhh9b3Z4
jhaIQ0eYORv0tlszs4pE2kRh4qaGBEdU1MYEOt26hpJhloxbJFvhHqjztKR3lVfi
lQd57ocGTcy4PUtw4YngUX4WvR+UaDJaypYz0dHFt1uQ4/22fsbJDWsi1/pS/RWZ
VHLICwVTzTdEyIEGGlweueDW+dbxlkZU0CxuF4PYgizXSNVEak3VVIyifwlWTB8=
=Hkit
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list