FACTOID # 11: Oklahoma has the highest rate of women in State or Federal correctional facilities.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
 
WHAT'S NEW
RELATED ARTICLES
People who viewed "Password" also viewed:
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Password

A password is a form of secret authentication data that is used to control access to a resource. The password is kept secret from those not allowed access, and those wishing to gain access are tested on whether or not they know the password and are granted or denied access accordingly. Authentication (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true. ...


The use of passwords goes back to ancient times. Sentries guarding a location would challenge for a password. They would only allow a person in if they knew the password. In modern times, passwords are used to control access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user may require passwords for many purposes: logging in to computer accounts, retrieving email from servers, accessing files, databases, networks, web sites, and even reading the morning newspaper online. In security, specifically physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. ... // An operating system (OS) is a set of computer programs that manage the hardware and software resources of a computer. ... Cable television or Community Antenna Television (CATV) (and often shortened to cable) is a system of providing television, FM radio programming and other services to consumers via radio waves transmitted directly to people’s televisions through fixed coaxial cables as opposed to the over-the-air method used in... An NCR Personas 85-Series interior, multi-function ATM in the USA Smaller indoor ATMs dispense money inside convenience stores and other busy areas, such as this off-premise Wincor Nixdorf mono-function ATM in Sweden. ... In telecommunication, the term user has the following meanings: 1. ... E-mail, or email, is short for electronic mail and is a method of composing, sending, and receiving messages over electronic communication systems. ...


Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words are harder to guess (a desirable property), but are generally harder for users to remember (an undesirable property). Note that password is often used to describe what would be more accurately called a passphrase. Passcode is sometimes taken to imply that the information used is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be memorized. A passphrase is a sequence of words or other text used to control access to a computer system, program or data. ... PINs are most often used for ATMs but are increasingly used at the Point of sale, especially for debit cards. ... In psychology, memory is an organisms ability to store, retain, and subsequently recall information. ...

Contents

Designing a personal, user-friendly password

Passwords vary in the degree of public awareness, security protection and frequency of change. The most public, and therefore least secure, password might be one that is given to members of a group, a committee or some other organization. For instance, "publiclibrary", "internet" or "AAAfinancecommittee" are all examples of easily remembered passwords, more or less publicly known passwords.


Less easily attacked passwords might be built from such a basic form, for instance, "smith12nov34street" or "AAAchairpersonSUE". These are slightly more secure, but being relatively easily predictable should not be relied upon to actually block unauthorized access. Effective access control requires passwords which are more difficult to guess or to find automatically, less publicly known (ideally not at all), and these are the subject of much of the rest of this article.


Security and convenience

In controlling access to anything, trade-offs are made between security and convenience. If a resource is protected by a password, then security is increased with a consequent loss of convenience for users. The amount of security and inconvenience inherent in a particular password system or policy are affected by several factors addressed below. However, there is generally no one universal 'best' way to set a balance between security and convenience for all cases.


Some password protected systems pose little or no risk to a user if compromised, for example a password allowing access to a free information web site with no confidential data. Others pose modest economic or privacy risk, as for instance a password used to access e-mail or a security lock code for a mobile telephone. Still others could have very serious consequences if compromised, such as passwords used to limit access to AIDS treatment records, control a power transmission grid, or access to personnel records (consider the risk of identity theft in this instance). Acquired Immune Deficiency Syndrome or acquired immunodeficiency syndrome (AIDS or Aids) is a collection of symptoms and infections resulting from the specific damage to the immune system caused by the human immunodeficiency virus (HIV). ... Identity taker is a term first appearing in U.S. literature in the 1990s, leading to the drafting of the Identity Theft and Assumption Deterrence Act. ...


Factors in the security of a password system

The security of a password-protected system depends on several factors. The system must, of course, be designed for sound overall security, without which no password protection can have any significance. Early passwords on many systems were limited to a few numbers, or upper-case-letters, only often in prescribed patterns limiting the number of possible passwords. Most passwords today usually have fewer such limits. User input is determined by several limiting factors: allowable inputs (numbers / letters, non-visual codes and/or other keys / device inputs), minimum & maximum of time required for input, availability of cut / delete / paste / copy for input, and error/noise tolerance errors in the password or communications input. Some system administrators also enforce other limitations on passwords, such as compulsory change schedules, safe-password analysis feedback, and compulsory length / composition limits. See computer security and computer insecurity. This article describes how security can be achieved through design and engineering. ... Many current computer systems have limited security precautions in place. ...


