A widespread weakness in lots of techniques is to use a password or passphrase, or a hash of a password or passphrase, because the encryption/decryption key. The downside is that this tends to be highly prone to offline keysearch assaults. Most users choose passwords that do not have sufficient entropy to resist such assaults. Quantum-resistant […]
