Displaying 2 results from an estimated 2 matches for "default_rounds".
2013 Nov 14
1
Re: make_random_password(): avoid modulo bias, and do not deplete system entropy (#9)
...rnallyconfuzzled.com/arts/jsw_art_rand.aspx
> And see arc4random_uniform's implementation: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/crypt/arc4random.c?rev=1.26;content-type=text%2Fplain
>
> 3. The generated password needs ~2^107 brute-force attempts (16 * log2(60) + log2(default_rounds=5000)), which is more than enough of course, but usually 128-bit strength is used for keys. A password length of 20 characters would achieve that. My pull request doesn't include this change, its up to you.
> You can merge this Pull Request by running:
>
> git pull https://githu...
2014 Jul 25
1
improving passphrase protected private keys
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
I got a proposal
for a slight different default
private key encryption protocol.
Here is my understanding what
ssh-keygen currently does.
According to this article:
http://martin.kleppmann.com/2013/05/24/improving-security-of-ssh-private-keys.html
when you create a new key with a
passphrase to protect it, ssh-keygen
uses a hard-coded openssl