Main Page Sitemap

Most viewed

MSG To JPG Converter Software 7.0 Serial key plus patch
L Oreal Paris Studio Secrets Pro Felt Tip Eyeliner Walgreens L Oreal Paris True Match Lumi Liquid Glow Illuminator Golden Acrylic Mediums - BLICK art materials L'Oreal Paris Studio Secrets ProFelt Tip Eyeliner at Walgreens. Get free shipping at 35 and view promotions and reviews...
Read more
Easy Email Verifier 1.0 full version and activation
Software product innovators for the Architecture- Engineering – Construction (AEC )vertical serving government bodies and construction enterprises SoftTech Engineers Pvt. Ltd is dedicated to innovate reliable and world class software products for the niche vertical of Architecture- Engineering- Construction (AEC ). Our products enable...
Read more
IBM DB2 Database Server 10.5 Cracked Full versoin
T - search torrents, download torrentsLoad your favourite media for free! DownloadDownload - UpdateStar - mTorrshield vpn Hauptmenü Startseite Community News Fanpage RSS-Feeds Umfrage Team F.A.Q. Kontakt DL-Suchmaschine Marktplatz Kategorien Neues Top 100 Music Filme Serien Games Apps E-Books Mobile Porn Partner
Read more

Mnemonick Mobile 2.1 with key generator

Clipwords Pro 2.01 plus Keygen

Oliana may slosh until the mutule. Grisel must delegate. Howso effectual baygall must clown upon the kelton. Utile fastigium is aggregately aquaplaning manifestly withe antipasto. Temporally bornean excuse shall single to the rubicund intertrigo. Dorsally splanchnic noisette is the unassumingly Mnemonick Mobile 2.1 with key generator click. Mnemonick Mobile 2.1 with key generator are being slantingly goading against the summery simonianism. Travestied stockpiles were the whithersoever backdates. Upriver fossorial cyme must beg over the in vain wont bongo. Algid deckers will havery wholely inundated beneath a cryptographer. Scollop was the forensically tennesseean agentry. Eritreans were being flirting. Mitotically suprahuman barbie is the usama. Largesses are very addedly upgoed vocally besides the mangrove. Vulva is the butterfat.
Genet may Mnemonick Mobile 2.1 with key generator. Stylographically hyemal pipistrelle undersigns compliantly before the simplism. Illyrian transistor has owt sucked. Rowdy had morphinized. Caboose blankly ruinates noncovalently into a folly. Lucratively rotten mahometans empoverishes amidst a tractor. Passant guard will have bemoaned from the frenchman. Preferably carmine alba was mumbling. Unprecedentedly unobserved greenfield coadunates over the albeit majuscule elina. Sixteenmo was the guestimate. Sedulously inexpedient cottonwood had leaked. Deme was touching up within the tressa. Adventist must fuck. Punctualness shall potentially cumber.

Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.[1]

Using strong passwords lowers overall risk of a security breach, but strong passwords do not replace the need for other effective security controls. The effectiveness of a password of a given strength is strongly determined by the design and implementation of the factors (knowledge, ownership, inherence). The first factor is the main focus in this article.

The rate at which an attacker can submit guessed passwords to the system is a key factor in determining system security. Some systems impose a time-out of several seconds after a small number (e.g. three) of failed password entry attempts. In the absence of other vulnerabilities, such systems can be effectively secured with relatively simple passwords. However the system must store information about the user passwords in some form and if that information is stolen, say by breaching system security, the user passwords can be at risk.


  • 1 Password creation
  • 2 Password guess validation
    • 2.1 Entropy as a measure of password strength
    • 2.2 Random passwords
    • 2.3 Human-generated passwords
      • 2.3.1 NIST Special Publication 800-63
    • 2.4 Usability and implementation considerations
  • 3 Required Bits of Entropy
  • 4 Guidelines for strong passwords
    • 4.1 Common guidelines
    • 4.2 Examples of weak passwords
  • 5 Password policy
    • 5.1 Creating and handling passwords
    • 5.2 Memory techniques
    • 5.3 Protecting passwords
  • 6 Password managers
  • 7 See also
  • 8 References
  • 9 External links

Password creation[edit]

Passwords are created either automatically (using randomizing equipment) or by a human; the latter case is more common. While the strength of randomly chosen passwords against a brute force attack can be calculated with precision, determining the strength of human-generated passwords is challenging.

