Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <570903C0.9080904@bestmx.net>
Date: Sat, 9 Apr 2016 15:29:36 +0200
From: "e@...tmx.net" <e@...tmx.net>
To: passwords@...ts.openwall.com
Subject: Re: Passphrases: syntax vs entropy

On 04/09/2016 12:23 PM, Patrick Proniewski wrote:
> On 09 avr. 2016, at 10:36, e@...tmx.net wrote:
>
>>> I trust you on the math here, but I'm skeptical about your hypothesis.
>>> You take into account the full Oxford English Dictionary,
>>> [but] a "real" dictionary is probably 3000 to 10000 words long.
>>>
>>> You state that W^8/7294 [...] is significantly greater than W^7,
>>> but that's true only for W > 7294.
>>> For most users, W might be lower than 7294
>>
>> You forgot the premise. we are not talking about protecting every individual user, we are talking about the properties of the passwords!
>>
>> The question is: does this password creation scheme provide sufficient protection? Yes it does.
>
>
> Ok. I'm almost always thinking as the attacker, being my-self a "hobbyist" user of JtR. It helps a lot when I need to teach a user about what is a bad/poor password choice. This bias does not help much when I come across a work like yours. Thanks for the explanations.

It is a good bias too, when we understand the "game" we need to know the 
strategies of the both sides.
You gave us an important clue: passphrases composed of "commonly used 
words" will have priority in the attacker's dictionary.

That improves our global understanding of the password strength.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.