On 26.08.20 21:19, Mark wrote:
Could you elaborate a bit more on the new and improved Master Password
security

It's a "password based encryption" (PBE) mechanism.

The password chosen by the user is used with a PBE algorithm to encrypt information (such as keys and individual passwords, and in our scenario the automatic passphrase that protects the OpenPGP secret keys).

An attacker, or a "password recovery program" attempts to find the correct password using brute force, either trying all possible passwords, or trying words from a dictionary.

The more time it takes to try one candidate password, the more time it takes for a brute force search approach to succeed.

When performing PBE, one input is the password itself, and another variable is the "iteration count", which defines how often a calculation is repeated.

The higher the iteration count, the more time it takes to encrypt or decrypt the data. The iteration count can be chosen at the time data is encrypted.

Unfortunately, old versions of NSS/Firefox/Thunderbird always used a iteration count of one (1) for the Master Password.

Consequently, a brute force attack could try many candidate passwords in a very short amount of time.

With NSS 3.48 and newer, as used by Thunderbird 78, the iteration count has been changed to 10000.

The longer the password chosen by the user, the more combinations need to be tried by an attacker to find it.

Let's say the chosen password had a complexity that previously allowed it to be found in 1 hour by a fast computer.

With the newer software (assuming you set/updated the password with the new software version), it would take 10000 hours to find the same password, or almost 14 months.

Kai


_______________________________________________
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to