HN2new | past | comments | ask | show | jobs | submitlogin

> "for anything longer... misspellings makes a big difference."

The question to ask is, how big a difference? Put another way, how many bits of entropy do your misspellings generate?

In your above example, where each word has 2 common misspellings, each misspelling gets you ~1.5 bits of entropy. For comparison, adding another randomly selected OED word gets you just over 17 bits of entropy. If we're talking about making meaningfully stronger passwords, making a grammatically correct phrase and then adding misspellings (what the article calls "seemingly random modifications") is a less effective strategy than simply using a series of actually-random words from the OED.

It's better to add entropy 17 bits at a time (whole words) than trying to add entropy piecemeal, 2 bits here and 3 bits there (misspellings, punctuation).





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: