Thanks Sebastian for the reference; I hunted around the Internet to try
to find references for current 'best' cracking speed for luks2 without
much success. Alex's results are suddenly the best I've seen.

200 years sounds like a long time in isolation but that's also just
spinning up 2000 cloud instances for a month: Expensive but not
impossible. Furthermore, many of these attacks parallelize across
multiple targets *very* cheaply -- I do not know if luks2 bruteforcing
is the same -- but it's quite often only slightly more expensive to
search for hundreds or millions at the same time.

That's why I thought the 53 bits Madar reports or the 64 bits that I
thought I saw via code inspection didn't feel like they were long
enough.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928860

Title:
  Recovery key is low-entropy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1928860/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to