We use the following base-case example to explain why a random PUK is secure:
Minimum measured time to test one PUK on the card: 60 milliseconds (0.06 seconds)
From that:
So, with our base-case 12-character random PUK and the card’s 60 ms per-try verification time, a full brute-force would take ~13 trillion years
Entropy explanation:
So, ~72.5 bits of entropy means the search space is large enough that brute forcing is computationally infeasible given the physical per-try speed enforced by the hardware
Why this is secure (mechanics & threat model):
Comparison between Cryptnox PUK and others
6-digit numeric PUK (000000–999999): 10⁶ possibilities.
Conclusion: a short numeric PUK is trivially brute-forcible in under a day if an attacker can continuously test guesses. This is why short numeric PUKs are unacceptable.
8-character alphanumeric (≈62 chars): 62⁸ ≈ 2.18×10¹⁴ possibilities.
So, length + alphabet size + randomness all multiply to the total work for an attacker. Small drops in any of those dramatically reduce attacker wor
Important caveats and what reduces security;