http://www.perlmonks.org?node_id=951310


in reply to xkcd-style password generation

With a little adaption:
perl -le '@w=grep{length()>5&&length()<8&&/^[a-z]+$/}<>;chomp@w;print +join" ",map{$w[rand@w]}1..4'</usr/share/dict/words
Some samples:
octyl forrad ruble smoked unlit stamp finish stumpy baring pattu helium place tiptop sundri alumni anilla dodge blout spurl fasher lownly setal untar nuchal
There are 23560 entries in my /usr/share/dict/words that match, giving 308106701416960000 different potential pass phrases. If an attacker can test 1 billion pass phrases per second, it takes almost 10 years to check the entire key space.

I consider that secure enough for my Perlmonks password.

Replies are listed 'Best First'.
Re^2: xkcd-style password generation
by Tanktalus (Canon) on Feb 02, 2012 at 05:16 UTC

    Hahaaaa... ++ just for saying "secure" and "Perlmonks password" in the same sentence with a straight face. :-P :-) Plaintext passwords? Hahaha... thanks for that :-)

      Plaintext passwords?

      Someone remind me again; why is it so hard to change that?


      With the rise and rise of 'Social' network sites: 'Computers are making people easier to use everyday'
      Examine what is said, not who speaks -- Silence betokens consent -- Love the truth but pardon error.
      "Science is about questioning the status quo. Questioning authority".
      In the absence of evidence, opinion is indistinguishable from prejudice.

      The start of some sanity?

Re^2: xkcd-style password generation
by LanX (Saint) on Feb 02, 2012 at 00:35 UTC
    > I consider that secure enough for my Perlmonks password.

    perlmonk's password is restricted to 8 characters.

    Cheers Rolf