How to easily create a much stronger password than you need to thwart a brute force attackTuesday, June 7th 2011 @ 8:14 PM (not yet rated)
If you have been struggling with the problem of how to keep passwords strong, yet memorable, we may have a simple answer for you. In the Security Now Podcast (episode 303) this week, Steve Gibson presents a very interesting analysis on what makes a good password these days. He calls it Password Haystacks, and there is a pretty simple solution to having to remember strong passwords.
Steve's conclusions are very compatible with my usual prefered strategy for choosing passwords - like using the first characters from a song or movie quote, and adding some special characters and numbers. But his advice is interesting about how simple the basic password root can be, and how to easily make it much stronger. It's pretty cool and simple.
The bottom line is that by adding length to a good, short password (regardless of whether or not they are repeated characters or patterns) you will massively improve resistance to a brute force attack. This is because today's attacker doesn't know how long the password is, for sure, and will always start with the easy dictionary words and patterns, and then they will move to the shortest possible character combinations in a brute force attack, followed by the next shortest combinations, and so on...
As an example, using this logic, a 23 character random password is not "usefully" stronger than a 3 character random password with 21 repeated characters.
There are some minor caveats in using this approach, to keep the passwords strong, such as having at least one lower, one upper case, one number and one special character in the root of the password. The rest of the characters don't really matter, as long as you don't reveal what pattern you use in the repeated characters or patterns.
For example "..B.o.B.........." is a pretty good password, since it would take at least 2 billion centuries with massive cracking array scenario to go through all combinations. So, you don't need a very long song title or movie phrase. You simply need to keep your simple pattern or strategy a secret.
The Security Now podcast episode (in text or audio format) where the rationale for this approach is described is at the following link:
http://www.grc.com/securitynow.htm (look for Episode 303)
Steve also has a web page that analyzes passwords in terms of how long a given password can be expected to stand up to various brute force attacks. You don't have to enter your real password, but try entering something that has the same length, and number of upper, lower case, numbers and special characters as your real password, and see how long it would take an attacker to try all combinations using a brute force approach.
If you aren't convinced, or if you want to learn more, post a question or comment below.
Something to ponder...
The Streetwise Security Coach
Twitter ID: http://www.twitter.com/streetsec
LinkedIn: http://www.linkedin.com/in/scottwright (please send a personal message first on LinkedIn if you'd like to connect, to ensure that you're not a spammer)
Did you find this post interesting?
If so, why not find out more?...
To download my FREE Security Management Resource Guide now, and to receive my series of Streetwise Security Tips, as well as my Streetwise Security News and updates click HERE.
Join the Streetwise Security Zone, or learn more about mobile security risks through the Honey Stick Project.
If your organization is looking for innovative ways to make its security investments more effective right now, CLICK HERE to learn more about Streetwise Security Awareness solutions.