<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Password Strength, get familiar with it.</title><link>https://community.element14.com/technologies/security/w/documents/10421/password-strength-get-familiar-with-it</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Password Strength, get familiar with it.</title><link>https://community.element14.com/technologies/security/w/documents/10421/password-strength-get-familiar-with-it</link><pubDate>Fri, 08 Oct 2021 05:12:30 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:efc3f68b-93fe-46e3-9287-ed80937bebed</guid><dc:creator>DebuggerGuys</dc:creator><comments>https://community.element14.com/technologies/security/w/documents/10421/password-strength-get-familiar-with-it#comments</comments><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 5:12:30 AM&lt;br /&gt;
&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Sometimes it becomes a real pain and massive headache when you must remember 20 different passwords for important things every single day, and having the very same one password for more than one account is a dangerous thing to do and a not-so recommendable practice. As well, if you have the idea that it&amp;#39;s very unsafe to write them down somewhere, whether digitally or non-digitally, you and I think pretty much alike. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Nevertheless, it is something we must get used to somehow, and the methods we use to keep those passwords safe are not handy most of the times, right?&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Anyway! This post attempts to compile and remind you the best practices in keeping out passwords secure, and dealing in between the vast number of services we daily log into and log out of.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Firstable, let&amp;#39;s define what are the elements that make our password secure enough. &lt;a href="http://data.whicdn.com/images/33132948/login(1)_large.jpg"&gt;&lt;img alt="Login(1)_large" class="jiveImage" src="http://data.whicdn.com/images/33132948/login(1)_large.jpg" style="float:right;padding:15px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;length&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of dictionary words&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of relevant user information (first name, last name, birth date)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of common patterns&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;the combination of lower and uppercase letters, numbers and special characters.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;The mixture of different character types makes up what’s called the “keyspace”. The keyspace can be computed through the formula C&lt;sup&gt;N&lt;/sup&gt;, C being the number of possible characters and N being the length of the password. To determine the keyspace of the “oh, so common” example, ‘password’, we would use the above formula C&lt;sup&gt;N&lt;/sup&gt;. This example uses only lowercase letters which would bring the C in the formula to 26, i.e. the number of all possible lowercase letters [a-z]. The exponent N is simply the length of the password ‘password’ which in this case equals 8. For our example, the formula turns out to be &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=26%5E8" rel="nofollow ugc noopener" target="_blank"&gt;26&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt; or roughly 208 billion.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;So this means that for an attacker to perform a brute force attack, like trying every single possibility in the keyspace, they would need to try roughly 208 billion possibilities. At first glance you may be thinking, “Oh, that sounds like a pretty secure number to me.” But in reality, it really isn’t.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;There are many advanced programs and techniques that are used to speed up the password cracking process including: GPU based cracking, rainbow table assisted cracking, cloud based cracking, and statistical pattern assisted cracking. Using GPU base cracking, a single &lt;a class="jive-link-external-small" href="http://www.amd.com/us/products/desktop/graphics/7000/7970/Pages/radeon-7970.aspx" rel="nofollow ugc noopener" target="_blank"&gt;AMD Radeon HD 7970&lt;/a&gt; can reach speeds of up to 8.2 billion passwords per second. [1] If an attacker were to use the brute force method he or she would crack our example “password” in just less than 26 seconds.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Following the above guideline for password strength is paramount to keeping your passwords secure against the multitude of password cracking attacks. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;There is a seemingly age old argument of &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2005/07/passwords-vs-pass-phrases.html" rel="nofollow ugc noopener" target="_blank"&gt;passwords vs. passphrases&lt;/a&gt;. That is, use a long, easier to remember passphrase compared to a more compact, but difficult to remember password. An example of a passphrase can be the name of your favorite book, “So Long, and Thanks for All the Fish” which would have a keyspace of &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=85%5E36" rel="nofollow ugc noopener" target="_blank"&gt;85&lt;sup&gt;36&lt;/sup&gt;&lt;/a&gt; or roughly around 2 duovigintillion (I swear it’s a real thing). Whereas, an example of a password could be ‘xYaQxrz8!’, which would have a keyspace of &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=95%5E9" rel="nofollow ugc noopener" target="_blank"&gt;95&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt; or roughly 630 quadrillion. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Seems strong enough right? Hopefully you will still get those headaches once in a while but you&amp;#39;re online services will be secured up. The technique I use to avoid headaches is writting keywords similar to my passwords or linking them with a personal experience...(I guess my memory isn&amp;#39;t that bad after all). It can also help writing a big note with a random story that includes them...the matter here is to find a way to maintain them and keep thieves away. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: security, password, account, strength, online&lt;/div&gt;
</description></item></channel></rss>