Is getting 1-2 outputs from a CSPRNG to seed another CSPRNG less entropy than getting say 5000 outputs from a CSPRNG and using that to seed?

This question builds off of this question.
I want to create more entropy from a viable entropy source to seed another CSPRNG.
If I use

window.crypto.getRandomValues(newUint8Array(1))

To seed a CSPRNG, is that less entro… Continue reading Is getting 1-2 outputs from a CSPRNG to seed another CSPRNG less entropy than getting say 5000 outputs from a CSPRNG and using that to seed?

How long should zip encryption password be for it take 10 years to crack?

I am using zip 3.0.0 on macOS High Sierra and Ubuntu. Here is my zip version on macOS:
$ zip –version | head
Copyright (c) 1990-2008 Info-ZIP – Type ‘zip "-L"’ for software license.
This is Zip 3.0 (July 5th 2008), by Info-ZIP.
Continue reading How long should zip encryption password be for it take 10 years to crack?

When knowing an individual’s plaintext password history, how much information is expected to be gained with a new password? Do we know this?

The premise: Knowing a persons password history should provide information to help when guessing a new password of theirs.

At an extreme end, with a password history of wildcats, wildcats1, then wildcats2, I’d guess there is… Continue reading When knowing an individual’s plaintext password history, how much information is expected to be gained with a new password? Do we know this?

How can ECDSA offer stronger security with the same key length (same amount of entropy)?

It’s always been told that ECDSA is more secure “per bit of key size”, such that it offers same security with a shorter key, or offers stronger security with the same key length.

However, per my understanding, if the length … Continue reading How can ECDSA offer stronger security with the same key length (same amount of entropy)?