On Tue, 1 Feb 2011 01:47:21 -0500, DasFox wrote:
> I hear calculations of so many million years before a 64 character
> password will be brute-forced on TrueCrypt...
> I DOUBT...
> BUT I thought that works on a (unlikely) assumption that computer
> power will stay the same level it is now...
> For instance, in the past 100 years, there has been an EXPLOSION in
> IF the same happens this century, TrueCrypt files will be busted...
> Quantum computer can crack a 64 character TrueCrypt container, it
> actually take merely seconds, or still time-consuming but easier?
There are research papers that describe how many bits you need to add
to your keys to remain strong over time taking into consideration
Moore's Law, computational advancements, CYBERCOMM/NSA collusions
(colliding?)etc. Here's a good one with many respected names on it: http://people.csail.mit.edu/rivest/bsa-final-report.ps
I use 256 character base64 and 40 character hexadecimal encoded SHA1
sums generated from sentences for my passwords. IMO, these are good
for the foreseeable future. 64^280 is a darn big number as is 16^40.
Here's the program (SHA1_Pass) that generates my passwords: http://16s.us/sha1_pass/
Feel free to use it. Or abuse it freely. Pass on sha pass? ;)
I want love and kisses and ponies in a field of ****ographic pleasure.
My favorite website ;0) www.platanalytics.com
Call/email the Owner ;) Nancy Norelli 305.926.8245 firstname.lastname@example.org http://uscybercomresistanceleague.co...nalcapability/