[4154] in cryptography@c2.net mail archive
Re: PGP compromised on Windows 9x?
daemon@ATHENA.MIT.EDU (Arnold G. Reinhold)
Sun Feb 7 23:39:32 1999
In-Reply-To: <199902042227.OAA02013@smb.research.att.com>
Date: Sun, 7 Feb 1999 22:22:26 -0500
To: "Steven M. Bellovin" <smb@smb.research.att.com>,
Harald Hanche-Olsen <hanche@math.ntnu.no>
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Cc: cryptography@c2.net
At 2:27 PM -0800 2/4/99, Steven M. Bellovin wrote:
>In message <19990204185001V.hanche@math.ntnu.no>, Harald Hanche-Olsen writes:
>>As is pointed out in the referenced article, this macro virus only
>>steals the (encrypted) private keyring, and hence private keys are
>>still safe unless the attacker can break the encryption. Which he can
>>easily do with a dictionary search, if the user has been overly
>>simplistic in her choice of pass phrase.
>
>Right. There was a paper presented this morning at NDSS on just how bad
>folks are at picking Kerberos passphrases. In other words, people haven't
>taken advantage of the freedom to use more than eight characters to
>improve their behavior. The same likely applies to PGP.
I did a small survey of PGP users a few years back that also found weak
passphrases are the rule. My paper is at
http://world.std.com/~reinhold/passphrase.survey.asc
There is a lot of bad advice on passphrase picking out there. I put up the
Diceware page http://world.std.com/~reinhold/diceware.html to provide a
prescriptive way for people to create strong passphrases that are
reasonable to remember.
Arnold Reinhold