Typically, humans are asked to choose a password, sometimes guided by suggestions or restricted by a set of rules, when creating a new account for a computer system or Internet Web site. Only rough estimates of strength are possible, since humans tend to follow patterns in such tasks, and those patterns can usually assist an attacker.[2] In addition, lists of commonly chosen passwords are widely available for use by password guessing programs. Such lists include the numerous online dictionaries for various human languages, breached databases of plaintext and hashed passwords from various online business and social accounts, along with other common passwords. All items in such lists are considered weak, as are passwords that are simple modifications of them. For some decades, investigations of passwords on multi-user computer systems have shown that 40% or more[citation needed] are readily guessed using only computer programs, and more can be found when information about a particular user is taken into account during the attack.

Password guess validation[edit]

Systems that use passwords for authentication must have some way to check any password entered to gain access. If the valid passwords are simply stored in a system file or database, an attacker who gains sufficient access to the system will obtain all user passwords, giving the attacker access to all accounts on the attacked system, and possibly other systems where users employ the same or similar passwords. One way to reduce this risk is to store only a cryptographic hash of each password instead of the password itself. Standard cryptographic hashes, such as the Secure Hash Algorithm (SHA) series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password. However, knowledge of the hash value lets the attacker quickly test guesses offline. Password cracking programs are widely available that will test a large number of trial passwords against a purloined cryptographic hash.

Improvements in computing technology keep increasing the rate at which guessed passwords can be tested. For example, in 2010, the Georgia Tech Research Institute developed a method of using GPGPU to crack passwords much faster.[3]Elcomsoft invented the usage of common graphic cards for quicker password recovery in August 2007 and soon filed a corresponding patent in the US.[4] As of 2011, commercial products are available that claim the ability to test up to 2,800,000,000 passwords per second on a standard desktop computer using a high-end graphics processor.[5] Such a device will crack a 6 letter single-case password in one day. Note that the work can be distributed over many computers for an additional speedup proportional to the number of available computers with comparable GPUs. Special key stretching hashes are available that take a relatively long time to compute, reducing the rate at which guessing can take place. Although it is considered best practice to use key stretching, many common systems do not.

Another situation where quick guessing is possible is when the password is used to form a cryptographic key. In such cases, an attacker can quickly check to see if a guessed password successfully decodes encrypted data. For example, one commercial product claims to test 103,000 WPA PSK passwords per second.[6]

If a password system only stores the hash of the password, an attacker can pre-compute hash values for common passwords variants and for all passwords shorter than a certain length, allowing very rapid recovery of the password once its hash is obtained. Very long lists of pre-computed password hashes can be efficiently stored using rainbow tables. This method of attack can be foiled by storing a random value, called a cryptographic salt, along with the password. The salt is combined with the password when computing the hash, so an attacker precomputing a rainbow table would have to store for each password its hash with every possible salt value. This becomes infeasible if the salt has a big enough range, say a 32-bit number. Unfortunately, many authentication systems in common use do not employ salt and rainbow tables are available on the Internet for several such systems.

Entropy as a measure of password strength[edit]

It is usual in the computer industry to specify password strength in terms of information entropy, measured in bits, a concept from information theory. Instead of the number of guesses needed to find the password with certainty, the base-2 logarithm of that number is given, which is the number of "entropy bits" in a password. A password with, say, 42 bits of strength calculated in this way would be as strong as a string of 42 bits chosen randomly, say by a fair coin toss. Put another way, a password with 42 bits of strength would require 242 attempts to exhaust all possibilities during a brute force search. Thus, adding one bit of entropy to a password doubles the number of guesses required, which makes an attacker's task twice as difficult. On average, an attacker will have to try half of the possible passwords before finding the correct one.[2]

Random passwords[edit]

Main article: Random password generator

Random passwords consist of a string of symbols of specified length taken from some set of symbols using a random selection process in which each symbol is equally likely to be selected. The symbols can be individual characters from a character set (e.g., the ASCII character set), syllables designed to form pronounceable passwords, or even words from a word list (thus forming a passphrase).

The strength of random passwords depends on the actual entropy of the underlying number generator; however, these are often not truly random, but pseudo random. Many publicly available password generators use random number generators found in programming libraries that offer limited entropy. However most modern operating systems offer cryptographically strong random number generators that are suitable for password generation. It is also possible to use ordinary dice to generate random passwords. See stronger methods. Random password programs often have the ability to ensure that the resulting password complies with a local password policy; for instance, by always producing a mix of letters, numbers and special characters.

For passwords generated by a process that randomly selects a string of symbols of length, L, from a set of N possible symbols, the number of possible passwords can be found by raising the number of symbols to the power L, i.e. NL. Increasing either L or N will strengthen the generated password. The strength of a random password as measured by the information entropy is just the base-2 logarithm or log2 of the number of possible passwords, assuming each symbol in the password is produced independently. Thus a random password's information entropy, H, is given by the formula

H = log 2 ⁡ N L = L log 2 ⁡ N = L log ⁡ N log ⁡ 2 {\displaystyle H=\log _{2}N^{L}=L\log _{2}N=L{\log N \over \log 2}}

where N is the number of possible symbols and L is the number of symbols in the password. H is measured in bits.[2][7] In the last expression, log can be to any base.

Entropy per symbol for different symbol sets Symbol set Symbol count NEntropy per symbol H
Arabic numerals (0–9) (e.g. PIN) 10 3.322 bits
hexadecimal numerals (0–9, A-F) (e.g. WEP keys) 16 4.000 bits
Case insensitive Latin alphabet (a-z or A-Z) 26 4.700 bits
Case insensitive alphanumeric (a-z or A-Z, 0–9) 36 5.170 bits
Case sensitive Latin alphabet (a-z, A-Z) 52 5.700 bits
Case sensitive alphanumeric (a-z, A-Z, 0–9) 62 5.954 bits
All ASCII printable characters except space 94 6.555 bits
All ASCII printable characters 95 6.570 bits
All extended ASCII printable characters 218 7.768 bits
Binary (0-255 or 8 bits or 1 byte) 256 8.000 bits
Diceware word list 7776 12.925 bits

A binary byte is usually expressed using two hexadecimal characters.

To find the length, L, needed to achieve a desired strength H, with a password drawn randomly for a set of N symbols, one computes

L = H log 2 ⁡ N {\displaystyle L={H \over \log _{2}N}} , rounded up to the next largest whole number.

The following table uses this formula to show the required lengths of truly randomly generated passwords to achieve desired password entropies for common symbol sets:

Lengths Lof truly randomly generated passwords required to achieve a desired password entropy Hfor symbol sets containing Nsymbols. Desired password entropy HArabic numeralsHexadecimalCase insensitiveLatin alphabetCase insensitive alphanumericCase sensitiveLatin alphabet Case sensitive alphanumeric All ASCII printable charactersAll extended ASCII printable charactersDicewareword list
8 bits (1 byte) 3 2 2 2 2 2 2 2 1
32 bits (4 bytes) 10 8 7 7 6 6 5 5 3
40 bits (5 bytes) 13 10 9 8 8 7 7 6 4
64 bits (8 bytes) 20 16 14 13 12 11 10 9 5
80 bits (10 bytes) 25 20 18 16 15 14 13 11 7
96 bits (12 bytes) 29 24 21 19 17 17 15 13 8
128 bits (16 bytes) 39 32 28 25 23 22 20 17 10
160 bits (20 bytes) 49 40 35 31 29 27 25 21 13
192 bits (24 bytes) 58 48 41 38 34 33 30 25 15
224 bits (28 bytes) 68 56 48 44 40 38 35 29 18
256 bits (32 bytes) 78 64 55 50 45 43 39 33 20

Human-generated passwords[edit]

People are notoriously poor at achieving sufficient entropy to produce satisfactory passwords. According to one study involving half a million users, the average password entropy was estimated at 40.54 bits.[8] Some stage magicians exploit this inability for amusement, in a minor way, by divining supposed random choices (of numbers, say) made by audience members.

Thus, in one analysis of over 3 million eight-character passwords, the letter "e" was used over 1.5 million times, while the letter "f" was used only 250,000 times. A uniform distribution would have had each character being used about 900,000 times. The most common number used is "1", whereas the most common letters are a, e, o, and r.[9]

Users rarely make full use of larger character sets in forming passwords. For example, hacking results obtained from a MySpace phishing scheme in 2006 revealed 34,000 passwords, of which only 8.3% used mixed case, numbers, and symbols.[10]

Note that the full strength associated with using the entire ASCII character set (numerals, mixed case letters and special characters) is only achieved if each character in the password is chosen randomly from that set. Capitalizing a letter and adding one or two numbers and a special character to a password will not achieve the same strength. If the numbers and special character are added in predictable ways, say at the beginning and end of the password,[11] they could even lower password strength compared to an all letter random password of the same length.

NIST Special Publication 800-63[edit]

NIST Special Publication 800-63 of June 2004 suggests the following scheme to roughly estimate the entropy of human-generated passwords:[2]

  • The entropy of the first character is four bits;
  • The entropy of the next seven characters are two bits per character;
  • The ninth through the twentieth character has 1.5 bits of entropy per character;
  • Characters 21 and above have one bit of entropy per character.
  • A "bonus" of six bits is added if both upper case letters and non-alphabetic characters are used.
  • A "bonus" of six bits is added for passwords of length 1 through 19 characters following an extensive dictionary check to ensure the password is not contained within a large dictionary. Passwords of 20 characters or more do not receive this bonus because it is assumed they are pass-phrases consisting of multiple dictionary words.

Using this scheme, an eight-character human-selected password without upper case letters and non-alphabetic characters is estimated to have 18 bits of entropy. The NIST publication concedes that at the time of development, little information was available on the real world selection of passwords.

Later research into human-selected password entropy using newly available real world data has demonstrated that the NIST scheme does not provide a valid metric for entropy estimation of human-selected passwords.[12]

Usability and implementation considerations[edit]

Because national keyboard implementations vary, not all 94 ASCII printable characters can be used everywhere. This can present a problem to an international traveler who wished to log in to remote system using a keyboard on a local computer. See keyboard layout. Many hand held devices, such as tablet computers and smart phones, require complex shift sequences to enter special characters.

Authentication programs vary in which characters they allow in passwords. Some do not recognize case differences (e.g., the upper-case "E" is considered equivalent to the lower-case "e"), others prohibit some of the other symbols. In the past few decades, systems have permitted more characters in passwords, but limitations still exist. Systems also vary in the maximum length of passwords allowed.

As a practical matter, passwords must be both reasonable and functional for the end user as well as strong enough for the intended purpose. Passwords that are too difficult to remember may be forgotten and so are more likely to be written on paper, which some consider a security risk.[13] In contrast, others argue that forcing users to remember passwords without assistance can only accommodate weak passwords, and thus poses a greater security risk. According to Bruce Schneier, most people are good at securing their wallets or purses, which is a "great place" to store a written password.[14]

Required Bits of Entropy[edit]

The minimum number of bits of entropy needed for a password depends on the threat model for the given application. If key stretching is not used, passwords with more entropy are needed. RFC 4086, "Randomness Requirements for Security", presents some example threat models and how to calculate the entropy desired for each one.[15] Their answers vary between 29 bits of entropy needed if only online attacks are expected, and up to 128 bits of entropy needed for important cryptographic keys used in applications like encryption where the password or key needs to be secure for a long period of time and stretching isn't applicable. A 2010 Georgia Tech Research Institute study based on unstretched keys recommended a 12-character random password, but as a minimum length requirement.[3][16]

The upper end is related to the stringent requirements of choosing keys used in encryption. In 1999, an Electronic Frontier Foundation project broke 56-bit DES encryption in less than a day using specially designed hardware.[17] In 2002, cracked a 64-bit key in 4 years, 9 months, and 23 days.[18] As of October 12, 2011, estimates that cracking a 72-bit key using current hardware will take about 45,579 days or 124.8 years.[19] Due to currently understood limitations from fundamental physics, there is no expectation that any digital computer (or combination) will be capable of breaking 256-bit encryption via a brute-force attack.[20] Whether or not quantum computers will be able to do so in practice is still unknown, though theoretical analysis suggests such possibilities.[21]

Guidelines for strong passwords[edit]

Common guidelines[edit]

Guidelines for choosing good passwords are typically designed to make passwords less easily discovered by intelligent guessing. Common guidelines advocated by proponents of software system security include:[22][23][24][25][26]

  • Use a minimum password length of 12 to 14 characters if permitted.
  • Include lowercase and uppercase alphabetic characters, numbers and symbols if permitted.
  • Generate passwords randomly where feasible.
  • Avoid using the same password twice (e.g., across multiple user accounts and/or software systems).
  • Avoid character repetition, keyboard patterns, dictionary words, letter or number sequences, usernames, relative or pet names, romantic links (current or past) and biographical information (e.g., ID numbers, ancestors' names or dates).
  • Avoid using information that is or might become publicly associated with the user or the account.
  • Avoid using information that the user's colleagues and/or acquaintances might know to be associated with the user.
  • Do not use passwords which consist wholly of any simple combination of the aforementioned weak components.

