Everyone knows that long random passwords are best, but how random, how long and what about practicality?
A bad password
Let’s start with an example of a bad password: “G3org3.1984”.
There are many methods hackers use to exploit systems. One of which is the “brute-force attack”, a technique which attempts to discover a users password by trying one variation after another. Each failure triggering another attempt with a new password. You might be thinking, “my password is awesome, that would take forever”. Is it, is it really that awesome?
A closer look at “brute-force”
Brute force attacks are not actually carried out by a person. Instead a computer is given the task — even if it takes days, months or longer. The time it takes is linked to the strength of your password.
Lets look at a password example: “J@ck.1984”. A mathematical perspective uses a term “key space” to determine it’s strength. The “key space” for that password would be 859 (depending on the characters used 1). That is to say that it would take 859 or less2 attempts to crack it.
859 = 231,616,950,000,000,000… is a huge number!
“J@ck.1984” is a BAD password
Here’s why. 859 is a big number, but we’re being naive to assume a hacker is going to simply try random character combinations. We’re dealing with people. Creatures of habit that love to give things meaning and have limited memory. A dangerous combination which hackers use to optimise their efforts.
Think of the complexity reduction if you focus on passwords built on simple proposition:
password = "<word or name>.<year between 1940 and 2014>”
Complexity reduction may be further reduced if the persons email address “email@example.com” was known.
An Acronym Solves All
A good password is built on four simple steps:
|C||Character Rich||Use uppercase, lowercase, numbers and special characters|
|U||Unique||A fresh password for each credential|
|R||Random||Avoids words, names and dates|
|L||Long||15 characters or more|
“C.U.R.L”, a recipe for awesome passwords.
Great, but we live in the real world?
At the very least, keep the “C.U.R.L” principles in mind when creating your next password. Your credentials are yours and yours alone.