Knowledge (XXG)

Talk:Password strength

Source đź“ť

706: 630: 609: 640: 364: 296: 269: 885: 577: 207: 517: 490: 238: 426: 792:
I haven't followed this article but it's probably someone's broken English. The phrase "inherently insecure" occurs later in the article and that might have been what they were referring to. Perhaps the idea being that it would be inherently insecure if I used "Johnuniq" as my password? At any rate,
855:
It is usual in the computer industry to specify password strength in terms of information entropy, which is measured in shannon (Sh) and is a concept from information theory. It can be regarded as the minimum number of bits necessary to hold the information in a password of a given type. Instead of
738:
The inclusion of Diceware on these tables (especially the Length one) isn't an apples-to-apples comparison, since each entry in the Diceware word list is a string of characters rather than a single character. All of the other examples are using the definition of "Length" to mean "number of
860:
Later in the article, we discuss "bits of entropy" without defining the term. These are just two different phrases denoting the same thing, right? It would be helpful to be consistent, or at least provide a definition of "bits of entropy" before using it.
856:
the number of guesses needed to find the password with certainty, the base-2 logarithm of that number is given, which is commonly referred to as the number of "entropy bits" in a password, though this is not the same quantity as information entropy.
747:
is no better than the "case insensitive Latin alphabet" calculation. Otherwise, you get to illogical conclusions like the All Extended ASCII Printable Characters string of "©▓" being less secure than a single character "g" generated via Diceware.
897: 153: 567: 960: 457: 955: 378: 147: 990: 591: 198: 1015: 714: 777:. While this is an English word, I doubt that it has anything to do with the topic of this article. We no longer believe that substances are made up of four elements. 995: 980: 557: 354: 79: 950: 945: 344: 696: 1000: 985: 533: 391: 373: 279: 44: 586: 500: 1010: 686: 85: 965: 320: 975: 1020: 524: 495: 30: 940: 905: 739:
characters", while the Diceware column represents "number of Diceware words", which are all multiple characters. While each Diceware
303: 274: 99: 1005: 827:
claims the first usage in this context was 1577. ie. Usage of the word is fine; it's a dictionary definition, not a wikipedia defn.
104: 20: 194: 190: 653: 614: 168: 74: 970: 249: 135: 65: 440: 206: 185: 129: 466:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
109: 217: 255: 125: 782: 705: 869: 645: 316: 175: 55: 532:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
319:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
70: 759: 237: 161: 921: 888:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
832: 798: 778: 222: 824: 141: 865: 435: 51: 24: 219: 909: 755: 662: 629: 608: 812: 469:
Find editors who have shown interest in this subject and ask them to take a look here.
934: 917: 828: 794: 751:
Not sure how to best word the clarification on this, but I'll give it some thought.
529: 363: 901: 884: 295: 268: 635: 221: 774: 312: 925: 873: 836: 802: 786: 763: 576: 308: 516: 489: 793:
the lead looks like it was written by passers-by; it needs a rewrite.
425: 815:
page) is used more in the context of "the quality, state, or fact of
658: 231: 223: 15: 704: 575: 424: 362: 417: 412: 407: 402: 160: 961:
C-Class Computer Security articles of High-importance
