Length of a stretched gnupg passphrase that is comparable in strength to an unstretched string of 256 random bits

Assume that we want to encrypt a file with gnupg using AES-256 as the encryption algorithm. (Hence, symmetric encryption.)

In this mode, gnupg requires a passphrase from the user. I understand that gnupg then derives from … Continue reading Length of a stretched gnupg passphrase that is comparable in strength to an unstretched string of 256 random bits

Can Lava Lamps enhance modern native entropy sourced from hardware and the Linux Kernel?

In this 2017 video by Computerphile’s Tom Scott, “The Lava Lamps That Help Keep The Internet Secure”, Scott tours Cloud Flare’s facility and checks out their Wall of Entropy. This is essentially a wall of many lava lamps that… Continue reading Can Lava Lamps enhance modern native entropy sourced from hardware and the Linux Kernel?

What research suggests that user’s mouse movements are (not) sufficiently unpredictable for secret key generation?

I have not been able to find any credible source which tried to prove or disprove the randomness of mouse movements.

A Google Scholar search for “mouse movement entropy” gives surprisingly few results: about one page of computer science … Continue reading What research suggests that user’s mouse movements are (not) sufficiently unpredictable for secret key generation?