Length for AES256 symmetric encryption passphrase?
Barnet Wagman
bw at norbl.com
Fri Apr 4 20:35:20 CEST 2014
To be clear, I want to use gnupgp to do symmetric encryption using
AES256. As I understand it, the 'gpg -symmetric ...' command converts a
pass phrase into a key, a 32 byte key in the case of AES256. I /assume/
that this conversion is 'deterministic' since as far as I can tell, the
'gpg -symmetric ...' does not store the key it generates. Correct me if
I'm wrong.
I am trying to decide how long a pass phrase to use. I have not decided
how to generate the pass phrase. Assume that it is pseudo-randomly
chosen from the an english language character set.
On 4/4/14, 10:10 AM, Robert J. Hansen wrote:
>> Interesting math. However, I believe the OP mentioned they're
>> generating
>> the password and storing so human readable, i.e. English, isn't an
>> issue.
>> What would be the recommended length for completely random characters
>> generated, for example, by a password manager such as keepassx?
>
> Your questions are not clear enough to be answered.
>
> "What would the recommended length for completely random characters
> generated, for example, by a password manager such as keepassx? If
> one were using the password as the symmetric key in libgcrypt? Or
> perhaps even just using openssl tools?"
>
> 1. Well, which password managers? Just because a character is
> completely random tells me nothing about how much entropy is contained
> in each symbol. "TTHTHHTTH" is a completely random sequence
> (generated it just now by flipping a fair coin), but it only has one
> bit of entropy per symbol. "fBTvC" is a completely non-random
> sequence, but it has a lot more entropy per symbol. Without knowing
> how a random password is generated I can't answer this.
>
> 2. Recommended for what purpose? 256 bits of entropy is wild
> overkill for almost all purposes. 128 bits of entropy is generally
> speaking plenty.
>
> 3. Which toolkit? libgcrypt and openssl are two completely different
> toolkits that work in completely different ways, and an answer
> appropriate for one might not be appropriate for the other.
>
> 4. What is it you really want to know? You already know: AES depends
> on having a 32-bit key which can support up to 256 bits of entropy.
> You've been told two good metrics for estimating entropy in a
> passphrase: 1.5 bits per glyph of English text, 5 bits per glyph of
> base-64ed random data.
>
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20140404/b9eaf137/attachment.html>
More information about the Gnupg-users
mailing list