why compression doesn't perfectly even out entropy

Mark Rogaski wendigo at gti.net
Wed Apr 17 19:35:28 PDT 1996


-----BEGIN PGP SIGNED MESSAGE-----

An entity claiming to be rick hoselton wrote:
: 
: Another example: What if I selected a nonsense passphrase, 
: "Dagmar shaved Howard's cocker spaniel"  Not great, but adequate for my needs.
: If, by some wild coindence, a book by that title became a best seller, I would 
: change my passphrase.  A cryptanalyst who knew that was my feeling could
: simplify 
: his cracking by not bothering to search for best selling book titles.  On
: the other 
: hand, a cryptanalyst who was not so convinced of my paranoia, and who DID check 
: book titles, would not find my passphrase.  I assume that BOTH philosophies 
: would be used in a serious attack.  When I do the math, it says that, assuming 
: BOTH types of attack are done, it is better to have a passphrase that is not 
: the title of a book. 

By the same token, if an admin runs crack on /etc/passwd to weed out poor
passwords isn't going to be faulted for reducing the key space for user's
passwords. The question is, how much of the keyspace should be eliminated
as "obviously a poor choice"?

Also, how much of this falls under "security through obscurity"?  If an
attacker knows what you omit .. his/her job is a bit easier.

Is it possible to find a percentage of the key space to eliminate that
will optimize security assuming that the attacker will try the easy
stuff first (and is it possible to quantify "easy stuff")?

- -- 
  Mark Rogaski    | Why read when you can just sit and |      Member
  System Admin    |         stare at things?           | Programmers Local
  GTI GlobalNet   | Any expressed opinions are my own  |     # 0xfffe
wendigo at pobox.com | unless they can get me in trouble. |     APL-CPIO


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMXVWfQ0HmAyu61cJAQHltwP8Coe0i13a7NtFRYlCBdt1AEVEbz9jQhLp
6WPqGc80ETo8knHZAPVFP6ae1MmHYfbWhOY0y7I/Cv4kN8Smmu6mwIeYsuPRjCl9
ODK6qDUX1CcQX74t4ZvkTL2Umsnvwchvl1wHnaINGtud9C6nVREf34880vmJsYrl
5vsRJ1wo5Ng=
=zY9A
-----END PGP SIGNATURE-----






More information about the cypherpunks-legacy mailing list