• El Barto@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Got a source on that?

      Edit: plus brute forcing is just one scenario. I think the xkcd comic refers to using passwords in online services, and those usually have some sort of rate limiting.

      • ammonium@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        https://thesecurityfactory.be/password-cracking-speed/

        8 character a-zA-Z is 45 bits of entropy (log2(56^8), about the same as the XKCD password if you take from a 2048 word list. That’s crackable in a minute on AWS.

        Password hashes get frequently stolen, don’t rely on rate limiting if it’s something you really care about.

        Here are the dice ware recommendations on the number of words: https://theworld.com/~reinhold/dicewarefaq.html#howlong

        • El Barto@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          Sure, but the average English speaker knows way more than 2048 words. Let’s not forget about case sensitivity, made-up or “inside joke” words, names, and specific industry vocabulary.

          • ammonium@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 year ago

            Even if you take four words of a 30000 word list (quick Google says that’s the number of words an average person knows), that’s still less bits of entropy than a 5 word diceware password (7776 word list). People are also really bad at randomness, so your own string of random words is likely going to be much worse.