706:
630:
609:
640:
364:
296:
269:
885:
577:
207:
517:
490:
238:
426:
792:
I haven't followed this article but it's probably someone's broken
English. The phrase "inherently insecure" occurs later in the article and that might have been what they were referring to. Perhaps the idea being that it would be inherently insecure if I used "Johnuniq" as my password? At any rate,
855:
It is usual in the computer industry to specify password strength in terms of information entropy, which is measured in shannon (Sh) and is a concept from information theory. It can be regarded as the minimum number of bits necessary to hold the information in a password of a given type. Instead of
738:
The inclusion of
Diceware on these tables (especially the Length one) isn't an apples-to-apples comparison, since each entry in the Diceware word list is a string of characters rather than a single character. All of the other examples are using the definition of "Length" to mean "number of
860:
Later in the article, we discuss "bits of entropy" without defining the term. These are just two different phrases denoting the same thing, right? It would be helpful to be consistent, or at least provide a definition of "bits of entropy" before using it.
856:
the number of guesses needed to find the password with certainty, the base-2 logarithm of that number is given, which is commonly referred to as the number of "entropy bits" in a password, though this is not the same quantity as information entropy.
747:
is no better than the "case insensitive Latin alphabet" calculation. Otherwise, you get to illogical conclusions like the All
Extended ASCII Printable Characters string of "©▓" being less secure than a single character "g" generated via Diceware.
897:
153:
567:
960:
457:
955:
378:
147:
990:
591:
198:
1015:
714:
777:. While this is an English word, I doubt that it has anything to do with the topic of this article. We no longer believe that substances are made up of four elements.
995:
980:
557:
354:
79:
950:
945:
344:
696:
1000:
985:
533:
391:
373:
279:
44:
586:
500:
1010:
686:
85:
965:
320:
975:
1020:
524:
495:
30:
940:
905:
739:
characters", while the
Diceware column represents "number of Diceware words", which are all multiple characters. While each Diceware
303:
274:
99:
1005:
827:
claims the first usage in this context was 1577. ie. Usage of the word is fine; it's a dictionary definition, not a wikipedia defn.
104:
20:
194:
190:
653:
614:
168:
74:
970:
249:
135:
65:
440:
206:
185:
129:
466:
Create the
Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
109:
217:
255:
125:
782:
705:
869:
645:
316:
175:
55:
532:
on
Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
319:
on
Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
70:
759:
237:
161:
921:
888:
This article was the subject of a Wiki
Education Foundation-supported course assignment, between
832:
798:
778:
222:
824:
141:
865:
435:
51:
24:
219:
909:
755:
662:
629:
608:
812:
469:
Find editors who have shown interest in this subject and ask them to take a look here.
934:
917:
828:
794:
751:
Not sure how to best word the clarification on this, but I'll give it some thought.
529:
363:
901:
884:
295:
268:
635:
221:
774:
312:
925:
873:
836:
802:
786:
763:
576:
308:
516:
489:
793:
the lead looks like it was written by passers-by; it needs a rewrite.
425:
815:
page) is used more in the context of "the quality, state, or fact of
658:
231:
223:
15:
704:
575:
424:
362:
417:
412:
407:
402:
160:
961:
C-Class
Computer Security articles of High-importance
528:, a collaborative effort to improve the coverage of
307:, a collaborative effort to improve the coverage of
174:
447:Review importance and quality of existing articles
450:Identify categories related to Computer Security
33:for general discussion of the article's subject.
879:Wiki Education assignment: Cybersecurity Policy
8:
657:, which collaborates on articles related to
956:High-importance Computer Security articles
603:
484:
456:Identify articles for creation (see also:
386:
263:
991:High-importance Computer science articles
849:Entropy as a measure of password strength
438:. Please allow some days for processing.
1016:Systems articles in software engineering
542:Knowledge (XXG):WikiProject Cryptography
605:
486:
265:
235:
996:WikiProject Computer science articles
981:High-importance Cryptography articles
329:Knowledge (XXG):WikiProject Computing
7:
811:" on this page (and the referred-to
713:This article is within the field of
651:This article is within the scope of
522:This article is within the scope of
301:This article is within the scope of
743:may add 12.9 bits of entropy, each
671:Knowledge (XXG):WikiProject Systems
254:It is of interest to the following
23:for discussing improvements to the
951:C-Class Computer Security articles
946:High-importance Computing articles
893:
889:
14:
1001:WikiProject Cryptography articles
986:C-Class Computer science articles
851:contains the following language:
734:Entropy table Diceware comparison
545:Template:WikiProject Cryptography
463:Identify articles for improvement
50:New to Knowledge (XXG)? Welcome!
