Pages:
Author

Topic: How long, strong should a bitcoin wallet pass-phrase be? - page 2. (Read 1875 times)

legendary
Activity: 3248
Merit: 1070
I don't think that link accommodates dictionary attacks though. Putting "hello my name is" shows that it would take 2 billion years to crack it and "good morning" gives a result of 546 years. Obviously, neither of these are true.

yeah it's a bit off, i found one that is much better https://www.my1login.com/content/password-strength-test.php
sr. member
Activity: 462
Merit: 250
What if the wallet is than also backed up online which is known as a bad practice. What are the implications of that?

I would think that an encrypted wallet with a strong enough password should still be secure even when stored on the cloud although obviously it's not as secure as keeping it completely offline. Even if an employee from the hosting company found your wallet and attempted to crack it, your coins should still be safe if your password is strong enough.

you can try this, to see how strong your password is

https://howsecureismypassword.net/

usually something with 10-12 is good enough, just change the combination for every site

I don't think that link accommodates dictionary attacks though. Putting "hello my name is" shows that it would take 2 billion years to crack it and "good morning" gives a result of 546 years. Obviously, neither of these are true.

12 letter is enough, if you combine both upper & lower case, numbers and special characters.
See my wifi password below:
U>u^ZT[jehlNz
this password might take years to brute force (even with super computers).
But the thing is you've to remember you password.
And change your password frequently.


~Rude Boy

Wifi passwords are notoriously easy to crack. I believe even WPA2 can be cracked in a few days. The underlying AES encryption standard is pretty secure but there are workarounds and vulnerabilities which can reduce the effort required to crack these passwords significantly.

I think an ordinary computer is capable of 50,000 guesses per second.

Aside: Great post, Bizmark13!

How fast an "ordinary" computer can try passwords varies greatly depending on the wallet software and the brute-forcing software. Here's a spreadsheet which has some comparisons of several popular wallets & two open source brute-forcers running on a mid-range quad-core desktop machine:

https://onedrive.live.com/redir?resid=584f122ba17116ee%21295

Guess rates vary between 20 per second (Armory, CPU only) all the way up to 4,000,000 per second (older blockchain.info wallets, GPU accelerated). Some wallets would be even faster (Electrum, MultiBit Classic) if an open source GPU accelerated version were available.

For Bitcoin Core, guess rates vary between roughly 40 and 2,000 per second depending on whether or not GPU acceleration is used (and of course depending on the CPUs and GPUs).

Ah... You're right. Didn't realize it varied so much. The 50,000 figure was from a laptop I had a while ago performing SHA-256 decryption. Although I guess I should have realized it since the no. of encryption iterations and method of encryption used varies between different programs.
hero member
Activity: 672
Merit: 504
a.k.a. gurnec on GitHub
I think an ordinary computer is capable of 50,000 guesses per second.

Aside: Great post, Bizmark13!

How fast an "ordinary" computer can try passwords varies greatly depending on the wallet software and the brute-forcing software. Here's a spreadsheet which has some comparisons of several popular wallets & two open source brute-forcers running on a mid-range quad-core desktop machine:

https://onedrive.live.com/redir?resid=584f122ba17116ee%21295

Guess rates vary between 20 per second (Armory, CPU only) all the way up to 4,000,000 per second (older blockchain.info wallets, GPU accelerated). Some wallets would be even faster (Electrum, MultiBit Classic) if an open source GPU accelerated version were available.

For Bitcoin Core, guess rates vary between roughly 40 and 2,000 per second depending on whether or not GPU acceleration is used (and of course depending on the CPUs and GPUs).
sr. member
Activity: 462
Merit: 250
Other responses have been pretty accurate so far. The only other thing I'd like to mention is that the passphrase or password that OP describes should not be confused with a NXT passphrase or a Bitcoin brainwallet passphrase. For the latter two, a far higher level of security is required since you are dealing with not just a single attacker but dozens and possibly hundreds of attackers distributed all over the world using precomputed rainbow tables which can crack wallets in a manner that is not computationally expensive.

For the typical wallet password you might use to unlock a Qt or Electrum wallet, 12-20 random characters with a combination of uppercase and lowercase letters, numbers, and symbols is usually considered to be sufficient for the short to medium-term future. Keep in mind that Moore's law* states that computing power will double every 18 or so months so a password that is considered sufficient today might not be sufficient 20 years from now.

For a NXT passphrase or Bitcoin brainwallet passphrase, you really don't want anything under 30-35 characters in length and 50+ character passphrases are usually recommended. Mine, for instance, is 560 characters in length with uppercase and lowercase letters, numbers, and symbols.

*Yes, I'm aware that some predictions show that Moore's law is slowing down and will cease to remain true in the future but that's just hypothetical at this stage and beyond the scope of this thread.

EDIT: And for those who say that you shouldn't use words, this is mostly true. However, a sufficiently long and randomly generated list of words from a large enough pool should be uncrackable by any brute force method. Some people might find a list of English words to be more memorable compared to traditional passwords. Electrum uses this method, and so does NXT. And while these programs use 12-13 words to generate their passphrases, a lower number (e.g. 10 words) might be sufficient for encrypting a wallet.dat file.

