We use the following base-case example to explain why a random PUK is secure:
Minimum measured time to test one PUK on the card: 60 milliseconds (0.06 seconds)
From that:
So, with our base-case 12-character random PUK and the card’s 60 ms per-try verification time, a full brute-force would take ~13 trillion years
Entropy explanation:
So, ~72.5 bits of entropy means the search space is large enough that brute forcing is computationally infeasible given the physical per-try speed enforced by the hardware
Why this is secure (mechanics & threat model):
What about a 12 digit numerical PUK only ?
12-digit numeric PUK (000000000000–999999999999) = 10 possibilities per digit – 1,000,000,000,000 possibilities
So, length + alphabet size + randomness all multiply to the total work for an attacker. Small drops in any of those dramatically reduce attacker work. We do NOT advise using a PUK with numbers only, as it significantly reduces the security
Important caveats and what reduces security;