896:. Further details are available
883:
843:Entropy bits vs. bits of entropy
638:
628:
607:
515:
488:
294:
267:
236:
205:
45:Click here to start a new topic.
1011:Mid-importance Systems articles
773:This article includes the word
691:This article has been rated as
562:This article has been rated as
349:This article has been rated as
966:All Computer Security articles
874:21:00, 17 September 2023 (UTC)
332:Template:WikiProject Computing
1:
976:C-Class Cryptography articles
926:00:46, 20 February 2024 (UTC)
916:— Assignment last updated by
584:This article is supported by
536:and see a list of open tasks.
434:will be generated shortly by
392:WikiProject Computer Security
374:WikiProject Computer Security
371:This article is supported by
323:and see a list of open tasks.
42:Put new text under old text.
1021:WikiProject Systems articles
674:Template:WikiProject Systems
587:WikiProject Computer science
1037:
941:C-Class Computing articles
837:03:33, 2 August 2023 (UTC)
764:15:14, 2 August 2018 (UTC)
697:project's importance scale
355:project's importance scale
712:
690:
623:
583:
561:
510:
385:
370:
348:
289:
262:
80:Be welcoming to newcomers
1006:C-Class Systems articles
803:03:39, 28 May 2021 (UTC)
787:16:26, 27 May 2021 (UTC)
525:WikiProject Cryptography
971:All Computing articles
813:authentication factors
709:
646:Systems science portal
580:
429:
367:
317:information technology
244:This article is rated
75:avoid personal attacks
900:. Student editor(s):
823:is "to be inherent".
708:
579:
548:Cryptography articles
428:
366:
304:WikiProject Computing
248:on Knowledge (XXG)'s
199:Auto-archiving period
100:Neutral point of view
715:Software engineering
453:Tag related articles
390:Things you can help
105:No original research
908:). Peer reviewers:
654:WikiProject Systems
441:More information...
898:on the course page
710:
581:
430:
368:
335:Computing articles
250:content assessment
86:dispute resolution
47:
729:
728:
725:
724:
721:
720:
602:
601:
598:
597:
483:
482:
479:
478:
475:
474:
230:
229:
66:Assume good faith
43:
25:Password strength
1028:
928:
906:article contribs
895:
891:
887:
807:I suspect that "
679:
678:
677:Systems articles
675:
672:
669:
648:
643:
642:
641:
632:
625:
624:
619:
611:
604:
568:importance scale
550:
549:
546:
543:
540:
519:
512:
511:
506:
503:
501:Computer science
492:
485:
458:Article requests
443:
387:
337:
336:
333:
330:
327:
298:
291:
290:
285:
282:
271:
264:
247:
241:
240:
232:
224:
210:
209:
200:
179:
178:
164:
95:Article policies
16:
1036:
1035:
1031:
1030:
1029:
1027:
1026:
1025:
931:
930:
915:
881:
845:
825:Merriam Webster
771:
736:
676:
673:
670:
667:
666:
663:systems science
644:
639:
637:
617:
592:High-importance
564:High-importance
547:
544:
541:
538:
537:
505:High‑importance
504:
498:
444:
439:
422:
379:High-importance
351:High-importance
334:
331:
328:
325:
324:
284:High‑importance
283:
277:
245:
226:
225:
220:
197:
121:
116:
115:
114:
91:
61:
12:
11:
5:
1034:
1032:
1024:
1023:
1018:
1013:
1008:
1003:
998:
993:
988:
983:
978:
973:
968:
963:
958:
953:
948:
943:
933:
932:
890:8 January 2024
880:
877:
858:
857:
844:
841:
840:
839:
805:
770:
767:
735:
732:
727:
726:
723:
722:
719:
718:
711:
701:
700:
693:Mid-importance
689:
683:
682:
680:
650:
649:
633:
