Limit of maximum password length
jv at dodec.lt
jv at dodec.lt
Sat Oct 27 09:58:04 CEST 2012
I thought that during new key generation event I have to utilize system,
keyboard etc all the time, I see that I was wrong. Thanks for all
answers, they are really helpful.
On 10/27/2012 9:54 AM, Robert J. Hansen wrote:
> On 10/27/2012 1:58 AM, jv at dodec.lt wrote:
>> Well, I knew that there is a limit somewhere, but you know, having a
>> passphrase longer than 1024 and not longer lets say than 2048 chars
>> should not be a limit on 2012, don't you think so ? :)
> No, I don't. I think that using passphrases longer than about 80
> characters shows you don't understand the problem. :)
>
>> To answer to your question about why I need so long psw is simple, the
>> paranoia :)
> A 1024-character passphrase is so long I doubt you could memorize it
> (unless you were to use the full text of some well-known poem, and in
> that case it would be a poor passphrase). That means you've got it on a
> file somewhere and enter it via cut-and-paste. That means instead of
> safeguarding just your private key, you now need to safeguard your
> private key, the file that contains your passphrase, and the OS calls
> that implement C&P functionality. This is a much, much weaker system
> than if you were to use a "normal" passphrase.
>
> Being too paranoid is just as bad, and maybe even worse, than not being
> paranoid enough.
>
>> By the way, you mentioned "105 characters and at least 158 bits of
>> entropy", how do you control entropy when generating password ? And is
>> it safe to use external entropy generator, say like rng tools ?
> You control the entropy by coming to an informed estimate of how much
> entropy is present per glyph of text. Claude Shannon and others did
> groundbreaking work in this field, and came up with numbers generally
> falling around 2 bits per glyph. Subtracting a bit to be on the side of
> safety gives us 1.5 bits per glyph.
>
> Alternately, you can do something like this:
>
> ===
> rjh at flynn:~$ gpg --armor --gen-random 2 16
> 5FNsIpmx8UYa8lz/qWYEag==
> ===
>
> That "5FNsIpmx..." is an example of a 128-bit passphrase. That's the
> gold standard for passphrases.
>
> I'm not going to comment on external entropy generators. I don't know
> your particular situation, and that means I can't tell you what makes
> sense for your particular needs. Telling you a 1024+-character
> passphrase doesn't make sense for your needs is one thing -- telling you
> what makes sense for your needs is something else altogether.
>
>
>
More information about the Gnupg-users
mailing list