Discussion Overview
The discussion revolves around the reliability of a specific password creation method, particularly focusing on the estimated time it would take to crack a randomly generated 20-character password composed solely of lowercase letters. Participants explore the implications of password strength in relation to cracking speeds and algorithms.
Discussion Character
- Technical explanation
- Debate/contested
Main Points Raised
- One participant calculates that a 20-character password made of lowercase letters would take approximately 659,000,000 years to crack at a speed of 1 trillion passwords per second.
- Another participant agrees with the initial calculation but suggests a slightly different estimate of around 656,744,329.448937 years based on the same cracking speed.
- Some participants note that even at high cracking speeds, they feel secure that their encrypted files would remain safe for at least 6 million years, assuming only lowercase letters are used.
- There is a mention of cracking algorithms that may prioritize certain combinations based on human memorability, which could affect the actual security of passwords despite theoretical estimates.
Areas of Agreement / Disagreement
Participants generally agree on the vast time estimates for cracking the passwords but express differing views on the implications of password selection and the effectiveness of cracking algorithms. The discussion remains unresolved regarding the practical security of passwords against targeted cracking methods.
Contextual Notes
Participants acknowledge that the time estimates are based on theoretical calculations and do not account for specific strategies employed by cracking algorithms that may reduce the effective security of certain passwords.