U
uppa9

  • 23 Jul
  • Joined 26 Jun
  • GrapheneOS If there's a 10 diceware word passphrase, as in 128 bits of entropy, then there would need to be truly massive breaks in AES, scrypt or the other cryptography used as part of key derivation to recover any of the data in that profile.

    It sounds as if AES-256 with a 128-bit random key is good enough for a long time, even hopefully quantum-resistant. That's good to know.

    The question about the iPhone scenario (uppa9) was "alphanumerical passphrase of 20+". I think (26+26+10)20 is pretty close to 2128, so it sounds as if that scenario is probably good too, assuming the passphrase is truly random?