Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] password strength



> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of Kent Borg
> 
> Being reversible is key, it means no entropy
> was lost.

While it's true that being reversible means no entropy was lost, it's definitely not a requirement.  For example, one of the requirements for a one-way hashing algorithm such as SHA to be considered unbroken and still secure, is that the result of the hash be deterministic, yet indistinguishable from a random mapping from the input set to the output set, for any combination of different inputs.  This means, you could take your input entropy, apply a non-reversible crypto hash to it, and use the result to select your random words.  No entropy is lost, but it's not reversible.

Case and point:  If you were reading from /dev/random, that is true entropy.  But you stated you're reading from /dev/urandom, which is not true entropy.  It's cryptographic strength pseudo-random, which is derived using a lot of techniques, primarily revolving around crypto hashing.  The random data that you're using for input is in fact, the output of crypto hashing, which was used to mask and stretch the true entropy gathered from your hardware entropy sources.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org