
STRONG PASSWORD EXAMPLES LIST PASSWORD
The older HMAC-SHA* algorithm is less effective against parallelization by GPUs and ASICs - the same weaknesses suffered by Bitcoin against dedicated mining hardware.Īrgon2id is the winner of the Password Hashing Competition and the state-of-the-art hashing algorithm of choice when protecting encryption keys. Passwords for LUKS FDE are secured using a key-stretching implementation known as a Password-Based Key Derivation Function (PBKDF). Note this does not help if bad passwords are chosen. They allow passwords to be shorter while adding a certain entropy security margin. ĭepending on how it is implemented, key-stretching introduces a major speed-bump for brute-forcing as it forces an adversary to undergo extra steps compared to processing vanilla, symmetric, master encryption keys.

Lower bound - Doubling every 24 months 2013-2025: It is expected that Moore's Law ends by 2025 because of physical constraints of silicon.ġ trillion guesses in 2013 = 2 40 operations. Other estimates by the industry put that at 18 months. Moore's Law predicts the doubling of number of on-die transistors every 24 months (two years). Table: Diceware Password Strength Word TotalĮstimated Brute-force Time (Classical Computing) The relationship between entropy and the length of the diceware password is outlined below. Log (62) / log (2) = 5.95 bits per character Log (32) / log (2) = 5 bits per characterĪlternatively, an alphanumeric string using lower/uppercase will have 62 characters in the set: There are 32 special characters on a standard U.S. Įntropy per word is calculated by dividing log of number of words in list by log 2.

This in practice is extremely unlikely and is detectable by the user and in the latter case a recommended number of words is advised to mitigate this risk. The concept of Min-entropy measures the worst case lower bound of passphrase entropy in case of diceware generating words that have semantic meaning as a sentence or short passphrases whose character length can be easily brute-forced. The entropy type referred to throughout this page is Shannon Entropy. As will be explained later, one can deviate from this rule to have a shorter password while still having a realistically strong protection level. When determining appropriate password length, ideally it should have at least as much entropy as the bit length of the symmetric key that is derived from it. This relies on the fact that the time taken to try all possible combinations would be infeasibly large, even for a well-equipped adversary. Passwords that are long enough should be safe for millions or billions of years, even if the list chosen is known to the attacker. Instead of generating a random sequence containing alphanumerical and special characters, Diceware selects a sequence of words equiprobably from a list containing several thousand that have been curated for their memorability, length and profanity. To generate strong passwords that are both easy to remember and have an easily calculatable large entropy, it is advised to use the Diceware package. Generating Unbreakable Passwords Introduction
STRONG PASSWORD EXAMPLES LIST HOW TO
How to calculate entropy for both pre-quantum and post-quantum strength.This method is very fast for short and/or non-random passwords.

If weak passwords (passphrases) are used, they will be easily discovered by trying every possible character combination in reasonable time through brute-force attacks. Considering Moore's Law it could have only improved since. Warning: In 2013, nation-state adversaries were supposedly capable of one trillion guesses per second when attempting to brute-force passwords.
