It is a conservative (high) estimate of how much entropy would be present in an excellent passphrase. Actually "guess" would be a better word than "estimate" because I pretty much pulled it out of my ass without doing any research, but I would "guess" that nearly no one can remember anything with 60 bits of entropy for 30 years.
Plus key strengthening can be used to greatly decrease the power of brute force attacks.
For example say the attacker has a rig which can brute force 100 GH/s of SHA-256 passphrases.
Horrible right. That 40 to 50 bits of entropy will never be able to stand up to that. Plus Moore's law will ensure that in 30 years someone will be able to brute force 3 Petahashes per second.
Don't make the seed for wallet a single hash. Wallet creation and recreation is a relatively rare event. If you are ultra paranoid make it take 30 minutes to generate.
Say you got a rig w/ 1 GH/s. You hash the hash of the hash of the hash ... 30 minutes ... of the hash of the passprhrase.
That is 1.8 terrahashes required to convert a single passphrase into the deterministic seed. So even that monster 3 petahash rig from the future. It will only be able to brute force a mere 1666 passphrases per second. A trivial and pathetic amount.
passphrase -> 1 hash -> seed
milliseconds to recreate wallet.
attacker can brute force quadrillions of passphrases per second
passphrase -> 1.8 trillion hashes -> seed
30 minutes to recreate wallet on a 1GH machine
attacker can only brute force few thousand passphrases (assuming 30 years of Moore's law and a monster hashing farm).
40 bits of entropy where attacker is limited to 2000 passphrases per second will take
2^40 / 2000 = 8.5 years (and millions of dollars in computing power and electrical resources from 30 years in the future) to have a 50% chance of breaking passphrase.