mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-10 00:12:09 +00:00
Link to MOAC in blog post
This commit is contained in:
parent
fb36ad9587
commit
385a18bbd9
2 changed files with 12 additions and 6 deletions
|
@ -4,6 +4,10 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
|
||||||
|
|
||||||
Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does.
|
Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does.
|
||||||
|
|
||||||
|
Update: I implemented the ideas in this blog post (and more) in a program/library:
|
||||||
|
|
||||||
|
=> https://sr.ht/~seirdy/MOAC/ MOAC: Analyze and generate passwords using physical limits of computation
|
||||||
|
|
||||||
## Introduction
|
## Introduction
|
||||||
|
|
||||||
I realize that advice on password strength can get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today might be weak in the future. How long should a password be in order for it to be physically impossible to brute-force, ever?
|
I realize that advice on password strength can get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today might be weak in the future. How long should a password be in order for it to be physically impossible to brute-force, ever?
|
||||||
|
|
|
@ -1,7 +1,6 @@
|
||||||
---
|
---
|
||||||
date: "2021-01-12T00:03:10-08:00"
|
date: "2021-01-12T00:03:10-08:00"
|
||||||
description: Using thermal physics, cosmology, and computer science to calculate password
|
description: Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
|
||||||
vulnerability to the biggest possible brute-force attack.
|
|
||||||
outputs:
|
outputs:
|
||||||
- html
|
- html
|
||||||
- gemtext
|
- gemtext
|
||||||
|
@ -17,6 +16,8 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
|
||||||
|
|
||||||
_Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does._
|
_Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does._
|
||||||
|
|
||||||
|
_Update: I implemented the ideas in this blog post (and more) in a program/library, [MOAC](https://sr.ht/~seirdy/MOAC/)_
|
||||||
|
|
||||||
Introduction
|
Introduction
|
||||||
------------
|
------------
|
||||||
|
|
||||||
|
@ -260,3 +261,4 @@ While I was struggling to come up with a good expression for the minimum energy
|
||||||
|
|
||||||
[^6]: Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
|
[^6]: Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue