close
GeneralHow To

Creating a Secure Password

    Creating a Secure Password

    As insecure as passwords generally are, they’re not going away anytime soon. Every year you have more and more passwords to deal with, and every year they get easier and easier to break. You need a strategy.Generating a Secure Password

    The best way to explain how to creating a secure passwords is to explain how they’re broken. The general attack model is what’s known as an offline password-guessing attack.

    In this scenario, the attacker gets a file of encrypted passwords from somewhere people want to authenticate to. His goal is to turn that encrypted file into unencrypted passwords he can use to authenticate himself. He does this by guessing passwords, and then seeing if they’re correct. He can try guesses as fast as his computer will process them – and he can parallelize the attack – and gets immediate confirmation if he guesses correctly. Yes, there are ways to foil this attack, and that’s why we can still have four-digit PINs on ATM cards, but it’s the correct model for breaking passwords.

    There are commercial programs that crack secure passwords, sold primarily to police departments. There are also hacker tools that do the same thing. And they’re really good.

    The efficiency of password cracking depends on two largely independent things: power and efficiency.

    Power is simply computing power. As computers have become faster, they’re able to test more passwords per second; one program advertises eight million per second. These crackers might run for days, on many machines simultaneously.  For a high-profile police case, they might run for months.

    Efficiency is the ability to guess passwords cleverly. It doesn’t make sense to run through every eight-letter combination from “aaaaaaaa” to “zzzzzzzz” in order. That’s 200 billion possible passwords, most of them very unlikely. Password crackers try the most common passwords first.

    A typical password consists of a root plus an appendage. The root isn’t necessarily a dictionary word, but it’s usually something pronounceable. An appendage is either a suffix (90% of the time) or a prefix (10% of the time). One cracking program I saw started with a dictionary of about 1,000 common passwords, things like “letmein,” “temp,” “123456,” and so on. Then it tested them each with about 100 common suffix appendages: “1,” “4u,” “69,” “abc,” “!,” and so on. It recovered about a quarter of all passwords with just these 100,000 combinations.

    Crackers use different dictionaries: English words, names, foreign words, phonetic patterns and so on for roots; two digits, dates, single symbols and so on for appendages. They run the dictionaries with various capitalizations and common substitutions: “$” for “s”, “@” for “a”, “1” for “l” and so on. This guessing strategy quickly breaks about two-thirds of all passwords.

    Modern password crackers combine different words from their dictionaries:

    What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.”

    This is why the oft-cited XKCD scheme for generating passwords — string together individual words like “correcthorsebatterystaple” —  is no longer good advice.  The password crackers are on to this trick.

    The attacker will feed any personal information he has access to about the password creator into the password crackers.  A good password cracker will test names and addresses from the address book, meaningful dates, and any other personal information it has. Postal codes are common appendages.  If it can, the guesser will index the target hard drive and create a dictionary that includes every printable string, including deleted files. If you ever saved an e-mail with your password, or kept it in an obscure file somewhere, or if your program ever stored it in memory, this process will grab it. And it will speed the process of recovering your password.

    Last year, Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break as many as possible. The winner got 90% of them, the loser 62% — in a few hours.  It’s the same sort of thing we saw in 2012, 2007, and earlier.  If there’s any new news, it’s that this kind of thing is getting easier faster than people think.

    Pretty much anything that can be remembered can be cracked.

    There’s still one scheme that works.  Back in 2008, I described the “Schneier scheme”:

    So if you want your password to be hard to guess, you should choose something that this process will miss. My advice is to take a sentence and turn it into a password. Something like “This little piggy went to market” might become “tlpWENT2m”. That nine-character password won’t be in anyone’s dictionary. Of course, don’t use this one, because I’ve written about it. Choose your own sentence — something personal.

    Here are some examples:

    WIw7,mstmsritt… = When I was seven, my sister threw my stuffed rabbit in the toilet.

    Wow…doestcst = Wow, does that couch smell terrible.

    Ltime@go-inag~faaa! = Long time ago in a galaxy not far away at all.

    uTVM,TPw55:utvm,tpwstillsecure = Until this very moment, these passwords were still secure.

    You get the idea. Combine a personally memorable sentence with some personally memorable tricks to modify that sentence into a password to create a lengthy password.  Of course, the site has to accept all of those non-alpha-numeric characters and an arbitrarily long password.  Otherwise, it’s much harder.

    Read more about creating secure passwords at www.boingboing.net.

      Leave a Response