From: Paul Foley <paul@mycroft.actrix.gen.nz>
To: richieb@teleport.com
Message Hash: d6a54c12237e23efdaed3c4081a1f3fb48cb64b013466d2ed91d2b5ada4dc058
Message ID: <199607220428.QAA11049@mycroft.actrix.gen.nz>
Reply To: <Pine.SUN.3.92.960721111918.11352A-100000@julie.teleport.com>
UTC Datetime: 1996-07-22 10:14:37 UTC
Raw Date: Mon, 22 Jul 1996 18:14:37 +0800
From: Paul Foley <paul@mycroft.actrix.gen.nz>
Date: Mon, 22 Jul 1996 18:14:37 +0800
To: richieb@teleport.com
Subject: Re: Length of passphrase beneficial?
In-Reply-To: <Pine.SUN.3.92.960721111918.11352A-100000@julie.teleport.com>
Message-ID: <199607220428.QAA11049@mycroft.actrix.gen.nz>
MIME-Version: 1.0
Content-Type: text/plain
Rich Burroughs <richieb@teleport.com> wrote:
> Actual Question:
> Does the length and randomness of a passphrase contribute at all
> to the overall security of a cryptosystem?
Actual short answer: yes :)
Answer in his particular case, however: no
--
Paul Foley <mycroft@actrix.gen.nz> --- PGPmail preferred
PGP key ID 0x1CA3386D available from keyservers
fingerprint = 4A 76 83 D8 99 BC ED 33 C5 02 81 C9 BF 7A 91 E8
----------------------------------------------------------------------
A bird in the bush usually has a friend in there with him.
Return to July 1996
Return to “Rich Burroughs <richieb@teleport.com>”