On Fri, 10 May 2013 11:46:03 +0000, amarildojr wrote:
> It’s not that difficult, just type a few times and you’re ready to go =)
> I think what I tried to say with “iloveyoumom” is that it’s very easy
> for someone with the right tools to crack.
Any password is easy for someone with the “right tools” to crack.
Passwords made up of words strung together are far more complex to crack,
though - unless you know the password (for example) is four words strung
together with the spaces removed (as opposed to using “*” in between the
words, or “_”, or “$”, or …)
Consider the mathematics:
If you use a password comprised of only the 26 letters in the English
alphabet, in lowercase, your pool to choose from is 26.
If you use upper and lower case (and the system can differentiate them),
then it’s 54.
If you add the 10 digits, it’s 64. Special characters on the number row
= 74.
That’s a relatively small set of characters, yet an 8 character password
made up from those 74 characters makes for 74^8 or about 9E14
combinations.
The total number of words in the English language is difficult to measure
(because what constitutes a “word”?), but the Oxford English Dictionary,
2nd edition contains 171,476 unique word definitions.
If we pick 4 of those 171,476 words and string them together with no
separator, that’s 8.64E20 combinations (allowing for repetition). Sure,
if you /know/ the password is 3 words strung together, it’s easy to
employ a dictionary attack, but how would you know that?
Now add character substitution to the mix - if instead of picking
“iloveyoumom”, you picked “1l0v3y0um0m”, even knowing it’s 4 words strung
together, a dictionary attack isn’t going to work unless it adds in
variations based on those substitutions, which increases the pool of
“words” being picked from. Say each word has on average one other
possible “spelling” using “l33t” substitution. That doubles the number
of “words” to 342,952 and the number of 4-word combinations to 1.38E22.
Now, consider that remote attacks are where a password is most effective
- because that has to be an online attack, incorrect password delays and
(ideally) lockout for a set period of time after a set number of failed
attempts - and a lockout that doesn’t tell you the account is locked is
best (because then you could even enter the correct password and not know
it was right because the system is just telling you “wrong password”
instead of “account locked, so I’m not checking the password”), and you
do pretty well.
As someone else said, if physical access to the system is compromised all
bets are off. An offline attack can be done then, and with GPU power
being harnessed to do password hash cracking, the complexity ultimately
doesn’t matter because GPUs handle this type of computational task so
fast. You can slow it down with encryption, but even then, it’s really
just a matter of time and computing power.
Jim
Jim Henderson
openSUSE Forums Administrator
Forum Use Terms & Conditions at http://tinyurl.com/openSUSE-T-C