Difficulty level |
Information for |
||||||||||
surfer |
|||||||||||
"John Doe"layman |
expert |
web-master |
[ Language ] :: [ Main Index ] :: [ Site Navigation ] :: [ Tutorials ] :: [ Downloads ] :: [ Contact ]
When you ask someone responssible how your password(s) should look like, he usually answers as typical assistant at any academy which need to prove himself that he is smart. You can heard something like: "At least 6 chars, better make it 10 . Difficult to guess for everyone but easy to remember for you. So nothing from dictionary, nothing personall. Better use a password-generator." Helpfull, isn't it?
Fair question right on the beginning. "Is it really SO IMPORTANT? Something really worth to care?" I personally believe that "Yes, it is. Definitelly!" Please, let me explain this. To say it simple, your password asserts the computer that you are really a person who claims you are. Anyone who knows your password will be able to do anything that you are allowed. Even worse: you can be called to responsibility for actions he performed. So I deeply believe, that passwords are definitelly worth about to care.
As I have done at my research for e-mail boxes' hiding, I conclude that I have to use the same method again. So I surf over the internet for a few weeks and checking. Not all of ideas here are original. In fact, most of them come from someone head. But as my "His Maginficance" (academy rector) said: "90% of any PhD's research is borrowing. You need those 10% to not be called a copyist or plagiarist." Hope those 10% of my original ideas are presented.
Well, I start with oppossite matter.
So, how the password should definetelly NOT looks like, or do not use as password ... :
- Word from any dictionary - no matter about language
- Word which has meaning in any context
- Name - no matter if it belongs to male, or female, persons living or death, real or fictional (like Shakespeare, myths, Bible, angels, etc.), pets, asteroids and other cosmic bodies (stars, satellites), machines, tools, entertaiment legends (cartoon, movies, sports, actors, songs, singers) and a lot of simillar
- Other gramatic categories - such as short-phrases, abbreviations
- Numerical, alphabetical and keyboard sequences
- Famous misspeled version of words
- So called SMS, or emoticon (smileys) shortcuts: e.g. QT = "cuttie", or U4E = "yours for ever", "@)" means "pig", ":-)" means "happy smile"
- Password you found somewhere - no matter if as example of good password
And additionally, any from the above modified in any of these ways:
- A single character before or after it - e.g. "earth1", "2enter"
- With single letter capitalized (not necessary on the beginning) - e.g. "Hello", "myAccess"
- Reversed, doubled or mirrored - e.g. "mice" modified to "ecim", "micemice", "miceecim"
- With characters substituted by numbers: the famous is substition "o" with "0" (oscar - zero) and "l" with "1" (india / lima - one) from typewriters. E.g. "1amg01ng".
- With signle word or phrase substituted by its SMS or Emoticon version. E.g. "see you soon" transformed to "CUsoon"
The most famous emoticons (smileys) and SMS phrases you can view in these text documents.
Maybe you have concluded that there is no possibility to create a password without help of some password generator. And, by the way, why not to use it to generate some random characters sequence? If it is good enough for application codes of multi-thousand-cost software, it is impossible to not be capable for such simple task.
True, but there is one difference: activation codes can be even 30 charcters long because there are always written down somewhere. Your password you must hold in your memory - otherwise it is meaningless.
You password length should be at least 6 characters long. The usual maximum is 8 characters because of UNIX systems restriction. They strip anything after the 8th character. Because the symetric algorithms are used, your password strength is from 48 bits to 64 bits. Any person with single computer which want to break this password by trying all possibilities will presently spend a more-less a whole year!
Maybe you heard that software from the end of 90's (like Microsoft Office '97 or Adobe Acrobat 4.0) has password strength limited up to 40 bits - using the International Traffic in Arms Regulation, which has been in receipt of disable to buy american technologies by nacist goverment back at 1943. Later it has been changed by Bill Clinton administrative to 56 bits. As for now, there are no restriction for some algorithms at USA and none restriction for any algorithm at European Union. Please see an official domain of European Parliament Committee Echelon at www.europarl.eu.int/committees/echelon_home.htm for details about interception capabilities. Or an Electronic Frontier Foundation site at www.eff.org. I mentioned this also at cookies tutorial. Appropriate legislatives are "Encryption Final Act" and "Network and Information Security" at EU and "Export Administration Regulation" (FAQs site) at USA.
I personally believe, that the only effective and actual (final) route is squeezing some phrase into a few letters and additionally to add there some numbers (punctuation, control characters - but do not ever use ^D, ^U or ^H !!!).
For example: let our phrase which help us to memorize our password will be: "Log-in every day and recalling the password is not fun." We will squeeze it to "lied&rpinf" and we change characters "l" and "i" to "1", so password will be "11ed&rp1nf". It has 9 characters so the last one will be ignored. Additionally we can capitalize e.g. "r" after shorted "and": so "11ed&Rp1nf".
Or you can take every second word, or every last letter (instead of first one), or something unimmaginable. Just use your immagination - but go futher than simple mispelling.
What letters-case you should prefer? Capital or lowercase? I think it is not a question of death or life. Most people prefer a lower-case letters, because the keyboard send them standartly and they are after a capital letters at ASCII / Unicode table. Their logic presume that someone who wants to crack a password by brute-force (it will check all possible combination) will logically used a simplest loop: for password_letter = 'A' to 'z' do ... . They are not wrong, usually. However, I saw a few source-codes which starts checking from lower letters, then continue with interpunction (mostly only '.', ':', '/', '\', '!' and the rest left to end of process), later with numbers and finally with capital letters. They are not signifficantly slower than simple loop for (more-less up to 0.1%) and probably found a correct phrase much-more quicker.
Your password you should keep to yourself and never give it to no one at any circumstancess. There are behind the famest breakthroughs usually not a technical skills, but trivial human psychology. A specially be aware for following still successful traps:
- System administrator e-mail, that he need your password to access your files, because you occupied too much space, or something simillar. System administrator never needs your password for any reason! His work simply does not depend on this knowledge.
- System administrator e-mail with request to change your password. The same as above - system administrator can change your password for himself in case of emergency.
- A telephone request for one of general access password from technician which accidentically forget his case. The most victims are from a fresh employee - those whih are just published at the newest firm magazine, or at appropriate board. Both media are accessed also for public. So, someone can try to call them and ask them for help.
Most of this kind of techniquess are described at classic novell The Cuckoo's Egg by Clifford Stoll. When you want to know more about real cases of human naivity, try to search web for phrase "social engineering".
You can translate or link this tutorial under conditions written at this domain's "Legal Stuff" page and followed. If any doubts, please contact me.
Copyrights, trademarks and credits are collected here.
Marián Stach
Prešov, Slovakia Central Europe
2003-09-08
[ Language ] :: [ Main Index ] :: [ Site Navigation ] :: [ Tutorials ] :: [ Downloads ] :: [ Contact ]