mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-23 21:02:09 +00:00
Link to MOAC in blog post
This commit is contained in:
parent
fb36ad9587
commit
385a18bbd9
2 changed files with 12 additions and 6 deletions
|
@ -4,6 +4,10 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
|
|||
|
||||
Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does.
|
||||
|
||||
Update: I implemented the ideas in this blog post (and more) in a program/library:
|
||||
|
||||
=> https://sr.ht/~seirdy/MOAC/ MOAC: Analyze and generate passwords using physical limits of computation
|
||||
|
||||
## Introduction
|
||||
|
||||
I realize that advice on password strength can get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today might be weak in the future. How long should a password be in order for it to be physically impossible to brute-force, ever?
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
---
|
||||
date: "2021-01-12T00:03:10-08:00"
|
||||
description: Using thermal physics, cosmology, and computer science to calculate password
|
||||
vulnerability to the biggest possible brute-force attack.
|
||||
description: Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
|
||||
outputs:
|
||||
- html
|
||||
- gemtext
|
||||
|
@ -17,6 +16,8 @@ This is a tale of the intersection between thermal physics, cosmology, and a tin
|
|||
|
||||
_Note: this post contains equations. Since none of the equations were long or complex, I decided to just write them out in code blocks instead of using images or MathML the way Wikipedia does._
|
||||
|
||||
_Update: I implemented the ideas in this blog post (and more) in a program/library, [MOAC](https://sr.ht/~seirdy/MOAC/)_
|
||||
|
||||
Introduction
|
||||
------------
|
||||
|
||||
|
@ -260,3 +261,4 @@ While I was struggling to come up with a good expression for the minimum energy
|
|||
|
||||
[^6]: Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
|
||||
|
||||
|
||||
|
|
Loading…
Reference in a new issue