Bitcoin Forum
April 24, 2024, 11:49:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Passphrase with seed  (Read 360 times)
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18507


View Profile
May 28, 2020, 11:57:41 AM
Merited by ABCbits (1)
 #21

Never forget this: https://xkcd.com/936/
This comic can be a bit misleading if people don't understand the reasoning behind it.

The initial password "Tr0ub4dor&3" only has 28 bits of entropy if the attacker knows all the things pointed out in the first panel - you are using a base word, with common substitutions, followed by a single punctuation and a single number, etc. If the attacker doesn't know that and is just trying to bruteforce your password, then it actually has 9511 combinations which is 72 bits of entropy and astronomically more secure than 28 bits.

If the attacker tries a dictionary attack on the second password, then it has an entropy in the range of 170,0004, which is 69.5 bits, so would be marginally less secure than the first password.

If you use a truly random password or passphrase, preferably one generated for you in a secure method and not one you pick yourself, then you can end up with far greater security. 15 random characters has an entropy of 98 bits, which even if someone can try 1 quadrillion possibilities a second, is going to take over 14 million years to crack.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!