Here are some password management issues that must be considered:


Rate at which an attacker can try out guessed passwords

The rate at which an attacker can submit guessed passwords to the system is a key factor in determining system security. Some systems impose a long time out (several seconds) after a small number (e.g., a maximum of three) of failed password entry attempts. Absent other vulnerabilities, such systems can be secure with relatively simple passwords, if they are not easily guessed. Examples of passwords that are easily guessed include the name of a relative or pet, an automobile license plate number, and such default passwords as admin, 123456, or letmein. [1]


Other systems store or transmit a cryptographic hash of the password in a manner that makes the hash value accessible to an attacker. When this is done, and it is very common (to most observers' surprise or despair), an attacker can work off-line, rapidly testing candidate passwords against the true password's hash value. In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. ...


Lists of common passwords are widely available and can further speed the process. (See Password cracking.) A sufficiently complex password used in a system with a good hash algorithm can defeat such attacks as the work factor imposed on such an attacker can be made impossible in practice. Passwords that are used to generate cryptographic keys, e.g. for disk encryption or Wi-Fi security, are also subject to high rate guessing. Stronger passwords are needed in such systems. Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. ... Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e. ... Official Wi-Fi logo Wi-Fi was originally a brand licensed by the Wi-Fi Alliance to describe the embedded technology of wireless local area networks (WLAN) based on the IEEE 802. ...


Form of stored passwords

Some computer systems store passwords, against which to compare user attempts, as cleartext. If an attacker gains access to such an internal password file, all passwords would be compromised. If some users employ the same password for multiple accounts, those will be compromised as well. More secure systems store each password in a cryptographically protected form, so access to the actual password will be difficult for a snooper who gains internal access to the system, while validation still remains possible. In data communications, cleartext is the form of a message or data which is transferred or stored without cryptographic protection. ...


Email is sometimes used to distribute passwords. Since most email is sent as cleartext, it is available without effort during transport to any eavesdropper. Further, it will be stored on at least two computers as cleartext -- the sender's and the receipients's. If it passes through intermediate systems during its travels, it will likely be stored on those as well. Emailed passwords are generally an insecure method of distribution.


A common cryptographically based scheme stores only a "hashed" form of the plaintext password. When a user types in a password on such a system, it is run through the hashing algorithm, and if the hash value generated from the user's entry matches the hash stored in the password database, the user is permitted access. The hash value is created by applying a cryptographic hash function to a string consisting of the submitted password and, usually, another value known as a salt. The salt prevents attackers from building a list of hash values for common passwords. MD5 and SHA1 are frequently used cryptographic hash functions. A modified version of DES was used in early Unix systems. In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. ... In cryptography, a salt consists of random bits used as one of the inputs to a key derivation function. ... In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. ... The SHA (Secure Hash Algorithm) family is a set of related cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). ... The Data Encryption Standard (DES) is a cipher (a method for encrypting information) selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. ... Filiation of Unix and Unix-like systems Unix (officially trademarked as UNIX®) is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie and Douglas McIlroy. ...


The UNIX DES function was iterated to make the hash function slow, to further frustrate automated guessing attacks, and used the password candidate as a key to encrypt a fixed value, thus blocking yet another attack on the password hashing system. A more flexible function for iterated hashed passwords is described in PKCS-5. PBKDF2 (Password-Based Key Derivation Function) is a key derivation function that is part of RSA Laboratories Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 v2. ...


If the hash function is well designed, it will be computationally infeasible to reverse it to find the plaintext directly. However, many systems do not protect their hashed passwords adequately, and if an attacker can gain access to hashed values he can use widely available tools which compare the encrypted outcome of every word from some collection, such as a dictionary. Long lists of possible passwords in many languages are widely available (eg, on the Internet) and the tools try common variations as well. The existence of these dictionary attack tools demonstrates the relative strengths of different password choices against such attacks. Use of a key derivation function can reduce this risk. In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. ... A Key derivation function (or KDF) is a cryptographic hash function which derives one or more secret keys from secret values and/or other known information. ...