621:
620:
618:Mid‑importance
612:
600:
599:
596:
595:
582:
572:
571:
560:
554:
553:
551:
534:the discussion
520:
508:
507:
493:
481:
480:
477:
476:
473:
472:
471:
470:
467:
464:
461:
454:
451:
448:
432:Article alerts
423:
421:
420:
415:
410:
405:
399:
396:
395:
383:
382:
369:
359:
358:
347:
341:
340:
338:
321:the discussion
299:
287:
286:
272:
260:
259:
253:
242:
228:
227:
218:
216:
215:
212:
211:
181:
180:
118:
117:
113:
112:
107:
102:
93:
92:
90:
89:
82:
77:
68:
62:
60:
59:
48:
39:
38:
35:
34:
28:
13:
10:
9:
6:
4:
3:
2:
1033:
1022:
1019:
1017:
1014:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
947:
944:
942:
939:
938:
936:
929:
927:
923:
919:
913:
911:
907:
903:
899:
894:30 April 2024
886:
878:
876:
875:
871:
867:
866:Mr. Swordfish
862:
854:
853:
852:
850:
842:
838:
834:
830:
826:
822:
818:
814:
810:
806:
804:
800:
796:
791:
790:
789:
788:
784:
780:
779:David Spector
776:
768:
766:
765:
761:
757:
752:
749:
746:
742:
733:
731:
716:
707:
703:
702:
698:
694:
688:
685:
684:
681:
664:
660:
656:
655:
647:
636:
634:
631:
627:
626:
622:
616:
613:
610:
606:
593:
590:(assessed as
589:
588:
578:
574:
573:
569:
565:
559:
556:
555:
552:
535:
531:
527:
526:
521:
518:
514:
513:
509:
502:
497:
494:
491:
487:
468:
465:
462:
459:
455:
452:
449:
446:
445:
442:
437:
433:
427:
419:
416:
414:
411:
409:
406:
404:
401:
400:
398:
397:
393:
389:
388:
384:
380:
377:(assessed as
376:
375:
365:
361:
360:
356:
352:
346:
343:
342:
339:
322:
318:
314:
310:
306:
305:
300:
297:
293:
292:
288:
281:
276:
273:
270:
266:
261:
257:
251:
243:
239:
234:
233:
214:
213:
208:
204:
196:
192:
189:
187:
183:
182:
177:
173:
170:
167:
163:
159:
155:
152:
149:
146:
143:
140:
137:
134:
131:
127:
124:
123:Find sources:
120:
119:
111:
110:Verifiability
108:
106:
103:
101:
98:
97:
96:
87:
83:
81:
78:
76:
72:
69:
67:
64:
63:
57:
53:
52:Learn to edit
49:
46:
41:
40:
37:
36:
32:
26:
22:
18:
17:
914:
882:
863:
859:
848:
847:The section
846:
820:
816:
808:
772:
753:
750:
744:
740:
737:
730:
692:
652:
585:
563:
539:Cryptography
530:Cryptography
523:
496:Cryptography
431:
372:
350:
302:
256:WikiProjects
202:
184:
171:
165:
157:
150:
144:
138:
132:
122:
94:
19:This is the
148:free images
31:not a forum
935:Categories
910:Smallick84
864:Comments?
769:Inherence?
756:Nichenbach
819:", where
809:inherence
775:inherence
745:character
436:AAlertBot
326:Computing
313:computing
309:computers
275:Computing
88:if needed
71:Be polite
21:talk page
918:MrLavoie
829:Nroister
821:inhering
817:inhering
795:Johnuniq
280:Security
186:Archives
56:get help
29:This is
27:article.
695:on the
668:Systems
659:systems
615:Systems
566:on the
408:history
353:on the
246:C-class
203:90Â days
154:WPÂ refs
142:scholar
902:RKM757
315:, and
252:scale.
126:Google
418:purge
413:watch
394:with:
169:JSTOR
130:books
84:Seek
922:talk
892:and
870:talk
833:talk
799:talk
783:talk
760:talk
741:word
661:and
558:High
403:edit
345:High
162:FENS
136:news
73:and
687:Mid
176:TWL
937::
924:)
912:.
872:)
835:)
801:)
785:)
762:)
754:--
594:).
499::
381:).
311:,
278::
201::
193:,
156:)
54:;
920:(
904:(
868:(
831:(
797:(
781:(
758:(
717:.
699:.
665:.
570:.
460:)
357:.
258::
195:2
191:1
188::
172:·
166:·
158:·
151:·
145:·
139:·
133:·
128:(
58:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.