1
0
Fork 0
mirror of https://git.sr.ht/~seirdy/seirdy.one synced 2024-11-23 21:02:09 +00:00

Link to MOAC in blog post

This commit is contained in:
Rohan Kumar 2021-12-01 22:01:21 -08:00
parent fb36ad9587
commit 385a18bbd9
No known key found for this signature in database
GPG key ID: 1E892DB2A5F84479
2 changed files with 12 additions and 6 deletions

View file

@ -4,6 +4,10 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does.
Update: I implemented the ideas in this blog post (and more) in a program/library:
=> https://sr.ht/~seirdy/MOAC/ MOAC: Analyze and generate passwords using physical limits of computation
## Introduction
I realize that advice on password strength can get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today might be weak in the future. How long should a password be in order for it to be physically impossible to brute-force, ever?

View file

@ -1,7 +1,6 @@
---
date: "2021-01-12T00:03:10-08:00"
description: Using thermal physics, cosmology, and computer science to calculate password
vulnerability to the biggest possible brute-force attack.
description: Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
outputs:
- html
- gemtext
@ -17,6 +16,8 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
_Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does._
_Update: I implemented the ideas in this blog post (and more) in a program/library, [MOAC](https://sr.ht/~seirdy/MOAC/)_
Introduction
------------
@ -260,3 +261,4 @@ While I was struggling to come up with a good expression for the minimum energy
[^6]: Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.