A poorly designed hash function can make attacks feasible even if a strong password is chosen. See LM hash for a widely deployed example.[2] LM hash or LAN Manager hash is one of the formats that Microsoft LAN Manager and Microsoft Windows use to store Windows user passwords that are less than 15 characters long. ...


Methods of verifying a password over a network

A variety of methods have been used to verify passwords in a network setting:


Simple transmission of the password

Passwords can be vulnerable to interception (ie, "snooping") while being transmitted to the authenticating machine or person. If the password is carried as electrical signals on unsecured physical wiring between the user access point and the central system controlling the password database, it is subject to snooping by wiretapping methods. If it is carried as packetitzed data over the Internet, anyone able to watch the packets containing the logon information can snoop with very little possibility of detection. It has been suggested that Voice logging be merged into this article or section. ... In information technology, a packet is a formatted block of information carried by a computer network. ...


An example of cleartext transmission of passwords is this website. When you log into your Wikipedia account (if you are not an administrator) your username and password are sent from your computer through the Internet via cleartext. Anyone can read them in transit and potentially log into your account. But because everyone can gain access to the site, there is little need to encrypt transmissions. In data communications, cleartext is the form of a message or data which is transferred or stored without cryptographic protection. ... Note: to create a user account for Wikipedia, go to the login page. ...


Another example of transmission vulnerability is email. Emailed passwords may be read by anyone with access to the transmission medium. Using client-side encryption will only protect transmission from the POP server to the client. Previous or subsequent relays of the email will not be protected and the email will be stored on multiple computers in cleartext.


Transmission through encrypted channels

The risk of interception of passwords sent over the Internet can be reduced by, among other approaches, using the Transport Layer Security (TLS, previously called SSL) feature built into many Internet browsers. Most browsers display a closed lock icon when TLS is in use. See cryptography for other ways in which the passing of information can be made more secure. Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. ... Browsing redirects here Browser can refer to: Browser - a type of herbivore whose nutrition generally comes from high growing plants, like trees, rather than a grazer that eats from the ground. ... The German Lorenz cipher machine, used in World War II for encryption of very high-level general staff messages Cryptography (or cryptology; derived from Greek κρυπτός kryptós hidden, and the verb γράφω gráfo write or λεγειν legein to speak) is the study of message secrecy. ...


Hash-based challenge-response methods

Unfortunately, there is a conflict between stored hashed-passwords and hash-based challenge-response authentication; the latter requires a client to prove to a server that he knows what the shared secret (ie, password) is, and to do this, the server must be able to obtain the shared secret from its stored form. On Unix-type systems doing remote authentication, the shared secret usually becomes the hashed form and has the serious limitation of exposing passwords to offline guessing attacks. In computer security, challenge-response authentication is a family of protocols in which one party presents a question (challenge) and another party must provide a valid answer (response) to be authenticated. ... Filiation of Unix and Unix-like systems Unix (officially trademarked as UNIX®) is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie and Douglas McIlroy. ...


Zero-knowledge password proofs

Rather than transmitting the password, password-authenticated key agreement systems can perform a zero-knowledge password proof, which proves knowledge of the password without exposing it. In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more partys knowledge of a password. ... In cryptography, a zero-knowledge password proof (ZKPP) is an interactive method for one party (the prover) to prove to another party (the verifier) that it knows a value of a password, without revealing anything other than the fact that it knows that password to the verifier. ...


Moving a step further, augmented systems for password-authenticated key agreement (e.g. AMP, B-SPEKE, PAK-Z, SRP-6) avoid both the conflict and limitation of hash-based methods; An augmented system allows a client to prove knowledge of the password to a server, where the server knows only a (not exactly) hashed password, and where the unhashed password is required to gain access. In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more partys knowledge of a password. ...


Procedures for changing passwords

Usually, a system must provide a way to change a password, either because a user believes the current password has been (or might have been) compromised, or as a precautionary measure. If a new password is passed to the system in an unencrypted form, security can be lost (e.g., via wiretapping) even before the new password can even be installed in the password database. If the new password is given to a compromised employee, little is gained. Some web sites include the user-selected password in an unencrypted confirmation e-mail message, with the obvious increased vulnerability.