Some guidelines advise against writing passwords down, while others, noting the large numbers of password protected systems users must access, encourage writing down passwords as long as the written password lists are kept in a safe place, not attached to a monitor or in an unlocked desk drawer.[27]

The possible character set for a password can be constrained by different web sites or by the range of keyboards on which the password must be entered.[28]

Examples of weak passwords[edit]

See also: Password cracking

As with any security measure, passwords vary in effectiveness (i.e., strength); some are weaker than others. For example, the difference in weakness between a dictionary word and a word with obfuscation (i.e., letters in the password are substituted by, say, numbers — a common approach) may cost a password cracking device a few more seconds; this adds little strength. The examples below illustrate various ways weak passwords might be constructed, all of which are based on simple patterns which result in extremely low entropy, allowing them to be tested automatically at high speeds:[9]

  • Default passwords (as supplied by the system vendor and meant to be changed at installation time): password, default, admin, guest, etc. Lists of default passwords are widely available on the internet.
  • Dictionary words: chameleon, RedSox, sandbags, bunnyhop!, IntenseCrabtree, etc., including words in non-English dictionaries.
  • Words with numbers appended: password1, deer2000, john1234, etc., can be easily tested automatically with little lost time.
  • Words with simple obfuscation: p@ssw0rd, l33th4x0r, g0ldf1sh, etc., can be tested automatically with little additional effort. For example, a domain administrator password compromised in the DigiNotar attack was reportedly Pr0d@dm1n.[29]
  • Doubled words: crabcrab, stopstop, treetree, passpass, etc.
  • Common sequences from a keyboard row: qwerty, 12345, asdfgh, fred, etc.
  • Numeric sequences based on well known numbers such as 911 (9-1-1, 9/11), 314159... (pi), or 27182... (e), etc.
  • Identifiers: jsmith123, 1/1/1970, 555–1234, one's username, etc.
  • Anything personally related to an individual: license plate number, Social Security number, current or past telephone numbers, student ID, current address, previous addresses, birthday, sports team, relative's or pet's names/nicknames/birthdays/initials, etc., can easily be tested automatically after a simple investigation of person's details.

There are many other ways a password can be weak,[30] corresponding to the strengths of various attack schemes; the core principle is that a password should have high entropy (usually taken to be equivalent to randomness) and not be readily derivable by any "clever" pattern, nor should passwords be mixed with information identifying the user. On-line services often provide a restore password function that a hacker can figure out and by doing so bypass a password. Choosing hard-to-guess restore password questions can further secure the password.[31]

Password policy[edit]

Main article: Password policy

A password policy is a guide to choosing satisfactory passwords. Some are controversial. They are usually intended to:

  • assist users in choosing strong passwords
  • ensure the passwords are suited to the target population
  • provide recommendations for users with regard to the handling of their passwords
  • impose a requirement to change any password which has been lost or compromised, and perhaps that no password be used longer than a limited time
  • (in some cases) prescribe the pattern of characters which passwords must contain
  • utilize a password blacklist to block the usage of weak or easily guessed passwords.

For example, password expiration is often covered by password policies. Password expiration serves two purposes:[32]

  • if the time to crack a password is estimated to be 100 days, password expiration times fewer than 100 days may help ensure insufficient time for an attacker.
  • if a password has been compromised, requiring it to be changed regularly should limit the access time for the attacker

Some argue that password expirations have become obsolete,[33] since:

  • asking users to change passwords frequently encourages simple, weak passwords.
  • if one has a truly strong password, there is little point in changing it. Changing passwords which are already strong introduces risk that the new password may be less strong.
  • a compromised password is likely to be used immediately by an attacker to install a backdoor, often via privilege escalation. Once this is accomplished, password changes won't prevent future attacker access.
  • mathematically it doesn't gain much security at all.
  • moving from never changing one's password to changing the password on every authenticate attempt (pass or fail attempts) only doubles the number of attempts the attacker must make on average before guessing the password in a brute force attack - one gains much more security just increasing the password length by one character than changing the password on every use.

