Comments on: How to remember a provably strong password: a new way using ‘constrained choice’
You can submit a comment using the box below. You will be challenged with an arithmetic question but an email address is not required. This comment system does not use third-party providers or share data. It was custom-made for Clarion and runs entirely on the web server that hosts the site.
This article was published before the creation of the comment system in July 2020. By policy, comments will remain open without a time limit, based on the premise that good comments made years later can be valuable.
Comments (since July 2020)
- How to remember a 128-bit key using ‘constrained choice’ August 2018, Stephen Hewitt. The 3rd Clarion data privacy article
- An idea for public key authentication from a name without certificates or central authority May 2021 Stephen Hewitt
- How to use beads to generate random letters and numbers by hand 22 September 2017, Stephen Hewitt. The first Clarion data privacy article
- Manual encryption with a one-time pad revisited March 2019, Stephen Hewitt. The 4th Clarion data privacy article
- A simple way to represent cryptographic key fingerprints 7 June 2020, Stephen Hewitt. The 5th Clarion data privacy article
- ars technica article: Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” Dan Goodin, ars technica, 28 May 2013
- Electronic Frontier Foundation article: EFF's New Wordlists for Random Passphrases Joseph Bonneau, Electronic Frontier Foundation, 19 July 2016
- diceware.com article: The Diceware Passphrase Home Page Arnold G. Reinhold, diceware.com,
- XKCD article: Password Strength XKCD, 10 August 2011
- How to Memorize a Random 60-Bit String Marjan Ghazvininejad and Kevin Knight, 2015 (SHA256 of PDF f0e091f445a4f777b123d56153cf149552e51424493ddf276378a709cbf5d79c)
- Guardian article: Password strength meters fail to spot easy-to-crack examples Samuel Gibbs , Guardian, 19 Aug 2016