Bitcoin Forum
April 27, 2024, 04:34:00 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: How long, strong should a bitcoin wallet pass-phrase be?  (Read 1821 times)
btchris
Hero Member
*****
Offline Offline

Activity: 672
Merit: 504

a.k.a. gurnec on GitHub


View Profile WWW
April 21, 2015, 03:49:31 PM
 #21

As long as we're talking about favorite strength checkers, here's mine: https://dl.dropboxusercontent.com/u/209/zxcvbn/test/index.html

It's the open source javascript-only checker used by Dropbox. There's a description of its strengths and weaknesses here: https://blogs.dropbox.com/tech/2012/04/zxcvbn-realistic-password-strength-estimation/

i don't know who is right, but with "my name is" the first that i posted say 3 hours, instead your say 1 year approximately

also it say crack time 35M seconds which is about 1 year and then crack time display 3 years? are those two not the same thing?

I don't understand.... when I try "my name is" in the one I linked above (zxcvbn), I get back 5 hours. More on point, it turns out the first one (my1login.com) is using the same underlying zxcvbn javascript library (but maybe a different version of it).

Regardless, the answer to "who is right" is: nobody. As the article I linked above discusses, estimating crack times of a password is very hard, and often attackers have access to resources (e.g. gigantic n-gram tables) which are just too impractical for javascript checkers like these to include.
1714192440
Hero Member
*
Offline Offline

Posts: 1714192440

View Profile Personal Message (Offline)

Ignore
1714192440
Reply with quote  #2

1714192440
Report to moderator
The trust scores you see are subjective; they will change depending on who you have in your trust list.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714192440
Hero Member
*
Offline Offline

Posts: 1714192440

View Profile Personal Message (Offline)

Ignore
1714192440
Reply with quote  #2

1714192440
Report to moderator
1714192440
Hero Member
*
Offline Offline

Posts: 1714192440

View Profile Personal Message (Offline)

Ignore
1714192440
Reply with quote  #2

1714192440
Report to moderator
1714192440
Hero Member
*
Offline Offline

Posts: 1714192440

View Profile Personal Message (Offline)

Ignore
1714192440
Reply with quote  #2

1714192440
Report to moderator
Bitcoin Explorer
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500



View Profile
April 21, 2015, 04:01:52 PM
 #22

Have a look at this, its quite good, but you should consider skipping substantial parts.
You should have all types of characters, which are:
1. Upper case
2. Lower case
3. Numbers
4. Special characters

Moreover, you should make it quite long

virtualx
Hero Member
*****
Offline Offline

Activity: 672
Merit: 507


LOTEO


View Profile
April 21, 2015, 04:20:45 PM
 #23

10 characters, 20? 25?

Letters, numbers, special characters?

What if a user used only letters and numbers for example?

Say a hacker gets a wallet.dat with the pass-phrase helloworld, would it break in seconds? Now what if it is helloworld!~~ or HelloWorld!~~!

Are all these "weak" pass-phrases?

What if the wallet is than also backed up online which is known as a bad practice. What are the implications of that?

The search space increases with 20, 25. Bad guys use rainbow tables, dictionary attacks, brute force and everything they can find. Do not use phrases like 'helloworld' and little variations of that because they are compromised.  Expect bad guys to try 10.000 passwords or more per second. Some scientific papers on this issue:

All in a day's work: Password cracking for the rest of us
http://www.sintef.no/upload/IKT/9013/dayswork.pdf

Password Strength: An Empirical Analysis
http://www.eurecom.fr/~michiard/downloads/infocom10.pdf

Proactive Password Strength Analyzer Using Filters and Machine Learning Techniques
http://www.ijcaonline.org/volume7/number14/pxc3871788.pdf

The conclusion of one of the papers:
Quote
The password as an authentication mechanism is headed for obsolence, as the password lengths required to thwart rainbow table attacks are rapidly approaching unmanageable (or unrememberable) proportions.

Pick a password as random and long as a bitcoin address and you should be good for now.

If you have backed up online then at least one person other than you has access to your wallet file.

...loteo...
DIGITAL ERA LOTTERY


r

▄▄███████████▄▄
▄███████████████████▄
▄███████████████████████▄
▄██████████████████████████▄
▄██  ███████▌ ▐██████████████▄
▐██▌ ▐█▀  ▀█    ▐█▀   ▀██▀  ▀██▌
▐██  █▌ █▌ ██  ██▌ ██▌ █▌ █▌ ██▌
▐█▌ ▐█ ▐█ ▐█▌ ▐██  ▄▄▄██ ▐█ ▐██▌
▐█  ██▄  ▄██    █▄    ██▄  ▄███▌
▀████████████████████████████▀
▀██████████████████████████▀
▀███████████████████████▀
▀███████████████████▀
▀▀███████████▀▀
r

RPLAY NOWR
BE A MOON VISITOR!
[/center]
btchris
Hero Member
*****
Offline Offline

Activity: 672
Merit: 504

a.k.a. gurnec on GitHub


View Profile WWW
April 21, 2015, 05:59:07 PM
 #24

The conclusion of one of the papers:
Quote
The password as an authentication mechanism is headed for obsolence, as the password lengths required to thwart rainbow table attacks are rapidly approaching unmanageable (or unrememberable) proportions.

I admit I didn't read the referenced papers, however that conclusion is ridiculous. A simple 8+ byte random salt as already used by most* Bitcoin wallet software today easily defeats rainbow table attacks.

* Electrum (1.x and 2.x) and MultiBit HD are two notable exceptions of wallets which don't use salt.
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10504



View Profile
April 21, 2015, 06:06:45 PM
 #25

you can try this, to see how strong your password is

http://www.tomshardware.com/reviews/nvidia-geforce-gtx-980-970-maxwell,3941-12.html

usually something with 10-12 is good enough, just change the combination for every site

I have a feeling that's not the right link lol.

This might be of better use: https://howsecureismypassword.net/
this is a cool link, i bookmarked it for later references. and according to it the kind of passwords i use will require 8 quintillion years to be cracked by a desktop pc Cheesy

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
pedrog
Legendary
*
Offline Offline

Activity: 2786
Merit: 1031



View Profile
April 21, 2015, 07:20:56 PM
 #26

you can try this, to see how strong your password is

https://howsecureismypassword.net/

usually something with 10-12 is good enough, just change the combination for every site

The kind of passwords I use:

Quote
It would take a desktop PC about
285 nonillion years
to crack your password

"It should be pretty safe." Smiley

btchris
Hero Member
*****
Offline Offline

Activity: 672
Merit: 504

a.k.a. gurnec on GitHub


View Profile WWW
April 21, 2015, 07:27:43 PM
 #27

This might be of better use: https://howsecureismypassword.net/
this is a cool link, i bookmarked it for later references. and according to it the kind of passwords i use will require 8 quintillion years to be cracked by a desktop pc Cheesy

...and...


The kind of passwords I use:

Quote
It would take a desktop PC about
285 nonillion years
to crack your password

Don't put your faith in password estimators (read the rest of this thread), but if you insist on doing so, at least use one of the others mentioned here. howsecureismypassword.net isn't very good.

edit: actually, it's terrible. For the password "passwords99", it has an estimate of 1 year! zxcvbn estimates that same password at 16 seconds, much better.
pedrog
Legendary
*
Offline Offline

Activity: 2786
Merit: 1031



View Profile
April 21, 2015, 08:45:57 PM
 #28


The kind of passwords I use:

Quote
It would take a desktop PC about
285 nonillion years
to crack your password

Don't put your faith in password estimators (read the rest of this thread), but if you insist on doing so, at least use one of the others mentioned here. howsecureismypassword.net isn't very good.

edit: actually, it's terrible. For the password "passwords99", it has an estimate of 1 year! zxcvbn estimates that same password at 16 seconds, much better.

Checked with zxcvbn at https://dl.dropboxusercontent.com/u/209/zxcvbn/test/index.html

Quote
entropy:   123.233
crack time (seconds):   6.247157023824979e+32
crack time (display):   centuries
score from 0 to 4:   4
calculation time (ms):   23

Lorenzo
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile
April 22, 2015, 07:00:07 AM
 #29

12 letter is enough, if you combine both upper & lower case, numbers and special characters.
See my wifi password below:
U>u^ZT[jehlNz
this password might take years to brute force (even with super computers).
But the thing is you've to remember you password.
And change your password frequently.


~Rude Boy

It's certainly very safe today but it might not be so safe in the future. According to Amph's link, that password would take about 100 million years to crack using a desktop PC. Moore's law states that processing power doubles every 18 months so after 35 years, we would have ((2050-2015)*12)/18 = 23 doublings. 100 million years halved 23 times is 11 years. Now imagine a supercomputer that is 1,000 times more powerful than a desktop PC and your password could then be cracked in days.
sandy47bt
Sr. Member
****
Offline Offline

Activity: 308
Merit: 251


View Profile
April 22, 2015, 08:23:07 AM
 #30

More characters is more secure
It's even better if you add both lower & both case, number, special character Smiley

But, make sure there aren't any malicious software when encrypt your wallet.dat
That software might know your password
Mountain Jew
Member
**
Offline Offline

Activity: 60
Merit: 10


View Profile
April 22, 2015, 10:42:45 AM
 #31

It just needs to be strong not ridiculously long. The longer or more complex it is the more likely you'll forget it. Keeping your wallet safe and your over safety of your comp is most important. If you have a key logger it doesn't matter what your password is as they'll know it immediately.
ranochigo
Legendary
*
Offline Offline

Activity: 2954
Merit: 4165


View Profile
April 23, 2015, 01:46:30 PM
 #32

It just needs to be strong not ridiculously long. The longer or more complex it is the more likely you'll forget it. Keeping your wallet safe and your over safety of your comp is most important. If you have a key logger it doesn't matter what your password is as they'll know it immediately.
The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
funnycoin
Member
**
Offline Offline

Activity: 61
Merit: 10


View Profile
April 23, 2015, 04:30:00 PM
 #33


The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.


Can the keylogger get my password if I copy-and-paste it (no typing)?
Amph
Legendary
*
Offline Offline

Activity: 3206
Merit: 1069



View Profile
April 23, 2015, 04:35:27 PM
 #34


The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.


Can the keylogger get my password if I copy-and-paste it (no typing)?

yes, you need to use the keyboard of your pc(virtual keyboard) or typing it in a way to camouflage it(for example, your password is "my name is", instead you write my.name.is, then you delete those two dot, using the mouse)

use zemna antikeylogger free, it help a lot
randy8777
Legendary
*
Offline Offline

Activity: 896
Merit: 1000


View Profile
April 23, 2015, 04:43:59 PM
 #35


The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.


Can the keylogger get my password if I copy-and-paste it (no typing)?

yes, you need to use the keyboard of your pc(virtual keyboard) or typing it in a way to camouflage it(for example, your password is "my name is", instead you write my.name.is, then you delete those two dot, using the mouse)

use zemna antikeylogger free, it help a lot

so even if i generate a password with a pass generator it can still be seen by keyloggers? what if you disconnect your pc from the net while setting a password? is that better?
Muhammed Zakir
Hero Member
*****
Offline Offline

Activity: 560
Merit: 506


I prefer Zakir over Muhammed when mentioning me!


View Profile WWW
April 23, 2015, 04:49:17 PM
 #36

The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.

Can the keylogger get my password if I copy-and-paste it (no typing)?

yes, you need to use the keyboard of your pc(virtual keyboard) or typing it in a way to camouflage it(for example, your password is "my name is", instead you write my.name.is, then you delete those two dot, using the mouse)

use zemna antikeylogger free, it help a lot

You know there are mouse loggers, right?

so even if i generate a password with a pass generator it can still be seen by keyloggers? what if you disconnect your pc from the net while setting a password? is that better?

It depends on how your keylogger does the job. Some keyloggers try to upload/share instantly which can be prevented if you are offline but some save the log and upload/share as soon as you connect to internet which can't be resolved without removing them. Most of the keyloggers are infected in pirated OS copies.

Amph
Legendary
*
Offline Offline

Activity: 3206
Merit: 1069



View Profile
April 23, 2015, 04:57:27 PM
 #37

The keylogger will only get your password if you type it in. It won't know it immediately when infected. If you are using the passphrase to create a password, you would definitely need a random password that is seriously random. You can try to recite it to yourself three times per day or write it down on somewhere safe. If you are encrypting wallet keys, password will only protect you in the event of someone gaining control of your PC.

Can the keylogger get my password if I copy-and-paste it (no typing)?

yes, you need to use the keyboard of your pc(virtual keyboard) or typing it in a way to camouflage it(for example, your password is "my name is", instead you write my.name.is, then you delete those two dot, using the mouse)

use zemna antikeylogger free, it help a lot

You know there are mouse loggers, right?

yeah but it doesn't change that a logger memorize every characters you type, in sequence...., so their password in that case would be the first plus two "back space" and two underline of the mouse, resulting in 14 characters in total, versus the original 10

Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!