i wouldn't trust your windows logon password with those keys. Thanks to raindbow tables (look up ophcrack) you can crack a windows password in seconds~minutes. My logon password is 9 digits upper and lower case. It cracked it in 2 minutes.
That seems unlikely, because tables > 8 characters are rare. Even if it were true a nine character alpha-only password with mixed case isn't really that strong of a password to begin with. You would be much better off using a passphrase of 20 characters or more.
Regardless, this is why we recommend that you avoid using EFS in a standalone environment. If the machine is domain joined, and you are using a domain account, there will be no hash stored locally, it will be on the DC. And if someone gets access to the hashes on your DCs, you have bigger issues.
If you must use EFS in a non-domain situation, and are really concerned about someone cracking your password hash, you could enable SYSKEY to 2. With Vista you could also enable Bitlocker, which would protect both the hashes and the keys. And again, in Vista, the EFS keys can be stored on a smartcard, so that they are never on the hard drive. A thief would have to steal the laptop, the smartcard
and guess the PIN on the card before it locks.
So my point is, anyone who says that EFS is easily crackable is either not securing it properly (use a domain account, or enable SYSKEY=2 or use BitLocker) or is full of crap.