

When determining appropriate password length, ideally it should have at least as much entropy as the bit length of the symmetric key that is derived from it. This relies on the fact that the time taken to try all possible combinations would be infeasibly large, even for a well-equipped adversary. Passwords that are long enough should be safe for millions or billions of years, even if the list chosen is known to the attacker. Instead of generating a random sequence containing alphanumerical and special characters, Diceware selects a sequence of words equiprobably from a list containing several thousand that have been curated for their memorability, length and profanity.

To generate strong passwords that are both easy to remember and have an easily calculatable large entropy, it is advised to use the Diceware package. Generating Unbreakable Passwords Introduction Key-stretching measures which help to make password length manageable in a post-quantum world and.Estimating the brute force time for passwords of different length.How to calculate entropy for both pre-quantum and post-quantum strength.This method is very fast for short and/or non-random passwords. If weak passwords (passphrases) are used, they will be easily discovered by trying every possible character combination in reasonable time through brute-force attacks.

Considering Moore's Law it could have only improved since. Warning: In 2013, nation-state adversaries were supposedly capable of one trillion guesses per second when attempting to brute-force passwords.
