Why revoke a key?
ivan at gray.siamics.net
Tue Oct 11 13:25:43 CEST 2011
>>>>> Jerome Baum <jerome+person at jeromebaum.com> writes:
>>>>> On 2011-10-10 23:29, Jan Janka wrote:
>> How long would it take to execute a successful brute force attack on
>> a pasphrase consisting of 12 symbols (symbols available on common
> Calculate how many combinations there are, assume some number of
> tries per second (you can experimentally find this out), and there
> you go.
> But remember Murphy's(?) law! -- (I mean the one about doubling
> computer power every 18 months -- are there two Murphy's laws?
> Confused now...)
That's used to be Moore's .
On a second thought, I guess that /both/ of them are to be
considered when it comes to information security.
FSF associate member #7257
More information about the Gnupg-users