public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Aaron Lehmann <aaronl@vitelus.com>
To: Rob Landley <landley@trommello.org>
Cc: Jeff Garzik <jgarzik@mandrakesoft.com>,
	Herbert Xu <herbert@gondor.apana.org.au>,
	linux-kernel@vger.kernel.org
Subject: Re: ssh primer (was Re: pull vs push (was Re: [bk patch] Make cardbus compile in -pre4))
Date: Wed, 13 Feb 2002 22:57:39 -0800	[thread overview]
Message-ID: <20020214065739.GA26224@vitelus.com> (raw)
In-Reply-To: <E16ZhzF-0000ST-00@gondolin.me.apana.org.au> <3C65CBDE.A9B60BBD@mandrakesoft.com> <20020213171306.GA15924@vitelus.com> <20020214002205.VBHJ21911.femail34.sdc1.sfba.home.com@there>
In-Reply-To: <20020214002205.VBHJ21911.femail34.sdc1.sfba.home.com@there>

On Wed, Feb 13, 2002 at 07:22:57PM -0500, Rob Landley wrote:
> In terms of brute forcing the key, the passphrase adds a fairly trivial 
> number of bits to the key.  It's not "far" easer, an 8 character mixed case 
> nonsense password with numbers and punctuation mixed in is still less than 6 
> bits per character, or at best an extra 48 bits.  You can select a 1024 bit 
> key if you want to be really really paranoid.

I agree that it isn't worth it.

I assume that Jeff didn't understand the principles behind public key
cryptography that SSH uses which keep communications secure unless the
private key is compromised (and the private key should never leave
client machine). When you have a passphrase, you encrypt this private
key with a hash of it. Not having a passphrase removes this layer of
security, but if you include the passphrase in a script for automatic
use you're undoing any advantage that a passphrase gives you in the
first place.

In short, to compromise a private key without access to that key
(which presumably only you would have if the key was on your system,
and you must assume that if someone could access your private key they
could access any passphrase you were storing in a script to facilitate
automatic use of it), you'd have to either have unheard of amounts of
computational power and a few millenia on your hands, or come across a
mathematical breakthrough. I certainly hope that Mr. Garzik has not
broken public key cryptography!

Note that you can't compare public key bits to passphrase bits (which
are more like symmetric key bits). You probably know this.

> Not that it's worth it.  Keys get exponentially more difficult to brute force 
> as the key length increases.  I read part of a book a long time ago (might 
> have been called "applied cryptography") that figured out that if you could 
> build a perfectly efficient computer that could do 1 bit's worth of 
> calculation with the the amount of energy in the minimal electron state 
> transition in a hydrogen atom, and you built a dyson sphere around the sun to 
> capture its entire energy output for the however many billion years its 
> expected to last, you wouldn't even brute-force exhaust a relatively small 
> keyspace (128 bits?  256 bits?  Something like that).

That was Applied Cryptography. I believe he said that the energy
output of a supernova was insufficient to cycle a counter through
about 2^190, based on accepted thermodynamic principles and data. Of
course, this makes brute force of something like a 256 bit symmetric
key completely infeasible and bounded by physical law. Not that 128
bits is very shabby, but it only takes a few billion years of all the
current computing power on earth to brute force something like that.

  reply	other threads:[~2002-02-14  6:58 UTC|newest]

Thread overview: 64+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2002-02-09  2:25 [bk patch] Make cardbus compile in -pre4 Patrick Mochel
2002-02-09  3:39 ` Andreas Dilger
2002-02-09  4:02   ` Jeff Garzik
2002-02-09  7:29     ` Andreas Dilger
2002-02-09  7:41       ` Larry McVoy
2002-02-10  2:39       ` Jeff Garzik
2002-02-10  3:52       ` Linus Torvalds
2002-02-10  7:47       ` Andreas Dilger
2002-02-10 20:57         ` Linus Torvalds
2002-02-11 18:38           ` Andreas Dilger
2002-02-09  5:12   ` Larry McVoy
2002-02-09  5:32     ` Andrew Morton
2002-02-09  9:36       ` Rob Landley
2002-02-09  9:57         ` Momchil Velikov
2002-02-09 10:01           ` Alexander Viro
2002-02-09 18:09             ` Rob Landley
2002-02-09 15:08           ` Daniel Phillips
2002-02-10  4:07             ` Linus Torvalds
2002-02-09 10:14     ` David Lang
2002-02-09 15:54       ` Larry McVoy
2002-02-09 16:50         ` Tom Rini
2002-02-09 17:05           ` Larry McVoy
2002-02-09 21:01             ` David Lang
2002-02-09 21:41               ` Larry McVoy
2002-02-09 23:36                 ` Andreas Dilger
2002-02-09 23:45                   ` Tom Rini
2002-02-10  0:42                     ` Andreas Dilger
2002-02-09 23:52                   ` Larry McVoy
2002-02-10  4:13                     ` Linus Torvalds
2002-02-10 18:02                     ` Tom Rini
2002-02-10  5:25                 ` William Stearns
2002-02-11 17:30                   ` Padraig Brady
2002-02-13 11:59                     ` Padraig Brady
2002-02-09  9:27   ` pull vs push (was Re: [bk patch] Make cardbus compile in -pre4) Rob Landley
2002-02-09 10:08     ` Andreas Dilger
2002-02-09 18:12       ` Stelian Pop
2002-02-09 20:59         ` Linus Torvalds
2002-02-09 20:12           ` Stelian Pop
2002-02-09 20:26             ` Larry McVoy
2002-02-09 20:51               ` Stelian Pop
2002-02-09 23:45                 ` Jeff Garzik
2002-02-09 23:49                 ` Larry McVoy
2002-02-09 20:57               ` Pau Aliagas
2002-02-09 21:07                 ` David Lang
2002-02-09 21:13                   ` Pau Aliagas
2002-02-09 21:45               ` Rob Landley
2002-02-10  0:19               ` Andreas Dilger
2002-02-10  0:36               ` Herbert Xu
2002-02-10  0:54                 ` ssh primer (was Re: pull vs push (was Re: [bk patch] Make cardbus compile in -pre4)) Jeff Garzik
2002-02-10  0:59                   ` Herbert Xu
2002-02-10  1:24                     ` Jeff Garzik
2002-02-10  8:13                       ` Herbert Xu
2002-02-13 17:13                       ` Aaron Lehmann
2002-02-14  0:22                         ` Rob Landley
2002-02-14  6:57                           ` Aaron Lehmann [this message]
2002-02-14 11:00                           ` Harald Arnesen
2002-02-10  0:59                   ` Ben Pfaff
2002-02-10  1:14                   ` David Lang
2002-02-10  1:22                     ` ssh primer (was Re: pull vs push (was Re: [bk patch] Make cardbuscompile " Jeff Garzik
2002-02-10  2:46               ` pull vs push (was Re: [bk patch] Make cardbus compile in -pre4) Alan Cox
2002-02-11 11:51     ` Pavel Machek
2002-02-11 18:42       ` John Alvord
2002-02-09 11:44 ` [bk patch] Make cardbus compile in -pre4 Peter Osterlund
  -- strict thread matches above, loose matches on Subject: below --
2002-02-14 13:50 ssh primer (was Re: pull vs push (was Re: [bk patch] Make cardbus compile in -pre4)) Jesse Pollard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20020214065739.GA26224@vitelus.com \
    --to=aaronl@vitelus.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=jgarzik@mandrakesoft.com \
    --cc=landley@trommello.org \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox