diff --git a/Site/2013-05/algorithm.html b/Site/2013-05/algorithm.html index 4a5a4307..c98d74b2 100644 --- a/Site/2013-05/algorithm.html +++ b/Site/2013-05/algorithm.html @@ -40,10 +40,10 @@
Master Password is an algorithm used to generate unique passwords for websites, email accounts, or anything else based only on easily reproducible input.
The goal is a process that avoids all the problems involved with other password solutions.
The Master Password algorithm is open: this page describes its inner workings in detail. We believe the following is an important lesson we should all learn: Regardless of how much encryption a solution claims, if you don't know how it works, you cannot assume it is secure (at least, not the kind of secure you care about).
+The Master Password algorithm is open: this page describes its inner workings in detail. We believe the following is an important lesson we should all learn: Regardless of how much encryption a solution claims, if you don't know how it works, you cannot assume it is secure (at least, not the kind of secure you care about).
With the master key
known, we can proceed to calculate a template seed
for the site. The template seed
is essentially the site-specific secret in binary form.
To generate the template seed
, we construct an authentication code for the site's name
and counter
using the user's master key
.
We employ the HMAC-SHA-256 algorithm to obtain a large enough seed
for the encoding step that follows.
We employ the HMAC-SHA-256 algorithm to obtain a large enough seed
for the encoding step that follows.
seed = hmac-sha256( key, "com.lyndir.masterpassword" . site name length . site name . counter )@@ -309,8 +309,8 @@ passWord[i] = passChar diff --git a/Site/2013-05/faq.html b/Site/2013-05/faq.html index f8341d56..48f67f87 100644 --- a/Site/2013-05/faq.html +++ b/Site/2013-05/faq.html @@ -40,10 +40,10 @@
Tr0ub4dor
correct horse battery staple
The time-to-crack numbers throughout this website are based on the following assumptions:
1 479 million
SHA-256 hashes per second (hashcat on AMD HD 6990)1 479 million
SHA-256 hashes per second (hashcat on AMD HD 6990)3.3
Master Password passwords per second (2GHz MacBook Pro, scrypt N=32768, r=8, p=2, dkLen=64).Master Password is based on a stateless algorithm which frees it from the reliance on storage of secrets.
Since your generated passwords aren't saved to your device, there is no risk you'll be forced to divulge them to aggressive peers. And since these passwords don't need to be backed up or synchronized between devices over the network, there is no risk of them getting intercepted.
-Finally, Master Password is free software (GPLv3), its algorithm extensively documented and does not require you to trust any external party. This is particularly interesting in a society where things like PRISM and gag orders are a real threat.
+Finally, Master Password is free software (GPLv3), its algorithm extensively documented and does not require you to trust any external party. This is particularly interesting in a society where things like PRISM and gag orders are a real threat.
by generating passwords for you with extremely high entropy. We've found that humans are exceedingly bad at coming up with good passwords, especially when they need a new one every week for a new site they sign up with. Master Password therefore takes the guesswork out of it and generates high-entropy, memorable passwords. High entropy means that when a hacker obtains all of LinkedIn's password hashes + href="http://www.washingtonpost.com/business/technology/linkedin-eharmony-deal-with-breach-aftermath/2012/06/07/gJQAwqs5KV_story.html" onclick="_gaq.push(['_trackPageview', '/outbound/linkedin']);">LinkedIn's password hashes again, they won't be able to brute-force your real LinkedIn password from it.
If you used an evenly distributed custom 8-character alphanumeric password (p4sSw0rD
doesn't count), it would only take a powerful attacker 1.7 days to brute-force your password from a leaked hash. If you used Master Password's default Long Password instead, it would take that same attacker 1.4 years of non-stop focus on your password, assuming they already know you used Master Password. If they don't,
that time goes up to 26 billion years. If you used Master Password's Maximum Security type, it would take up to 422460722753999994880 years.
you need to trust by implementing a completely stateless solution that requires no storage (you don't need to trust your hard disk or hardware), requires no backups or syncing (you don't need to trust that all your passwords are safely backed up and synced across your devices so they're actually available to you), requires no cloud services (you don't need to trust that your Internet connection is safe, or a cloud provider won't lose your - data or secretly send it to your or a foreign government). + data or secretly send it to your or a foreign government).
Most other solutions that get strength right don't care so much about the trust front. They figure, if you're going to pay them for their app, you might as well trust them with all your passwords too. This really shouldn't be an implicit assumption. They're your passwords, and nobody else should have a say.
-Knowing what happened to Silent Circle and Lavabit, knowing how extremely powerful and persuasive governments and share-holders can be, you would be well advised to consider very carefully giving the keys to your digital identity to a separate entity.
+Knowing what happened to Silent Circle and Lavabit, knowing how extremely powerful and persuasive governments and share-holders can be, you would be well advised to consider very carefully giving the keys to your digital identity to a separate entity.
Please see the support forums for answers to issues and questions or to open your own topic.
+Please see the support forums for answers to issues and questions or to open your own topic.
If you'd prefer to talk via email, send us a message at masterpassword@lyndir.com instead. You should get a personal reply within the hour if not in minutes.
+If you'd prefer to talk via email, send us a message at masterpassword@lyndir.com instead. You should get a personal reply within the hour if not in minutes.