[4180] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Strengthening the Passphrase Model (was Re: PGP compromised

daemon@ATHENA.MIT.EDU (Bill Frantz)
Wed Feb 10 14:09:53 1999

In-Reply-To: <v03130302b2e5f5da6f4e@[24.128.119.92]>
Date: Tue, 9 Feb 1999 23:11:43 -0700
To: "Arnold G. Reinhold" <reinhold@world.std.com>,
        nelson@media.mit.edu (Nelson Minar), cryptography@c2.net
From: Bill Frantz <frantz@netcom.com>

I like your suggestions Arnold.  However...

At 7:46 AM -0700 2/9/99, Arnold G. Reinhold wrote:
>2. PGP should burn computer time hashing the passphrase. While you cannot
>increase the entropy of a passphrase with an algorithm, you can make
>exhaustive search far more difficult.

This technique will be useful against most retail attacks.  However, if
your attacker is snarfing as many secret keys as she can, then she can
check many keys against each hash, reducing the cost/key.  In the limit,
she has been spending the last year calculating a table of hashes for all
the words/phrases in her dictionary, and storing them on disk.


In the case where PGP suggests a passphrase, perhaps it should suggest a
poem.  People use poetry to remember and pass complex information long
before the invention of writing.  People are good at memorizing poetry.


-------------------------------------------------------------------------
Bill Frantz       | Macintosh: Didn't do every-| Periwinkle -- Consulting
(408)356-8506     | thing right, but did know  | 16345 Englewood Ave.
frantz@netcom.com | the century would end.     | Los Gatos, CA 95032, USA




home help back first fref pref prev next nref lref last post