Solved

Stupid Encryption question

Posted on 2001-06-07
10
153 Views
Last Modified: 2013-12-28
Hi,
   Not specifically a win98 question, more one from the cryptologically baffled...
   If your using one of the popular encryption programs found on the web, such as pgp, the docs usually mention that you can have a certain password length. For instance, suppose you had the pgp passphrase, "cat", is that a passphrase length of three?, or because each character consists of 8 bits, a passphrase of (8 x 3 =24)
24?
   Usually in these crypto programs docs they say how many
"bits" they support. Are they literally talking about bits, or just about how many characters (like I'm typing now) the password/passphrase can contain?
   
0
Comment
Question by:thunder44
  • 2
  • 2
  • 2
  • +4
10 Comments
 
LVL 8

Expert Comment

by:Navid
ID: 6166052
Are you talking about "Encryption passwords" or "Encryption docs and E-mails"?
Usually if it is about passwords, they talk about only how many characters.
But in docs and E-mails, they will inform you about how many "bites" encrypt text you can send or save.
You said:
"......each character consists of 8 bits......"
Not always true. Depends on which encrypt program you use and what language you have.
If we assume that each character is 8 bites, then you can count like:
(8 x 3 =24) right..
Do not forget to add spaces and other used characters.
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 6166304
Actually most programs are discussing how many bits of encryption they do.

If your password is shorter than the encryption length, they simply repeat it, until the proper length is achieved.

I hope this helps !
0
 
LVL 7

Accepted Solution

by:
pbessman earned 150 total points
ID: 6166334
For more information please go to this site.  You should find your answers there.  I will show you the door, you must open it............ http://www.stack.nl/~galactus/remailers/passphrase-faq.html

In case you don't get there befoer someone else copies the info from the site I will paste it here.

The rule of thumb is that you use one character per bit of key needed. You really get about 1.2 bits per English text character [1c] for key usage. Modifying the key size means 128 / 1.2 = 106.667 or 107 letters of text are needed. This assumes normal English structure, only lower case letters and spaces for the passphrase and for the calculation purposes, all spaces are ignored in the passphrase [1a]. Few of us are willing to type out a line and a half of text every time we use PGP though. This is where security fails and we use weak passphrases.
0
 

Author Comment

by:thunder44
ID: 6170273
  Thanks to pbessman, for refering me to a source that seems to make sense "one character for bit of key needed". Thanks to Navid, but I appreciate a reference. Thanks to SysExpert as well.
   Post an answer pbessman and collect your points.
0
 
LVL 1

Expert Comment

by:dluedi
ID: 6171768
you just have to click on "Accept comment as answer" just above pbessman's comment! Then he'll get the points!!
0
Shouldn't all users have the same email signature?

You wouldn't let your users design their own business cards, would you? So, why do you let them design their own email signatures? Think of the damage they could be doing to your brand reputation! Choose the easy way to manage set up and add email signatures for all users.

 

Author Comment

by:thunder44
ID: 6172658
Thanks dluedi !
0
 
LVL 13

Expert Comment

by:gonzal13
ID: 6174931
Microsoft has a n ecryption program that attaches to MSWord and is "forbidded to be exported out of the US" which is kind of impossible to do.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 6443544
Hello all,
I am Computer101, a moderator from Experts-Exchange and also an expert within this topic area. This question has been open a long time.  What I am going to do is allow feedback from the questioner and experts.  If it is not resolved, I will delete or accept an answer based on the info I have been given, Experts, feel free to offer input.  I will monitor these questions for a period of 5-7 days and come back and evaluate.  I will have another moderator (who is also an expert in this topic area) look at the question also to ensure we do the right thing for this question.

Thank you
Computer101
Community Support Moderator
0
 
LVL 7

Expert Comment

by:pbessman
ID: 6443684
Looks like they never came back.

From: thunder44  Date: 06/08/2001 10:20PM PST  
  Thanks to pbessman, for refering me to a source that seems to make sense "one character for bit of
key needed". Thanks to Navid, but I appreciate a reference. Thanks to SysExpert as well.
  Post an answer pbessman and collect your points.  
0
 
LVL 1

Expert Comment

by:Computer101
ID: 6462710
Question awarded to pbessman.

Thank you
Computer101
Community Support Moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Update 11/3/2014 - Although the below article will get you to relocate the WINSXS folder, Microsoft has finally released a utility to reduce the size of the WINSXS folder. For some reason, it's not that straightforward. It only works on Windows 2008…
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now