Identity management systems are increasingly used to automate issuance of replacements for lost passwords, a feature called self service password reset. The user's identity is verified by asking questions and comparing the answers to ones previously stored (ie, at account initialization). Typical questions include "Where were you born?," "What is your favorite movie?" or "What is the name of your pet?" In many cases the answers to these questions can be relatively easily guessed, determined by research, or obtained through social engineering, and so this is less than reliable as a verification technique. While many users have been trained never to reveal a password, few consider the name of their favorite movie to require similar care. In computer science, identity management is the management of the identity life cycle of entities (subjects or objects) during which: (1a) the identity is established: a name (or number) is connected to the subject or object; (1b) the identity is re-established: a new or addtional name (or number) is... Self-service password reset is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. ... Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. ...


Password longevity

"Password aging" is a feature of some operating systems which forces users to change passwords frequently (eg, quarterly, monthly or even more often), thus ensuring that a stolen password will become unusable more or less quickly. Most users are not so familiar with passwords and computers as to be comfortable with this, so such policies usually earn some protest and foot-dragging at best and hostility at worst. These features are therefore not always used. In any case, the security benefits are limited because attackers often exploit a password as soon as it is compromised. In many cases, particularly with administrative or "root" accounts, once an attacker has gained access, he can make alterations to the operating system that will allow him future access even after the initial password he used expires (one example of this is a rootkit). A rootkit is a set of software tools intended to conceal running processes, files or system data from the operating system. ...


Forcing password change too frequently may make users more likely to forget which password is current, and there is a consequent temptation for users to either write their password down or to reuse an earlier password, which may negate any added security benefit. Implementing such a policy requires careful consideration of the relevant human factors.


Number of users per password

Sometimes a single password controls access to a device, for example, for a network router, or password-protected mobile phone. However, in the case of a computer system, a password is usually stored for each user name, thus making all access traceable (save, of course, in the case of users sharing passwords). A would-be user must give a name as well as a password. If the user supplies a password matching the one stored for the supplied user name, he or she is permitted further access into the computer system. This is also the case for a cash machine, except that the user name is the account number stored on the bank customer's card, and the PIN is usually quite short (4 to 6 digits). This article describes how security can be achieved through design and engineering. ...


Allotting separate passwords to each user of a system is preferable to having a single password shared by legitimate users of the system, certainly from a security viewpoint. This is partly because users are more willing to tell another person (who may not be authorized) a shared password than one exclusively for their use. Single passwords are also much less convenient to change because many people need to be told at the same time, and they make removal of a particular user's access more difficult. Per-user passwords are also essential if users are to be held accountable for their activities, such as making financial transactions or viewing medical records.


Design of the protected software

Common techniques used to improve the security of software systems protected by a password include:

  • not echoing the password on the display screen as it is being entered or obscuring it as it is typed by using asterisks or circular blobs
  • allowing passwords of adequate length (some Unix systems limited passwords to 8 characters).
  • requiring users to re-enter their password after a period of inactivity
  • enforcing a password policy to ensure strong passwords
  • requiring periodic password changes
  • assigning passwords at random
  • providing an alternative to keyboard entry
  • using encrypted tunnels or password-authenticated key agreement to prevent network attacks on transmitted passwords

Some of the more stringent policy enforcement measures can pose a risk of alienating users, possibly decreasing security. Filiation of Unix and Unix-like systems Unix (officially trademarked as UNIX®) is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie and Douglas McIlroy. ... A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. ... In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more partys knowledge of a password. ...


Factors in the security of an individual password

Main article: Password strength

Studies of production computer systems have for decades consistently shown that about 40% of all user-chosen passwords are readily guessed automatically, and still more with some individual research regarding a particular user. Password strength is the likelihood that a password cannot be guessed or discovered by an unauthorized person or computer. Passwords easily guessed are termed weak or vulnerable; passwords very difficult or impossible to guess are considered strong. Password strength is the likelihood that a password can be guessed by an unauthorized person or computer. ... Authentication (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true. ... The NASA Columbia Supercomputer. ...


Alternatives to passwords for access control

The numerous ways in which reusable passwords can be compromised has prompted the development of other techniques. Unfortunately, few of them have become universally available for users seeking a more secure alternative.