Long passwords may be seen as "strong passwords" but they might not be.
For instance;
if you use english letters only 10 char password; there're 26^10 different possibilities.
260.000.000.000
if you use alphanumerical 10 char password; there're 36^10 different possibilities
360.000.000.000
if you use alphanumerical + special chars (let's say there's 20 different special char like /,*-?=_ etc) total 8 char password; there're  56^6 different possibilities
~1.736.000.000.000

Also check this;


1,000 guesses per second isn't a good assumption given that a.) the comic assumes that you're target is a web service, and b.) modern computers are capable of better speeds than this anyway. I think an ordinary computer is capable of 50,000 guesses per second.
legendary
Activity: 3248
Merit: 1070
you can try this, to see how strong your password is

http://www.tomshardware.com/reviews/nvidia-geforce-gtx-980-970-maxwell,3941-12.html

usually something with 10-12 is good enough, just change the combination for every site

I have a feeling that's not the right link lol.

This might be of better use: https://howsecureismypassword.net/

How secure is this website though, doesn't look all that professional, I'd be uncomfortable using a password I've tested on there.


they said it specifically, to not use passwords that you would then use for your normal activity, use a similar one just for testing
legendary
Activity: 896
Merit: 1000
longer passwords are stronger for obvious reasons but it mostly depends on what site or service it is for. for a bitcoin wallet i suggest 20 characters. letters, symbols, numbers. don't use words, mix everything.
legendary
Activity: 1148
Merit: 1000
you can try this, to see how strong your password is

http://www.tomshardware.com/reviews/nvidia-geforce-gtx-980-970-maxwell,3941-12.html

usually something with 10-12 is good enough, just change the combination for every site

I have a feeling that's not the right link lol.

This might be of better use: https://howsecureismypassword.net/

How secure is this website though, doesn't look all that professional, I'd be uncomfortable using a password I've tested on there.

I'd say a strong password is simply one that strays as far as possible from convention. Don't use words that are actual words, a mix of 20 letters, numbers and special characters should be enough to provide a reasonably strong password for at least the next 5 years (until computing power reaches new heights). The question then is how/where to store your password, I personally wouldn't trust any online storage service for this, a local storage device that cannot connect to the internet would be better. You can memorize just one super strong password (of course if you can memorize each individual password it would be even better) that leads to all your other passwords.
legendary
Activity: 1330
Merit: 1019
Thats cool, 143 billion years it will take to crack my password, now i better not forget it!
legendary
Activity: 1442
Merit: 1186
Clicked on this link expecting to see the xkcd.com cartoon on entropy. Was not disappointed.
hero member
Activity: 770
Merit: 500
12 letter is enough, if you combine both upper & lower case, numbers and special characters.
See my wifi password below:
U,F4%rw$RE,.?54
this password might take years to brute force (even with super computers).
But the thing is you've to remember you password.
And change your password frequently.


~Rude Boy
sr. member
Activity: 294
Merit: 250
Long passwords may be seen as "strong passwords" but they might not be.
For instance;
if you use english letters only 10 char password; there're 26^10 different possibilities.
260.000.000.000
if you use alphanumerical 10 char password; there're 36^10 different possibilities
360.000.000.000
if you use alphanumerical + special chars (let's say there's 20 different special char like /,*-?=_ etc) total 8 char password; there're  56^6 different possibilities
~1.736.000.000.000

Also check this;
legendary
Activity: 2786
Merit: 1031
If you make them NSA proof they are good enough.  Smiley
 
Edward Snowden on Passwords https://www.youtube.com/watch?v=yzGzB-yYKcc
legendary
Activity: 3248
Merit: 1070
you can try this, to see how strong your password is

http://www.tomshardware.com/reviews/nvidia-geforce-gtx-980-970-maxwell,3941-12.html

usually something with 10-12 is good enough, just change the combination for every site

I have a feeling that's not the right link lol.

This might be of better use: https://howsecureismypassword.net/

yeah you are right(your link was the one that i wanted to post), it's because i was arguing with another user on another forum about gpu consumption, i confused the two link

my bad  Cheesy
legendary
Activity: 978
Merit: 1001
you can try this, to see how strong your password is

http://www.tomshardware.com/reviews/nvidia-geforce-gtx-980-970-maxwell,3941-12.html

usually something with 10-12 is good enough, just change the combination for every site

I have a feeling that's not the right link lol.

This might be of better use: https://howsecureismypassword.net/
legendary
Activity: 3248
Merit: 1070
you can try this, to see how strong your password is

https://howsecureismypassword.net/

usually something with 10-12 is good enough, just change the combination for every site
hero member
Activity: 1492
Merit: 763
Life is a taxable event
10 characters, 20? 25?

Letters, numbers, special characters?

What if a user used only letters and numbers for example?





Say a hacker gets a wallet.dat with the pass-phrase helloworld, would it break in seconds? Now what if it is helloworld!~~ or HelloWorld!~~!

Are all these "weak" pass-phrases?


What if the wallet is than also backed up online which is known as a bad practice. What are the implications of that?
Pages:
Jump to: