Ask Your Question
1

I created a 190-digit password... How secure is this?

asked 2017-12-23 18:19:36 -0500

paranoid_security gravatar image

I know that this sounds extremely paranoid and ridiculous, but today I formatted a USB flash drive with password-protected ext4 using a 190-digit password. It consists of upper-case letters, lower-case letters, words with random capitalization, numbers and special characters. I did this on my Fedora 27 machine. How long would it take all computers on Earth today combined to crack my password? Would a quantum computer be able to crack it? Is it even easier to crack the AES-256 encryption cipher?

edit retag flag offensive close merge delete

Comments

1

How is this Fedora-related?

florian gravatar imageflorian ( 2017-12-23 20:01:09 -0500 )edit

It isn't, really, but I decided to accept it because it's a moderately reasonable question and deserved an answer.

sideburns gravatar imagesideburns ( 2017-12-23 20:23:51 -0500 )edit

4 Answers

Sort by ยป oldest newest most voted
4

answered 2017-12-24 08:05:12 -0500

Rabin gravatar image

I find this XKCD comics related :P

https://xkcd.com/538/

image description

edit flag offensive delete link more

Comments

and thats what karate and 5 years of martial arts training are for all the guys i meet in high level exec jobs like NCM, CIS and resource management are very buff and they seem to know something about defence

noobusinghacks gravatar imagenoobusinghacks ( 2018-01-29 03:18:24 -0500 )edit
2

answered 2017-12-23 20:02:45 -0500

florian gravatar image

It is probably easier to find the text file where you saved the password or the paper where you wrote it down.

edit flag offensive delete link more

Comments

1

He will rattle his password after 10 minutes of waterboarding...

fcomida gravatar imagefcomida ( 2017-12-24 03:17:14 -0500 )edit
2

answered 2017-12-24 03:32:47 -0500

fcomida gravatar image

If the data you are trying to protect with a password a/o encryption is so valuable for some organization which is able to attempt a large scale brute force attack or able to own/build/operate a quantum computer (if they even exist), rest assured it will far cheaper for them to use other means for getting your data: intimidation, bribe, torture...a strong password will only protect you against the casual nerd cracker out there in the net.

edit flag offensive delete link more

Comments

Besides, since most of us are using post 2006 Intel CPUs, a well known super secretive organization has complete access to our computers via the embedded ARM processor inside the CPU even when running Linux...am I ridicolously paranoid? Maybe...

fcomida gravatar imagefcomida ( 2017-12-24 07:04:36 -0500 )edit
0

answered 2017-12-25 04:42:43 -0500

abadrinath gravatar image

Probably unnecessary. At that point, I don't think anyone would want the task of cracking that password, but there's a chance it may contain some kinds of patterns. Not sure about the quantum computers, but I'm sure something in the future will be able to crack it pretty easily.

I don't think your password is as hard to crack as the cipher though.

edit flag offensive delete link more

Comments

if the computer is off i know some experts who can slide an oscilloscope probe into the ram slot to disable the mecognisim that tunes out the filesystem in the ram from the last time it was on essentially re animate something called a "memory ghost" from there they could extract the last key rotation for the cryptography program and do something like use a data recovery utility to revert the filesystem to when it was mounted/unlocked or resolve the password from there

noobusinghacks gravatar imagenoobusinghacks ( 2018-01-29 03:29:56 -0500 )edit

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

Stats

Asked: 2017-12-23 18:19:36 -0500

Seen: 195 times

Last updated: Dec 25 '17