PGP problems

Brian Morrison pmmail@rpglink.com
Sun, 06 Aug 2000 08:17:49 +0100 (BST)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sat, 05 Aug 2000 14:39:07 -0300 (ADT), Trevor Smith wrote:

>On Fri, 04 Aug 2000 18:12:21 +0100, Brian Morrison wrote:
>
>>and you really need a long pass phrase to get the equivalent number of
>>bits of entropy as the 128 bit cypher. I think that 80 characters or
>>more is needed to ensure this, so think about your pass phrase length!
>
>Wow, really? Where did you get this info? I always thought my
>passphrase was pretty long (it's a pain to type it!) but maybe it's
>not long enough...
>
>I have read that much shorter passphrases are quite sufficient for
>real world protection. I've seen sites that offer methods for picking
>passphrases which suggest that 4 or 5 random small words are
>sufficient.

It came from a PGP FAQ written by Sam Simpson. I forget exactly where
to find it now, but if you search on Scramdisk you should be able to
get there, the site is all related to encryption and cryptology.


- -- 

Brian Morrison                                  bdm@fenrir.org.uk

 "Almost noon, and she had yet to go the launderette in Concreton to 
 thaw out chickens in the spin-drier..."

PGP Public Key Fingerprint= C7 12 B9 54 00 0F 51 F6  37 9B 18 D1 E1 61 14 0B

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i OS/2 for non-commercial use
Comment: This comment _is_ plain text
Charset: cp850

iQA/AwUBOY0RHfQTY1HeMuXFEQI/6ACg1RSivzW7Y4GHBzH52jxEZgYcl+0AnjHP
6FOuHk4VBF31YurEf7jzP70L
=Hzl9
-----END PGP SIGNATURE-----