At 05:04 PM 12/5/00, Ray Dillinger wrote:

>If someone wants to enter "sex" as a password, s/he deserves
>what s/he gets (although you may put up an "insecure passphrase"
>warning box for him/her).

The problem is that there's no objective way of knowing when a passphrase 
becomes 'insecure' since it depends on the amount of effort an attacker 
wants to spend trying to crack it. Going after Bill Gates' passphrase may 
yield more value than, say, my 12-year-old son's passphrase.

We need to identify the community we're trying to serve here. Alpha 
security geeks will probably do whatever is necessary to provide a high 
work factor, but most civilians aren't going to understand or care. When 
their weak phrases break down, they'll blame the system design anyway. And 
they'll be right -- we need to design for the lowest common denominator of 
the user community. I admit it's more fun and more reliable to design a 
system for use by smart, well trained people, but that's a relatively small 
customer base.

If the threat environment suggests we need a lot of entropy, we need to 
store it in a device and go with two factor authentication.

>And if the user keeps *ONE* secure passphrase in his/her head, the
>key it generates can be used to unscramble all of the random keys
>stored in an encrypted file.

So, they have to lug that file around anyway. That's two factor 
authentication. Why don't you store it on a smart card or something else 
portable? Then encode the file so that the effective keys will depend on a 
mixture of the file's contents and the passphrase. Ideally, there should be 
no way to decide off-line whether the attacker has hit the pass phrase or not.

>"My name is Ozymandias, king of kings:
>Look upon my works, ye Mighty, and despair!"

So the 'new dictonary' for pass phrase attacks contains all the chestnuts 
from all the school lit books in the country. I expect there's a lot of 
overlap in their choices. As Arnold pointed out, maybe 1.33 bits is an 
overestimation.

Does anyone have a citation as to the source of this 1.33 bits/letter 
estimate? In other words, who computed it and how? It's in Stinson's crypto 
book, but he didn't identify its source. I remember tripping over a 
citation for it in the past 6 months, but can't find it in my notes.

Rick.
[EMAIL PROTECTED]


Reply via email to