528:, a collaborative effort to improve the coverage of 307:, a collaborative effort to improve the coverage of 174: 447:Review importance and quality of existing articles 450:Identify categories related to Computer Security 33:for general discussion of the article's subject. 879:Wiki Education assignment: Cybersecurity Policy 8: 657:, which collaborates on articles related to 956:High-importance Computer Security articles 603: 484: 456:Identify articles for creation (see also: 386: 263: 991:High-importance Computer science articles 849:Entropy as a measure of password strength 438:. Please allow some days for processing. 1016:Systems articles in software engineering 542:Knowledge (XXG):WikiProject Cryptography 605: 486: 265: 235: 996:WikiProject Computer science articles 981:High-importance Cryptography articles 329:Knowledge (XXG):WikiProject Computing 7: 811:" on this page (and the referred-to 713:This article is within the field of 651:This article is within the scope of 522:This article is within the scope of 301:This article is within the scope of 743:may add 12.9 bits of entropy, each 671:Knowledge (XXG):WikiProject Systems 254:It is of interest to the following 23:for discussing improvements to the 951:C-Class Computer Security articles 946:High-importance Computing articles 893: 889: 14: 1001:WikiProject Cryptography articles 986:C-Class Computer science articles 851:contains the following language: 734:Entropy table Diceware comparison 545:Template:WikiProject Cryptography 463:Identify articles for improvement 50:New to Knowledge (XXG)? Welcome! 896:. Further details are available 883: 843:Entropy bits vs. bits of entropy 638: 628: 607: 515: 488: 294: 267: 236: 205: 45:Click here to start a new topic. 1011:Mid-importance Systems articles 773:This article includes the word 691:This article has been rated as 562:This article has been rated as 349:This article has been rated as 966:All Computer Security articles 874:21:00, 17 September 2023 (UTC) 332:Template:WikiProject Computing 1: 976:C-Class Cryptography articles 926:00:46, 20 February 2024 (UTC) 916:— Assignment last updated by 584:This article is supported by 536:and see a list of open tasks. 434:will be generated shortly by 392:WikiProject Computer Security 374:WikiProject Computer Security 371:This article is supported by 323:and see a list of open tasks. 42:Put new text under old text. 1021:WikiProject Systems articles 674:Template:WikiProject Systems 587:WikiProject Computer science 1037: 941:C-Class Computing articles 837:03:33, 2 August 2023 (UTC) 764:15:14, 2 August 2018 (UTC) 697:project's importance scale 355:project's importance scale 712: 690: 623: 583: 561: 510: 385: 370: 348: 289: 262: 80:Be welcoming to newcomers 1006:C-Class Systems articles 803:03:39, 28 May 2021 (UTC) 787:16:26, 27 May 2021 (UTC) 525:WikiProject Cryptography 971:All Computing articles 813:authentication factors 709: 646:Systems science portal 580: 429: 367: 317:information technology 244:This article is rated 75:avoid personal attacks 900:. Student editor(s): 823:is "to be inherent". 708: 579: 548:Cryptography articles 428: 366: 304:WikiProject Computing 248:on Knowledge (XXG)'s 199:Auto-archiving period 100:Neutral point of view 715:Software engineering 453:Tag related articles 390:Things you can help 105:No original research 908:). Peer reviewers: 654:WikiProject Systems 441:More information... 898:on the course page 710: 581: 430: 368: 335:Computing articles 250:content assessment 86:dispute resolution 47: 729: 728: 725: 724: 721: 720: 602: 601: 598: 597: 483: 482: 479: 478: 475: 474: 230: 229: 66:Assume good faith 43: 25:Password strength 1028: 928: 906:article contribs 895: 891: 887: 807:I suspect that " 679: 678: 677:Systems articles 675: 672: 669: 648: 643: 642: 641: 632: 625: 624: 619: 611: 604: 568:importance scale 550: 549: 546: 543: 540: 519: 512: 511: 506: 503: 501:Computer science 492: 485: 458:Article requests 443: 387: 337: 336: 333: 330: 327: 298: 291: 290: 285: 282: 271: 264: 247: 241: 240: 232: 224: 210: 209: 200: 179: 178: 164: 95:Article policies 16: 1036: 1035: 1031: 1030: 1029: 1027: 1026: 1025: 931: 930: 915: 881: 845: 825:Merriam Webster 771: 736: 676: 673: 670: 667: 666: 663:systems science 644: 639: 637: 617: 592:High-importance 564:High-importance 