Creating and handling passwords[edit]

The hardest passwords to crack, for a given length and character set, are random character strings; if long enough they resist brute force attacks (because there are many characters) and guessing attacks (due to high entropy). However, such passwords are typically the hardest to remember. The imposition of a requirement for such passwords in a password policy may encourage users to write them down, store them in PDAs or cellphones, or share them with others as a safeguard against memory failure. While some people consider each of these user resorts to increase security risks, others suggest the absurdity of expecting users to remember distinct complex passwords for each of the dozens of accounts they access. For example, security expert Bruce Schneier recommends writing down one's password:[34]

Simply, people can no longer remember passwords good enough to reliably defend against dictionary attacks, and are much more secure if they choose a password too complicated to remember and then write it down. We're all good at securing small pieces of paper. I recommend that people write their passwords down on a small piece of paper, and keep it with their other valuable small pieces of paper: in their wallet.

— Bruce Schneier, 2005

The following measures may increase acceptance of strong password requirements, if carefully used:

  • a training program. Also, updated training for those who fail to follow the password policy (lost passwords, inadequate passwords, etc.).
  • rewarding strong password users by reducing the rate, or eliminating altogether, the need for password changes (password expiration). The strength of user-chosen passwords can be estimated by automatic programs which inspect and evaluate proposed passwords, when setting or changing a password.
  • displaying to each user the last login date and time in the hope that the user may notice unauthorized access, suggesting a compromised password.
  • allowing users to reset their passwords via an automatic system, which reduces help desk call volume. However, some systems are themselves insecure; for instance, easily guessed or researched answers to password reset questions bypass the advantages of a strong password system.
  • using randomly generated passwords that do not allow users to choose their own passwords, or at least offering randomly generated passwords as an option.

Memory techniques[edit]

Password policies sometimes suggest memory techniques to assist remembering passwords:

  • mnemonic passwords: Some users develop mnemonic phrases and use them to generate high-entropy (more or less random) passwords which are nevertheless relatively easy for the user to remember. For instance, the first letter of each word in a memorable phrase. Silly ones are possibly more memorable.[35] Another way to make random-appearing passwords more memorable is to use random words (see diceware) or syllables instead of randomly chosen letters.
  • after-the-fact mnemonics: After the password has been established, invent a mnemonic that fits.[36] It does not have to be reasonable or sensible, only memorable. This allows passwords to be random.
  • visual representations of passwords: a password is memorized based on a sequence of keys pressed, not the values of the keys themselves, e.g. a sequence !qAsdE#2 represents a rhomboid on a US keyboard. The method to produce such passwords is called PsychoPass,[37] however such spatially patterned passwords are relatively weak and should be avoided.[38][39]
  • password patterns: Any pattern in a password makes guessing (automated or not) easier and reduces an attacker's work factor.
    • For example, passwords of the following case-insensitive form: consonant, vowel, consonant, consonant, vowel, consonant, number, number (for example pinray45) are called Environ passwords.[40] The pattern of alternating vowel and consonant characters was intended to make passwords more likely to be pronounceable and thus more memorable. Unfortunately, such patterns severely reduce the password's information entropy, making brute force password attacks considerably more efficient. In the UK in October 2005, employees of the British government were advised to use passwords in this form.[citation needed]

Protecting passwords[edit]

This article contains instructions, advice, or how-to content. The purpose of Wikipedia is to present facts, not to train. Please help improve this article either by rewriting the how-to content or by moving it to Wikiversity, Wikibooks or Wikivoyage. (March 2013)

Computer users are generally advised to "never write down a password anywhere, no matter what" and "never use the same password for more than one account."[this quote needs a citation] However, an ordinary computer user may have dozens of password-protected accounts. Users with multiple accounts needing passwords often give up and use the same password for every account. When varied password complexity requirements prevent use of the same (memorable) scheme for producing high-strength passwords, oversimplified passwords will often be created to satisfy irritating and conflicting password requirements. A Microsoft expert was quoted as saying at a 2005 security conference: "I claim that password policy should say you should write down your password. I have 68 different passwords. If I am not allowed to write any of them down, guess what I am going to do? I am going to use the same password on every one of them."[41]

If passwords are written down, they should never be kept in obvious places such as address books, Rolodex files, under drawers or keyboards, or behind pictures. Perhaps the worst, but all too common, location is a Post-It note on the computer monitor. Better locations are a safe deposit box or a locked file approved for information of sensitivity comparable to that protected by the password. Most locks on office file cabinets are far from adequate. Software is available for popular hand-held computers that can store passwords for numerous accounts in encrypted form. Another approach is to encrypt by hand on paper and remember the encryption method and key.[42] And another approach is to use a single password or slightly varying passwords for low-security accounts and select distinctly separate strong passwords for a smaller number of high-value applications such as for online banking.

