diff --git a/content/posts/password-strength.gmi b/content/posts/password-strength.gmi index 5e2ceae..eddcd73 100644 --- a/content/posts/password-strength.gmi +++ b/content/posts/password-strength.gmi @@ -4,6 +4,10 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does. +Update: I implemented the ideas in this blog post (and more) in a program/library: + +=> https://sr.ht/~seirdy/MOAC/ MOAC: Analyze and generate passwords using physical limits of computation + ## Introduction I realize that advice on password strength can get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today might be weak in the future. How long should a password be in order for it to be physically impossible to brute-force, ever? diff --git a/content/posts/password-strength.md b/content/posts/password-strength.md index 6a9c719..371489c 100644 --- a/content/posts/password-strength.md +++ b/content/posts/password-strength.md @@ -1,13 +1,12 @@ --- date: "2021-01-12T00:03:10-08:00" -description: Using thermal physics, cosmology, and computer science to calculate password - vulnerability to the biggest possible brute-force attack. +description: Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack. outputs: - - html - - gemtext + - html + - gemtext tags: - - security - - fun + - security + - fun title: Becoming physically immune to brute-force attacks footnote_heading: References and endnotes --- @@ -17,6 +16,8 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin _Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does._ +_Update: I implemented the ideas in this blog post (and more) in a program/library, [MOAC](https://sr.ht/~seirdy/MOAC/)_ + Introduction ------------ @@ -260,3 +261,4 @@ While I was struggling to come up with a good expression for the minimum energy [^6]: Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996. +