  • Single-use passwords. Having passwords which are only valid once makes many potential attacks ineffective. Most users find single use passwords extremely inconvenient. They have, however, been widely implemented in personal online banking, where they are known as TANs. As most home users only perform a small number of transactions each week, the single use issue has not lead to significant customer dissatisfaction in this case.
  • Security tokens are similar to single-use passwords, but the value to be entered is displayed on a small fob and changes every minute or so.
  • Access controls based on public key cryptography e.g. ssh. The necessary keys are too large to memorize (but see proposal Passmaze) and must be stored on a local computer, security token or portable memory device, such as a flash disk or floppy disk.
  • Biometric methods promise authentication based on unalterable personal characteristics, but currently (2005) have high error rates and require additional hardware to scan, for example, fingerprints, irises, etc. They have proven easy to spoof in some famous incidents testing commercially available systems and, because these characteristics are unalterable, they cannot be changed if compromised, a highly important consideration in access control as a compromised access token is necessarily insecure.
  • Single sign-on technology is claimed to eliminate the need for having multiple passwords. Such schemes do not relieve user and administrators from choosing reasonable single passwords, nor system designers or administrators from ensuring that private access control information passed among systems enabling single sign-on is secure against attack. As yet, no satisfactory standard has been developed.
  • Non-text-based passwords, such as graphical passwords or mouse-movement based passwords.[3] Another system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.[4]

Graphical passwords are an alternative means of authentication for log-in intended to be used in place of conventional password; they utilize images instead of text. In many implementations, the user is required to pick from a series of images in the correct sequence in order to gain access. The purpose of a one-time password (OTP) is to make it more difficult to gain unauthorized access to restricted resources, like a computer account. ... Online banking (or Internet banking) is a term used for performing transactions, payments etc. ... TAN is an acronym formed from the phrase Transaction Authentication Number. ... Several types of security tokens. ... Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically. ... Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. ... A USB keydrive, shown with a US quarter coin for scale. ... A floppy disk is a data storage device that is composed of a disk of thin, flexible (floppy) magnetic storage medium encased in a square or rectangular plastic shell. ... At Disney World, biometric measurements are taken of the fingers of multi-day pass users to ensure that the pass is used by the same person from day to day. ... The tip of a finger showing the friction ridge structure. ... In anatomy, the iris (plural irises or irides) is the most visible part of the eye of vertebrates, including humans. ... Single sign-on (SSO) is a specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems. ... There are very few or no other articles that link to this one. ... The face is the front part of the head, in humans from the forehead to chin including the hair, forehead, eyebrow, eyes, nose, cheeks, mouth, lips, philtrum, teeth, skin, and chin. ... The human brain is the most complex organ in the human body. ... Face perception is the process by which the brain and mind understand and interpret the face, particularly the human face. ... Authentication (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true. ... Image of the Wikimedia Commons logo. ... Look up text in Wiktionary, the free dictionary. ...


While some believe that graphical passwords would be harder to crack, others suggest that people will be just as likely to pick common images or sequences as they are to pick common passwords.[citation needed] Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. ...


Website password systems

Passwords are used on websites to authenticate users and are usually server-side, meaning the browser sends the password to the server (by HTTP POST), the server checks the password and sends back the relevant content (or an access denied message). This process eliminates the possibility of local reverse engineering as the code used to authenticate the password does not reside on the local machine.


The transmission of the password through the browser in plaintext means it can be intercepted along its journey to the server. Most web authentication systems use SSL to establish an encrypted session between the browser and the server. This is done automatically by the browser and ensures integrity of the session.


So-called website password and membership management systems often involve the use of Java or JavaScript code existing on the client side (meaning the visitor's web browser) HTML source code (for example, AuthPro). Drawbacks to such systems are the relative ease in bypassing or circumventing the protection by switching off JavaScript and Meta redirects in the browser, thereby gaining access to the protected web page. Others take advantage of server-side scripting languages such as ASP or PHP to authenticate users on the server before delivering the source code to the browser. Popular systems such as Sentry Login and Password Sentry take advantage of technology in which web pages are protected using such scripting language code snippets placed in front of the HTML code in the web page source saved in the appropriate extension on the server, such as .asp or .php. For additional security, many of the larger websites, such as Yahoo and Google, use the Python programming language for controlling and maintaining secrecy of the pages they dynamically serve to the browser and completely obfuscate any reference to file names in the URL that appears in the address window of the browser. Java is a programming language originally developed by Sun Microsystems and released in 1995. ... JavaScript is a scripting language most often used for client-side web development. ... HTML, short for Hypertext Markup Language, is the predominant markup language for the creation of web pages. ... Active Server Pages (ASP) is Microsofts Server-side script engine for dynamically-generated web pages. ... PHP is a reflective programming language originally designed for producing dynamic web pages. ... Yahoo! - Wikipedia, the free encyclopedia /**/ @import /skins-1. ... Google Inc. ... Python is a high-level programming language first released by Guido van Rossum in 1991. ...


