From: Gomar on
On Feb 24, 2:33 pm, Paulo Marques <pmarq...(a)grupopie.com> wrote:
> > 5 - 931151402 - 3 years, 7 months
>
> Updating the table to some actual real numbers instead of fictional ones:
>
> 5 - 916132832 / 10000/s -> ~ 1 day
>
> All this is for a completely random 5 character combination, not a

You are correct ONLY if you know that the pw is 5 characters.
Otherwise, you have to start at 1 and go up to 5.
run the programs in my links, and enter 1 as min, 5 as max.
From: bmearns on
On Feb 25, 8:32 pm, Gomar <rompho...(a)gmail.com> wrote:
> On Feb 24, 11:51 am, bmearns <mearn...(a)gmail.com> wrote:
>
>
>
> > I can pull numbers out of my butt, too, but it doesn't mean they're
> > right. Where are you even getting these? Even if they were accurate,
>
> I got these stats, not from my butt, but from 2 winzip/rar cracking
> programs:http://www.elcomsoft.com/archpr.html
> andhttp://www.RARPasswordCracker.com

Lovely, we generally like to cite our references when we make them,
not just upon request.


> In fact, using a calculator you could've confirmed the above.

Only given a base estimate which you provided but without reference,
and which I then demonstrated was an unrealistic estimate, anyway.
Just because these two programs take that long doesn't mean that's as
fast as it can be done, and doesn't mean that it would require some
kind of advanced technology to do it faster.

> Which
> BTW I am surprised
> you've never seen these numbers.  So you were not familiar with these
> stats since you claim to
> be a crypto expert and post 5 paragraphs.

I never claimed to be a crypto expert, I am very much a crypto
amateur. I wrote 5 paragraphs because your original message indicated
that you were either a troll or ignorant about cryptography and
computers. I gave you the benefit of the doubt and assumed you were
not a troll. I must admit, you fooled me there.

>
> > I've got a python script running right now that's brute forcing a
> > trial winzip archive with a 5 character password using your 62
> > character alphabet. The current estimate puts the max time at less
> > than 540 days, so less than a year and a half. And of course, that's
>
> huh? I do not own, neither recall inventing any 62 character alphabet.

Well maybe you should check back a few days in this thread. Here, let
me refresh your memory:
On Feb 23, 7:31 pm, Gomar <rompho...(a)gmail.com> wrote:
[snip]
> using A-Z, a-z, 0-9
> 1 character pw has 62 possible combinations, and should take 5secs to
> crack;

The alphabet consisting of A-Z, a-z, 0-9 has 62 characters as you
yourself pointed out.


> Ok, so it takes 6 months to crack a 5 character pw.  Fine.

Perfect, so your original assertion which started this thread, that a
5 character password is "good enough", is demonstrably wrong.

>
> > government agency couldn't crack your 5 character password by the end
> > of the week, you're just plain stupid.
>
> Ok, cool, I am sure the NSA with its CRAY clunkers will devote its
> time to cracking my pws.  LOL!

Fair enough, but that doesn't invalidate the point that a 5 character
password has been shown to be quite weak.

> I'll just use a foreign alphabet, Hindi, Greek, Chinese or Arabic or a
> mixture of 10 different languages.

Well that's still more to remember: why not just use a 10 character
password with the English alphabet? The strength of the password is
directly correlated to the number of possible values it can take on,
and so is the difficulty of memorizing it.

From: bmearns on
On Feb 25, 8:56 pm, Gomar <rompho...(a)gmail.com> wrote:
> On Feb 24, 1:34 pm, bmearns <mearn...(a)gmail.com> wrote:
[snip]
> > write it down somewhere secure. If your attacker has access to
> > whatever secure location you keep your password in (like your wallet
>
> well, if you travel and want to read your email at a hotel, or at
> school, or at work,

So put it in your wallet.


> or your wife has access to your primary email, you need to use hotmail
> or gmail.

What does using hotmail or gmail have to do with it? And you don't
trust your wife's ability to use a secure password? Is she as dense as
you are?


> Write it down?  Are you saying you type in 32 characters every time
> you log in?

Actually, I have a 10 character password. Yes, I have memorized it and
I type it in every time.


> Also, if you use different pws for different accounts, that's like 20
> pws X 32 = 640 characters.

First, there are ways around this. For instance, I have a core 10
character very-secure password that I've comitted to memory. To
generate passwords for different accounts, I append some simple
description of the account (like "gmail") and then hash the
concatenated value and submit that as my password. It allows me to use
a different password without having to memorize a ton of different
strong passwords, and yet if any one password is compromised it will
not cause the others to be compromised.

Granted, it is a bit of a nuisance to need access to an implementation
of the hash whenever I need to log in. That brings me to my second
point. You need to pick your argument: are you trying to say that more
than 5 characters is unnecessary or that it is impractical? You're
basically wrong on both accounts, but it would really be in your best
interest to choose one or the other, or at least to keep the arguments
separate. Claiming that a strong password with more than 5 characters
is too difficult to use in no way lessens the importance of doing so.

-Brian
From: bmearns on
On Feb 25, 8:34 pm, Gomar <rompho...(a)gmail.com> wrote:
> On Feb 24, 12:12 pm, "J.D." <degolyer...(a)yahoo.com> wrote:
>
> > and there is no way to authenticate whether or not this person is in
> > fact the account-holder.
>
> let me get this straight.  I am posting from this account, but I am
> not its holder.
> got it.

It is more or less trivial to forge the From: header in an email
message so that it appears to be coming from a different account.
From: J.D. on
> BTW, I aint a troll. I iz a leprechaun.

Fine. Tell me where the gold is or you die....slow.