[4154] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: PGP compromised on Windows 9x?

daemon@ATHENA.MIT.EDU (Arnold G. Reinhold)
Sun Feb 7 23:39:32 1999

In-Reply-To: <199902042227.OAA02013@smb.research.att.com>
Date: Sun, 7 Feb 1999 22:22:26 -0500
To: "Steven M. Bellovin" <smb@smb.research.att.com>,
        Harald Hanche-Olsen <hanche@math.ntnu.no>
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Cc: cryptography@c2.net

At 2:27 PM -0800 2/4/99, Steven M. Bellovin wrote:
>In message <19990204185001V.hanche@math.ntnu.no>, Harald Hanche-Olsen writes:
>>As is pointed out in the referenced article, this macro virus only
>>steals the (encrypted) private keyring, and hence private keys are
>>still safe unless the attacker can break the encryption.  Which he can
>>easily do with a dictionary search, if the user has been overly
>>simplistic in her choice of pass phrase.
>
>Right.  There was a paper presented this morning at NDSS on just how bad
>folks are at picking Kerberos passphrases.  In other words, people haven't
>taken advantage of the freedom to use more than eight characters to
>improve their behavior.  The same likely applies to PGP.

I did a small survey of PGP users a few years back that also found weak
passphrases are the rule. My paper is at
http://world.std.com/~reinhold/passphrase.survey.asc

There is a lot of bad advice on passphrase picking out there. I put up the
Diceware page http://world.std.com/~reinhold/diceware.html  to provide a
prescriptive way for people to create strong passphrases that are
reasonable to remember.


Arnold Reinhold




home help back first fref pref prev next nref lref last post