Why revoke a key?

Ivan Shmakov ivan at gray.siamics.net
Tue Oct 11 13:25:43 CEST 2011


>>>>> Jerome Baum <jerome+person at jeromebaum.com> writes:
>>>>> On 2011-10-10 23:29, Jan Janka wrote:

 >> How long would it take to execute a successful brute force attack on
 >> a pasphrase consisting of 12 symbols (symbols available on common
 >> keyboards)?

 > Calculate how many combinations there are, assume some number of
 > tries per second (you can experimentally find this out), and there
 > you go.

 > But remember Murphy's(?) law! -- (I mean the one about doubling
 > computer power every 18 months -- are there two Murphy's laws?
 > Confused now...)

	That's used to be Moore's [1].

	On a second thought, I guess that /both/ of them are to be
	considered when it comes to information security.

[1] http://en.wikipedia.org/wiki/Moore's_law

[…]

-- 
FSF associate member #7257




More information about the Gnupg-users mailing list