R
R
Romi2021-05-13 09:31:20
Cryptography
Romi, 2021-05-13 09:31:20

How many bits of a password is considered complex enough not to be broken by CIA/FSB brute force?

I'll start with a quote from the answer:


When talking about the length of the key in N bits, they usually mean that the key can have 2**N different values. Accordingly, in your case, for a phrase of 100 different words with a length of 10 words, we have 100 ** 10 options. To express this in bits, you need to take the binary logarithm from it.
You get log2 100**10 ≈ 67 bits.


Is 67 bits too much or too little? :)

How many bits should be in the password so that it is guaranteed not to be broken through the API (or even through a socket connection) by any special services in the world? ))

And so that with a margin of 5 years ahead))

Please do not write answers like "100500 million bits")) I mean - minimally sufficient - both words are key))

Thank you!

Answer the question

In order to leave comments, you need to log in

3 answer(s)
C
cicatrix, 2021-05-13
@romicohen

67 bits is not enough.
100-128 bits is enough for the current computing power.
256 bits, which are used in most modern cryptosystems, are overkill by a huge margin.
But you need to understand that this is all a theory, where there is an ideal error-free implementation of the cryptoalgorithm and a truly unique, unknown key is used.
It should also be taken into account that the algorithm itself can be vulnerable to quantum algorithms. Humans don't yet have quantum computers capable of hacking RSA, for example, but they may be in the future. Asymmetric algorithms are more vulnerable, symmetric ones will be quite stable even after the quantum revolution.
A once hacked database of some online store makes ALL passwords that were used by its users vulnerable, even if they are good passwords, because at first they will not use brute force, but a dictionary attack, which will already contain these passwords.
The idiot user is a classic attack vector. Social engineering, keyloggers, malware are quite working tools.
Well, and most importantly - a universal hacking method - thermorectal cryptanalysis, which has almost 100% efficiency.
The FSB will act exactly as shown in the picture from XKCD:
538_v1.png

R
Romi, 2021-05-13
@romicohen

Googled this:

To ensure cryptographic strength for the needs of the Federal Government today requires at least 112 bits (for example, to encrypt or sign data).
To get 128 bits of entropy using uppercase and lowercase letters, as well as numbers, you need a password 22 characters long ((5.95 * 22 = 131 bits).

Is this a valid answer?

C
CityCat4, 2021-05-13
@CityCat4

How many bits must be in the password so that it is guaranteed not to be broken ... by any intelligence agencies in the world?

Not at all. The special services of the world do not work with technology :) The special services of the world work with people. Have you ever had anything to do with the most banal investigator? No, for sure. That is why you are convinced that at the moment when the special services begin to deal with you, some laws will be observed against you :D

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question