Re: Secure Password Policy?

From: Alexander Klimov (alserkli@inbox.ru)
Date: Thu Jan 19 2006 - 12:35:57 EST


On Thu, 19 Jan 2006, Sulaiman, Wilmar wrote:
> I would like to know where they derived the number (6 and 8 characters).

The method is as follows: you define how long an attacker can try (T),
how many attempts he can make per time unit (A) and what is
the probability of breakin (P). If the whole keyspace is S then

 A*T/S = P

and so

 S = A*T/P

Next step is to determine how many bits of entropy (B) are in each
character and the length of the password can be calculated:

 L = log(S)/B

-- 
Regards,
ASK
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 
Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:23 EDT