Password cracking

Attempting to crack passwords by trying as many possibilities as time and money permit is a brute force attack. A related method, rather more efficient in most cases, is a dictionary attack. In a dictionary attack, all words in one or more dictionaries are tested. Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. ... The EFFs US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days — the photograph shows a DES Cracker circuit board fitted with several Deep Crack chips. ... In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. ...


There are several programs available for password auditing and recovery such as L0phtCrack, John the Ripper, and Cain; some of which use password design vulnerabilities (as in the Microsoft LANManager system) to increase efficiency. Some are useful to system administrators as any password which can be found using one of these programs is most definitely a weak password and should be rejected as an acceptable password choice. L0phtCrack is a password auditing and recovery application (nowadays called LC5) by L0pht Heavy Industries. ... John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. ... Cain and Abel is a Windows password recovery tool. ...


According to Bruce Schneier, the most commonly used password is password1. [1] Bruce Schneier Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security specialist, and writer. ...


History of passwords

Passwords or watchwords have been used since ancient times. Polybius describes the system for distribution watchwords in the Roman military as follows: Polybius (c. ... The Military of ancient Rome (known to the Romans as the militia) relates to the combined military forces of Ancient Rome from the founding of the city of Rome to the end of the Western Roman Empire. ...

The way in which they secure the passing round of the watchword for the night is as follows: from the tenth maniple of each class of infantry and cavalry, the maniple which is encamped at the lower end of the street, a man is chosen who is relieved from guard duty, and he attends every day at sunset at the tent of the tribune, and receiving from him the watchword - that is a wooden tablet with the word inscribed on it - takes his leave, and on returning to his quarters passes on the watchword and tablet before witnesses to the commander of the next maniple, who in turn passes it to the one next him. All do the same until it reaches the first maniples, those encamped near the tents of the tribunes. These latter are obliged to deliver the tablet to the tribunes before dark. So that if all those issued are returned, the tribune knows that the watchword has been given to all the maniples, and has passed through all on its way back to him. If any one of them is missing, he makes inquiry at once, as he knows by the marks from what quarter the tablet has not returned, and whoever is responsible for the stoppage meets with the punishment he merits. [2]

Passwords have been used with computers since the earliest days of computing. MIT's CTSS, one of the first time sharing systems, was introduced in 1961. It had a LOGIN command that requested a user password. "After typing PASSWORD, the system turns off the printing mechanism, if possible, so that the user may type in his password with privacy." [3] Robert Morris invented the idea of storing login passwords in a hashed form as part of the Unix operating system. His algorithm, know as crypt(3), used a 12-bit salt and invoked a modified form of the DES algorithm 25 times to reduce the risk of dictionary attacks. Maniple (Latin: manipulus) was a tactical unit of the Roman Legion, consisting of two centuriae within a single cohort. ... Ordinary Magistrates Extraordinary Magistrates Titles and Honors Emperor Politics and Law Tribune (from the Latin: tribunus; Greek form tribounos) was a title shared by 2-3 elected magistracies and other governmental and/or (para)military offices of the Roman Republic and Empire. ... Mapúa Institute of Technology (MIT, MapúaTech or simply Mapúa) is a private, non-sectarian, Filipino tertiary institute located in Intramuros, Manila. ... CTSS, which stood for the Compatible Time-Sharing System, was one of the first time-sharing operating systems; it was developed at MITs Computation Center. ... Robert Morris is an American cryptographer. ... Filiation of Unix and Unix-like systems Unix (officially trademarked as UNIX®) is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie and Douglas McIlroy. ... crypt(1) is a Unix utility command while crypt(3) is an unrelated standard library function. ... In cryptography, a salt consists of random bits used as one of the inputs to a key derivation function. ... The Data Encryption Standard (DES) is a cipher (a method for encrypting information) selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. ... In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. ...


