On Sat, Feb 01, 2014 at 12:00:30 -0200, André Nunes Batista wrote:
>
> Isn't it the case where the randomness of the key/password composes the
> overall quality of the crypto substitutions in such a way that 4096bit
> keys would necessarily provide better protection against cryptanalysis
> when compared to dozens of random, valid characters?

As far as I understand it, that is correct: A 4096bit key gives you
2^4096 possibilities, while a string of n random characters selected
from a set of, let's say, 50 members (letters, numbers, special
characters) has 50^n possible values. To break even with the 4096bit
key, such a random-string password would therefore have to have a length
of n=4096*ln(2)/ln(50) characters, which is about 725.

-- 
Regards,            |
          Florian   | http://www.florian-kulzer.eu


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20140201144138.GA15324@isar.localhost

Reply via email to