At 2:27 PM -0800 2/4/99, Steven M. Bellovin wrote:
>In message <[EMAIL PROTECTED]>, Harald Hanche-Olsen writes:
>>As is pointed out in the referenced article, this macro virus only
>>steals the (encrypted) private keyring, and hence private keys are
>>still safe unless the attacker can break the encryption.  Which he can
>>easily do with a dictionary search, if the user has been overly
>>simplistic in her choice of pass phrase.
>
>Right.  There was a paper presented this morning at NDSS on just how bad
>folks are at picking Kerberos passphrases.  In other words, people haven't
>taken advantage of the freedom to use more than eight characters to
>improve their behavior.  The same likely applies to PGP.

I did a small survey of PGP users a few years back that also found weak
passphrases are the rule. My paper is at
http://world.std.com/~reinhold/passphrase.survey.asc

There is a lot of bad advice on passphrase picking out there. I put up the
Diceware page http://world.std.com/~reinhold/diceware.html  to provide a
prescriptive way for people to create strong passphrases that are
reasonable to remember.


Arnold Reinhold


Reply via email to