• El Barto@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    2 years ago

    Got a source on that?

    Edit: plus brute forcing is just one scenario. I think the xkcd comic refers to using passwords in online services, and those usually have some sort of rate limiting.

    • ammonium@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 years ago

      https://thesecurityfactory.be/password-cracking-speed/

      8 character a-zA-Z is 45 bits of entropy (log2(56^8), about the same as the XKCD password if you take from a 2048 word list. That’s crackable in a minute on AWS.

      Password hashes get frequently stolen, don’t rely on rate limiting if it’s something you really care about.

      Here are the dice ware recommendations on the number of words: https://theworld.com/~reinhold/dicewarefaq.html#howlong

      • El Barto@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        2 years ago

        Sure, but the average English speaker knows way more than 2048 words. Let’s not forget about case sensitivity, made-up or “inside joke” words, names, and specific industry vocabulary.

        • ammonium@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 years ago

          Even if you take four words of a 30000 word list (quick Google says that’s the number of words an average person knows), that’s still less bits of entropy than a 5 word diceware password (7776 word list). People are also really bad at randomness, so your own string of random words is likely going to be much worse.