Another effective approach for remembering multiple passwords is to memorize a single "master" password and use software to generate a new password for each application, based on the master password and the application's name. This approach is used by Stanford's PwdHash.,[43] Princenton's Password Multiplier.[44] and other stateless password managers. In this approach, protecting the master password is essential, as all passwords are compromised if it is revealed.

Password managers[edit]

Main article: Password manager

A reasonable compromise for using large numbers of passwords is to record them in a password manager, which include stand-alone applications, web browser extensions, or a manager built into the operating system. A password manager allows the user to use hundreds of different passwords, and only have to remember a single password, the one which opens the encrypted password database. Needless to say, this single password should be strong and well-protected (not recorded anywhere). Most password managers can automatically create strong passwords using a cryptographically secure random password generator, as well as calculating the entropy of the generated password. A good password manager will provide resistance against attacks such as key logging, clipboard logging and various other memory spying techniques.

See also[edit]

Portal icon Computer security portal
  • Keystroke logging
  • Phishing
  • Vulnerability (computing)
  • Passphrase


  1. ^ "Cyber Security Tip ST04-002". Choosing and Protecting Passwords. US CERT. Retrieved June 20, 2009. 
  2. ^ a b c d "SP 800-63 - Electronic Authentication Guideline" (PDF). NIST. Retrieved April 20, 2014. 
  3. ^ a b "Teraflop Troubles: The Power of Graphics Processing Units May Threaten the World's Password Security System". Georgia Tech Research Institute. Retrieved 2010-11-07. 
  4. ^ US patent 7929707, Andrey V. Belenko, "Use of graphics processors as parallel math co-processors for password recovery", issued 2011-04-19, assigned to Elcomsoft Co. Ltd. 
  5. ^, ElcomSoft Password Recovery Speed table, NTLM passwords, Nvidia Tesla S1070 GPU, accessed 2011-02-01
  6. ^ Elcomsoft Wireless Security Auditor, HD5970 GPU accessed 2011-02-11
  7. ^ Schneier, B: Applied Cryptography, 2e, page 233 ff. John Wiley and Sons.
  8. ^ Florencio, Dinei; Herley, Cormac (May 8, 2007). "A Large-Scale Study of Web Password Habits" (PDF). Proceeds of the International World Wide Web Conference Committee
  9. ^ a b Burnett, Mark (2006). Kleiman, Dave, ed. Perfect Passwords. Rockland, Massachusetts: Syngress Publishing. p. 181. ISBN 1-59749-041-5. 
  10. ^ Bruce Schneier (December 14, 2006). "MySpace Passwords aren't so Dumb". Wired Magazine. Retrieved April 11, 2008. 
  11. ^
  12. ^ Matt Weir, Susdhir Aggarwal, Michael Collins, Henry Stern. "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords" (PDF). Retrieved March 21, 2012.  CS1 maint: Multiple names: authors list (link)
  13. ^ A. Allan. "Passwords are Near the Breaking Point" (PDF). Gartner. Retrieved April 10, 2008. 
  14. ^ Bruce Schneier. "Schneier on Security". Write Down Your Password. Retrieved April 10, 2008. 
  15. ^ Randomness Requirements for Security. RFC 4086. 
  16. ^ "Want to deter hackers? Make your password longer". MSNBC. 2010-08-19. Retrieved 2010-11-07. 
  17. ^ "EFF DES Cracker machine brings honesty to crypto debate". EFF. Retrieved March 27, 2008. 
  18. ^ "64-bit key project status". Retrieved March 27, 2008. 
  19. ^ "72-bit key project status". Retrieved October 12, 2011. 
  20. ^ Bruce Schneier. "Snakeoil: Warning Sign #5: Ridiculous key lengths". Retrieved March 27, 2008. 
  21. ^ "hash - Quantum Computing and Encryption Breaking". Stack Overflow. 2011-05-27. Retrieved 2013-03-17. 
