I just did a count of the systems I use that require a password and gave up at 40. I know I’m not alone; for many of us, it often seems we have too many passwords to manage. They are, however, required to access most of the systems we interact with for work, entertainment, and everyday living. Perhaps it is because they are so ubiquitous that we take them for granted without ever really understanding how they work.
Passwords picture from Shutterstock
Passwords are an example using of something you know to prove your identity. In security circles it is often said the way we prove our identity falls into three categories:
- something you have, such as a bank card
- something you are, such as some form of biometric such as a photograph of the user, fingerprint or iris scan
- something you know, with passwords being the most common example
What are passwords really made of?
Well-designed password systems never store passwords directly. What’s stored instead is
- the hash – a cryptographic function that takes a sequence of characters or numbers and generates a sequence based on it
- the salt – some additional characters which do not form part of the password, but are added during encryption to make it harder for hackers to hack password files
The output of a hash function tells you very little about its input so is very difficult to reverse.
It takes vastly more computation to reverse a hash value than it takes to calculate it.
When a password is entered into a system, the hash of the password and any salt value is calculated and compared with the stored value.
If it matches then the user knows the password and identity is assumed to be proved.
“Assumed to be proved” is an important point. Because we have so many passwords, people tend to reuse them or choose passwords that are easily remembered but also, unfortunately, easily guessed.
As a result, passwords by themselves are often regarded as inadequate proof of identity.
Certainly when we get cash from an ATM or pay for goods via EFTPOS the password (the PIN) is not sufficient proof or identity.
In those cases a second form of identity proof (the bank card) is also required.
Of course, PINs are not particularly good passwords, being so short and restricted to the digits 0 to 9, but in general, where reasonably strong level of proof of identity is needed passwords alone are usually regarded as insufficient.
Using rainbows to generate a storm
One of the reasons passwords are less trusted than they once were is the availability on the internet of rainbow tables, which are precomputed tables that enable the hash of passwords to be reversed.
For example, rainbow tables are used in dictionary attacks, where real words found in the dictionary are used for passwords.
Rainbow tables also exist for passwords that are all lower case and fewer than eight characters long.
What’s the big deal?
Often it is not understood why cracking of any password is a serious matter. What does it matter if passwords to the office footy tipping competition are compromised?
Unfortunately, it matters a great deal because of the way people use passwords.
Most of us have many passwords; far too many to be able to remember. As a result, we tend to reuse them.
The password used for low risk systems such as the office footy tipping competition will often be reused in high risk systems such as internet banking, email systems, and the like.
In this way, compromising one low risk system may compromise a much higher risk system. Consequently, it is important to use different passwords for different systems.
Or, if this is too difficult, at the very least use unique passwords for high risk systems.
This gets us to the vexed question of whether systems should force regular password changes. As always in security system design the answer is “it depends”.
In some cases the importance of the information protected is such that it warrants a regular change of password.
But often forcing regular changes of password is counterproductive. We have so many passwords as it is, and forcing us to change them regularly may cause us to choose passwords that are easy to remember but also easy to crack.
What makes a good password?
[related title=”MORE PASSWORD TIPS” tag=”password-roundup” items=”5″]A good password should be easy to remember but almost impossible for others to guess.
It should either include characters from a large character set (such as upper and lower case, numeric and non-numeric characters) or be very long.
Some approaches are to make use of information that only you can possibly know, such as the phone number of a girlfriend or boyfriend from a few decades ago, the street you lived on when at high school, or something similar.
Of course, in these days of social media, such information is not always as unknowable as it once was.
You might blend multiple sources of such information and include some non-numeric characters in a way only you know and perhaps include the name of the site.
Another suggestion is to choose long random sequences for passwords and write them down on a list which you store in your wallet, or use a password manager such as those available as an app on most mobile phones these days.
Such advice is controversial (particularly writing passwords down) but the counterargument is that most of us are quite good at securing our wallets, and the rainbow table based systems for cracking passwords are so sophisticated that anything other than a random sequence is vulnerable to a dictionary attack.
This advice does beg the question: what happens if you lose your mobile phone or your wallet, or forget the password to your password manager application?
So, are there alternatives to passwords?
Not really. Of course if the system being protected warrants it, there are alternatives such as security token systems, retina and iris scans, fingerprint systems, and face recognition, to name but a few.
But there is nothing as cheap and as well understood as passwords.
So keep your memory sharp – passwords are likely to be around a while yet.
Philip Branch is Senior Lecturer in Telecommunications at Swinburne University of Technology. He does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.
This article was originally published at The Conversation. Read the original article.
Comments
9 responses to “How To Choose Passwords (And Why We Need Them)”
How much safer is a foreign word (with some numbers) as opposed to English?
depend on how popular the foreign language/word is, I’d guess.
If I have to constantly change my password there is something better than foreign words – I use radio call signs, sport team names with number combinations, car model codes, computer parts codes. Anything that is typically easy to remember in your hobby and has a jumble of letters, but obscure for a dictionary brute-force attack. Most people remember certain code sequences of things they like, but it can be obscure to anyone else. Of course it’s not perfect and can still be cracked in time, but at least you’re making it a pain to do so, but at the same time easy for you to remember.
To anyone who hasn’t used a password manager, I highly recommend it.
I use LastPass myself, I only need to remember one very secure password (21 characters of all types in my case) and I can then generate a unique password for every single web site I visit.
It also helps me remember which sites I have accounts for as they’re all easily searchable.
Also has fingerprint scanner support for my laptop in case I ever somehow forget my password.
No more duplicate passwords again ever.
If 90% of people did the same, the other 10% would be more secure as the crackers would be less inclined to bother if they were getting less out of it.
Yep, I use LastPass as well. I also use 2-factor authentication where available (including LastPass). I also tend to sign up to a lot of shit with a disposable email so I only keep my main email for stuff I need to keep track of and/or trust.
Interesting logic on your 90/10 theory
I do the same, but I don’t type the alphabet to login to LastPass…I’d say that’s a little over the top!
If the system supports Unicode – throw in some fancy characters! 03C0, 03B1, 0E13, 1158: παณᅘ
pi-alpha-[thai]-[korean] is four symbols, but each one is selected from over 60 thousand possibilities.
Step (1) – Decide to use Password Manager
Step (2) – Install and use LastPass
Step (3) – Move onto the next of life’s problems (this one is now SOLVED!)
Step (2) – should read “Install and use Password Manager”
KeePass is my choice but any PM is an assett to password security
http://dottech.org/84605/windows-best-free-password-manager-program-lastpass-vs-dashlane-vs-keepass-vs-roboform/