From 98eac2236a405b639042824c69709180218360cf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dominik=20Sch=C3=BCrmann?= Date: Wed, 6 Jan 2016 01:35:04 +0100 Subject: [PATCH] Updated Backups (markdown) --- Backups.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Backups.md b/Backups.md index a0d1e33..564184c 100644 --- a/Backups.md +++ b/Backups.md @@ -33,4 +33,4 @@ Example: ``TWNK-KDEY-MTWT-EVGS-DRDB-KVTW`` * [2015, Jun Ho Huh et al.: On the Memorability of System-generated PINs: Can Chunking Help?](http://lersse-dl.ece.ubc.ca/record/304/files/soups2015-final110.pdf) * [2006, Deborah S. Carstens, Linda C. Malone, Pamela McCauley-Bell: Applying Chunking Theory in Organizational Password Guidelines](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.97.2782&rep=rep1&type=pdf) * Security level: Possible combinations are 26^24 = 2^112.8. This is enough to be protected against offline brute force attacks. -* The generated backup code is used directly for encrypting an OpenPGP message (more precisely: It is used for the [Symmetric-Key Encrypted Session Key Packet](http://tools.ietf.org/html/rfc4880#section-5.3)). The whole backup code, e.g., ``TWNK-KDEY-MTWT-EVGS-DRDB-KVTW`` (including the dashes), is used as a symmetric-key. Dashes are included to ease decryption using OpenPGP implementations that don't offer special dialogs for entering backup codes and only support single text fields for entering passwords. \ No newline at end of file +* The generated backup code is used directly for encrypting an OpenPGP message (more precisely: It is used for the [Symmetric-Key Encrypted Session Key Packet](http://tools.ietf.org/html/rfc4880#section-5.3)). The whole backup code, e.g., ``TWNK-KDEY-MTWT-EVGS-DRDB-KVTW`` (including the dashes -> 29 characters long), is used as a symmetric-key. Dashes are included to ease decryption using OpenPGP implementations that don't offer special dialogs for entering backup codes and only support single text fields for entering passwords. \ No newline at end of file