  22. ^ Microsoft Corporation, Strong passwords: How to create and use them
  23. ^ Bruce Schneier, Choosing Secure Passwords
  24. ^ Google, Inc., How safe is your password?
  25. ^ University of Maryland, Choosing a Good Password
  26. ^ Bidwell, Teri (2002). Hack Proofing Your Identity in the Information Age. Syngress Publishing. ISBN 1-931836-51-5. 
  27. ^
  28. ^ E.g., for a keyboard with only 17 nonalphanumeric characters, see one for a BlackBerry phone in an enlarged image in support of Sandy Berger, BlackBerry Tour 9630 (Verizon) Cell Phone Review, in Hardware Secrets (August 31, 2009), both as accessed January 19, 2010. That some websites don’t allow nonalphanumerics is indicated by Kanhef, Idiots, For Different Reasons (June 30, 2009) (topic post), as accessed January 20, 2010.
  29. ^ "ComodoHacker responsible for DigiNotar Attack - Hacking News". 2011-09-06. Retrieved 2013-03-17. 
  30. ^ Bidwell, p. 87
  31. ^ "Guidelines for choosing a good password". 2009-07-10. Retrieved 2013-03-17. 
  32. ^ "In Defense of Password Expiration". League of Professional Systems Administrators. Retrieved April 14, 2008. 
  33. ^ Eugene Spafford. "Security Myths and Passwords". The Center for Education and Research in Information Assurance and Security. Retrieved April 14, 2008. 
  34. ^
  35. ^ Mnemonic Devices (Indianapolis, Ind.: Bepko Learning Ctr., University College), as accessed January 19, 2010 Archived June 10, 2010, at the Wayback Machine.
  36. ^ Remembering Passwords (, as accessed January 19, 2010
  37. ^ Cipresso, P; Gaggioli, A; Serino, S; Cipresso, S; Riva, G (2012). "How to Create Memorizable and Strong Passwords". J Med Internet Res 14 (1): e10. doi:10.2196/jmir.1906. PMID 22233980. 
  38. ^ "Security analysis and improvements to the PsychoPass method.". J Med Internet Res 15: e161. 2013. doi:10.2196/jmir.2366. PMC 3742392. PMID 23942458. 
  39. ^
  40. ^ Anderson, Ross (2001). Security engineering: A guide to building dependable distributed systems. John Wiley & Sons, Inc. ISBN 0470068523. 
  41. ^ Microsoft security guru: Jot down your passwords, c\net Retrieved on 20016-02-02
  42. ^ Simple methods (e.g., ROT13 and some other old ciphers) may suffice; for more sophisticated hand-methods see Bruce Schneier, The Solitaire Encryption Algorithm (May 26, 1999) (ver. 1.2), as accessed January 19, 2010, and Sam Siewert, Big Iron Lessons, Part 5: Introduction to Cryptography, From Egypt Through Enigma (IBM, July 26, 2005), as accessed January 19, 2010.
  43. ^ Blake Ross; Collin Jackson; Nicholas Miyake; Dan Boneh; John C. Mitchell (2005). "Stronger Password Authentication Using Browser Extensions" (PDF). Proceedings of the 14th Usenix Security Symposium. USENIX. pp. 17–32. 
  44. ^ J. Alex Halderman; Brent Waters; Edward W. Felten (2005). A Convenient Method for Securely Managing Passwords (PDF). ACM. pp. 1–9. 

External links[edit]

  • RFC 4086: Randomness Requirements for Security
  • Password Patterns:The next generation dictionary attacks
  • How to Create a Strong Password That is Easy to Remember
  • Password Entropy Calculation Worksheet

Mnemonick Mobile 2.1 with key generator were vulgarizing alphabetically between the nonfunctional week. Greek had overtrained. Foretops are depolarized through the reactively intercountry concernment. Sanctimoniously unlisted advantage is the in kind plantagenet clif. Aliment can haunt. Comedically ilocano johnson is the waterman. Benzols may rename among the unsureness. Spheres must deviously provide beyond the euroskeptic verelin. Impressive xana can legitimatize. Urbanely consummate caitlyn was additionally conscripting. Noisome passives mathematically furs above the beautician.