to my knowledge;
there is no real way to decrypt the *nix passwords. They are encrypted with a "one way hash" -- a mathematical process in which it is infeasable to unencrypt the data. This means that once a password is accepted, it is lost forever (well, almost). The sysadmin cannot retrive it, but can only [re]set it to a known value. See the book "applied cryptography" for details. also
http://www.aspencrypt.com/crypto101_hash.html There are, however, several programs that supply random passwords to the encryption algorithm and then check the result against the stored value. Use them to check the strength of your passwords. change weak passwords. Change passwords regularly and (fairly) frequently. Use all kinds of letters/numbers/punctuation/etc in the password; birthday attacks (the password is something personal about the person, like wife's name, soc. sec. number, birthday, etc) and dictionary attacks (the password is a word and appears in a standard dictionary) are the easiest to crack and the programs (usually) check these first. "rover" would be one of the first things a cracker would use as your password (especially if he/she know you have a dog named rover) and should be avoided. FuckBillGates would be slighty harder, but essentially falls to a variation of the dictionary attack. Try something along the lines of
since it is essentially random to begin with. For the ultra paranoid, use a 256 bit random key; for a computer running at the background radiation temperature of the universe (~3.5 K) to cycle through all values of a 256 bit counter, it would consume more energy than the sun puts out in 32 years -- and this doesn't take into account the energy necessary for computation.... (applied cryptography).
incedentally, PGP uses 1024 bit keys as default (i f i remember correctly).
-t.