547: 544: 541: 538: 537: 505:High‑importance 504: 498: 444: 439: 422: 379:High-importance 351:High-importance 334: 331: 328: 325: 324: 284:High‑importance 283: 277: 245: 226: 225: 220: 197: 121: 116: 115: 114: 91: 61: 12: 11: 5: 1034: 1032: 1024: 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 978: 973: 968: 963: 958: 953: 948: 943: 933: 932: 890:8 January 2024 880: 877: 858: 857: 844: 841: 840: 839: 805: 770: 767: 735: 732: 727: 726: 723: 722: 719: 718: 711: 701: 700: 693:Mid-importance 689: 683: 682: 680: 650: 649: 633: 621: 620: 618:Mid‑importance 612: 600: 599: 596: 595: 582: 572: 571: 560: 554: 553: 551: 534:the discussion 520: 508: 507: 493: 481: 480: 477: 476: 473: 472: 471: 470: 467: 464: 461: 454: 451: 448: 432:Article alerts 423: 421: 420: 415: 410: 405: 399: 396: 395: 383: 382: 369: 359: 358: 347: 341: 340: 338: 321:the discussion 299: 287: 286: 272: 260: 259: 253: 242: 228: 227: 218: 216: 215: 212: 211: 181: 180: 118: 117: 113: 112: 107: 102: 93: 92: 90: 89: 82: 77: 68: 62: 60: 59: 48: 39: 38: 35: 34: 28: 13: 10: 9: 6: 4: 3: 2: 1033: 1022: 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 947: 944: 942: 939: 938: 936: 929: 927: 923: 919: 913: 911: 907: 903: 899: 894:30 April 2024 886: 878: 876: 875: 871: 867: 866:Mr. Swordfish 862: 854: 853: 852: 850: 842: 838: 834: 830: 826: 822: 818: 814: 810: 806: 804: 800: 796: 791: 790: 789: 788: 784: 780: 779:David Spector 776: 768: 766: 765: 761: 757: 752: 749: 746: 742: 733: 731: 716: 707: 703: 702: 698: 694: 688: 685: 684: 681: 664: 660: 656: 655: 647: 636: 634: 631: 627: 626: 622: 616: 613: 610: 606: 593: 590:(assessed as 589: 588: 578: 574: 573: 569: 565: 559: 556: 555: 552: 535: 531: 527: 526: 521: 518: 514: 513: 509: 502: 497: 494: 491: 487: 468: 465: 462: 459: 455: 452: 449: 446: 445: 442: 437: 433: 427: 419: 416: 414: 411: 409: 406: 404: 401: 400: 398: 397: 393: 389: 388: 384: 380: 377:(assessed as 376: 375: 365: 361: 360: 356: 352: 346: 343: 342: 339: 322: 318: 314: 310: 306: 305: 300: 297: 293: 292: 288: 281: 276: 273: 270: 266: 261: 257: 251: 243: 239: 234: 233: 214: 213: 208: 204: 196: 192: 189: 187: 183: 182: 177: 173: 170: 167: 163: 159: 155: 152: 149: 146: 143: 140: 137: 134: 131: 127: 124: 123:Find sources: 120: 119: 111: 110:Verifiability 108: 106: 103: 101: 98: 97: 96: 87: 83: 81: 78: 76: 72: 69: 67: 64: 63: 57: 53: 52:Learn to edit 49: 46: 41: 40: 37: 36: 32: 26: 22: 18: 17: 914: 882: 863: 859: 848: 847:The section 846: 820: 816: 808: 772: 753: 750: 744: 740: 737: 730: 692: 652: 585: 563: 539:Cryptography 530:Cryptography 523: 496:Cryptography 431: 372: 350: 302: 256:WikiProjects 202: 184: 171: 165: 157: 150: 144: 138: 132: 122: 94: 19:This is the 148:free images 31:not a forum 935:Categories 910:Smallick84 864:Comments? 769:Inherence? 756:Nichenbach 819:", where 809:inherence 775:inherence 745:character 436:AAlertBot 326:Computing 313:computing 309:computers 275:Computing 88:if needed 71:Be polite 21:talk page 918:MrLavoie 829:Nroister 821:inhering 817:inhering 795:Johnuniq 280:Security 186:Archives 56:get help 29:This is 27:article. 695:on the 668:Systems 659:systems 615:Systems 566:on the 408:history 353:on the 246:C-class 203:90 days 154:WP refs 142:scholar 902:RKM757 315:, and 252:scale. 126:Google 418:purge 413:watch 394:with: 169:JSTOR 130:books 84:Seek 922:talk 892:and 870:talk 833:talk 799:talk 783:talk 760:talk 741:word 661:and 558:High 403:edit 345:High 162:FENS 136:news 73:and 687:Mid 176:TWL 937:: 924:) 912:. 872:) 835:) 801:) 785:) 762:) 754:-- 594:). 499:: 381:). 311:, 278:: 201:: 193:, 156:) 54:; 920:( 904:( 868:( 831:( 797:( 781:( 758:( 717:. 699:. 665:. 570:. 460:) 357:. 258:: 195:2 191:1 188:: 172:· 166:· 158:· 151:· 145:· 139:· 133:· 128:( 58:.

Index

talk page
Password strength
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Archives
1
2


content assessment
WikiProjects

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