eissco password generator
read before use
- Use at your own risk: caveat emptor.
- mt_rand function is used to repeatedly pick from the pools.
- Use it, or leave it. :)
- There are 24x 'specials' used, if selected.
- At this time HTTPS is not implemented.
- Ergo, MIM/interception could occur.
- If you want to use for OTP purposes:
- Take care with storage/security of copies
- Destroy used/part-used lines immediately after use
- Ensure all personnel with same key(s) do same
- By comparison (assuming no back-door available):
- 1024-bit / 128-bytes key = 2.027E+254 permutations.
- 2048-bit / 256-bytes key = 3.231E+616 permutations.
- 4096-bit / 512-bytes key = 1.687E+1017 permutations.
- 8192-bit / 1024-bytes key = 4.305E+16275 permutations.
- Standard USA EAM traffic = 4.887E46 permutations.
- Number-stations still transmit decimals only.
- The log(base10) of 97, is 1.9867.
- The log(base10) of 86, is 1.9344.
- The log(base10) of 62, is 1.7923.
- The log(base10) of 36, is 1.5563.
- The log(base10) of 26, is 1.4149.
- All the stars, in all visible galaxies = ~1E25.
- Any chance >1E50 is considered naturally impossible?
To reset all values, click on "reset", then click on "submit".
You requested 0 passwords of 0-characters length, using the "" pool. Permutations (each): 1
© eissco 2018 | all other rights reserved