Passwords in fiction

See also: List of passwords used in fiction

Password use is often depicted in fiction, Illya Kuryakin 'proving' his identity to the U.N.C.L.E. security door with a code word, or Harry Potter giving a password to a magic painting to enter his dormitory. Famous fictional passwords include "open sesame" from the Arabian Nights' tale of The Forty Thieves, Rumpelstiltskin, and Swordfish from the speakeasy in the Marx Brothers film Horse Feathers. The Man from U.N.C.L.E. was an American television series that ran on NBC from September 22, 1964, to January 15, 1968, for 105 episodes (see 1964 in television and 1968 in television). ... Harry James Potter is a fictional character and the main character of J. K. Rowlings Harry Potter fantasy series of books. ... Queen Scheherazade tells her stories to King Shahryar. ... The adventure tale of Ali Baba and the Forty Thieves was added to the traditional collection of The Book of One Thousand and One Nights by its European transcriber, Antoine Galland, an 18th-century French orientalist who had heard it in oral form from a Maronite story-teller from Aleppo. ... Illustration of Rumpelstiltskin from Andrew Langs The Blue Fairy Book, ca. ... This article is being considered for deletion in accordance with Wikipedias deletion policy. ... Groucho, Gummo, Minnie (mother), Zeppo, Frenchy (father), Chico and Harpo. ... Horse Feathers (1932) was the fourth Marx Brothers film. ...


See also

Authentication (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true. ... Diceware is a method for creating passphrases, passwords, and other cryptographic variables using ordinary dice as a hardware random number generator. ... Keyfile protection scheme An efficient way to protect software from copy protection is to put a keyfile on a computer, that will periodically establish connection with the protected application and testing it for validity. ... A passphrase is a sequence of words or other text used to control access to a computer system, program or data. ... A password manager is software that helps a user organize passwords and PIN codes. ... A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. ... Password strength is the likelihood that a password can be guessed by an unauthorized person or computer. ... In telecommunication, a password length parameter is a basic parameter affecting the password length needed to provide a given degree of security. ... Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. ... Password fatigue describes the syndrome where people are required to remember an excessive number of passwords as part of their daily living. ... In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more partys knowledge of a password. ... To meet Wikipedias quality standards, this article or section may require cleanup. ... Password synchronization is defined as any process or technology that helps users to maintain a single password that is subject to a single security policy, and changes on a single schedule across multiple systems. ... A pre-shared key or PSK is a secret which was previously shared between the two parties using some secure channel before it needs to be used. ... A random password generator is software program or hardware device that takes input from a random or pseudo-random number generator (See random number generator) and automatically generates a password. ... Self-service password reset is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. ...

References

  1. ^ http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300
  2. ^ http://ancienthistory.about.com/library/bl/bl_text_polybius6.htm
  3. ^ CTSS Programmers Guide, 2nd Ed., 1965

External links

  • Attacking Monoalphabetic Ciphers
  • Free online password tools (generation, keeping, testing, archives)
  • Password manager written in Java
  • Password generator, password meter and hasher
  • Password myths and tips
  • Random secure password generator with automatic mnemonic generation
  • Pick a Safe Password
  • List of default passwords listed by vendor
  • Links for password-based cryptography
  • Wordlists and articles about Password Security
  • More Secure Mnemonic-Passwords: User-Friendly Passwords for Real Humans by Stephan Vladimir Bugaj
  • The Memorability and Security of Passwords — Some Empirical Results (PDF)
  • Security policies can weaken passwords
  • Humane password lists in spreadsheet format for the public
  • Password management concerns with internet browsers
  • The Graphical Passwords Project
  • PassClicks
  • PassFaces
  • PassImages
  • Graphical Passwords: A Survey
  • Encrypting Passwords with Hashing

  Results from FactBites:
 
Password - Wikipedia, the free encyclopedia (2949 words)
Passwords are generally short enough to be memorized.
Passwords that are used to generate cryptographic keys, e.g for disk encryption or Wi-Fi security, are also subject to high rate guessing.
Password use is often depicted in fiction, Illya Kuryakin 'proving' his identity to the U.N.C.L.E. security door with a code word, or Harry Potter giving a password to a magic painting to enter his dormitory.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m