The Naked Scientists
  • Login
  • Register
  • Podcasts
      • The Naked Scientists
      • eLife
      • Naked Genetics
      • Naked Astronomy
      • In short
      • Naked Neuroscience
      • Ask! The Naked Scientists
      • Question of the Week
      • Archive
      • Video
      • SUBSCRIBE to our Podcasts
  • Articles
      • Science News
      • Features
      • Interviews
      • Answers to Science Questions
  • Get Naked
      • Donate
      • Do an Experiment
      • Science Forum
      • Ask a Question
  • About
      • Meet the team
      • Our Sponsors
      • Site Map
      • Contact us

User menu

  • Login
  • Register
  • Home
  • Help
  • Search
  • Tags
  • Recent Topics
  • Login
  • Register
  1. Naked Science Forum
  2. Non Life Sciences
  3. Geek Speak
  4. Comment on password security...
« previous next »
  • Print
Pages: [1]   Go Down

Comment on password security...

  • 4 Replies
  • 4790 Views
  • 0 Tags

0 Members and 1 Guest are viewing this topic.

Offline thedoc (OP)

  • Forum Admin
  • Hero Member
  • *****
  • 510
  • Activity:
    0%
  • Thanked: 21 times
Comment on password security...
« on: 01/10/2013 21:30:01 »
Gordon Ross  asked the Naked Scientists:
   
On the latest edition of the naked scientist podcast, you mentioned about choosing passwords. You'd be surprised at how hard it is to create a good, strong password. There was recently an article on the Ars Technica website about cracking passwords: http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

As to having secure passwords for banking sites, you might want to talk to Ross Anderson in the Computing Lab. He does a lot of research into security and the finance industry. Some of the things he comes out with are quite interesting: http://www.cl.cam.ac.uk/~rja14/#Reliability

Gordon.
   
What do you think?
« Last Edit: 01/10/2013 21:30:01 by _system »
Logged
 



Offline MrVat7

  • Sr. Member
  • ****
  • 173
  • Activity:
    0%
Re: Comment on password security...
« Reply #1 on: 23/01/2014 11:41:12 »
How to make 'the most secure' password  ?
Logged
 

Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: Comment on password security...
« Reply #2 on: 23/01/2014 15:25:07 »
When using MD5 to hash a password you should add a long salt.

For a user database the salt should different for each user, ( say another MD5 derived from the date and time they first became a member, their user name, and other data ).

Password ="123456"
Salt = fc4270f85f1e9bbf501bc507b10e158b
MD5 (password+salt) = MD5(123456fc4270f85f1e9bbf501bc507b10e158b) = 608c5d43002f90cfeb7289e4ff9ac669

So on database the password "123456" for a particular user is stored on the database as 608c5d43002f90cfeb7289e4ff9ac669

If some other user also selects "123456" as their password it will be encoded completely differently on the database because their salt will be different , (try changing one character of the salt and see the different MD5 which results) , so frequency analysis of the database for common passwords isn't going to help the cracker.

Reverse MD5 does not reveal the password if a long salt is used, and a brute-force-crack of an MD5 will take "hundred trillion trillion centuries".
« Last Edit: 23/01/2014 16:35:46 by RD »
Logged
 

Offline CliffordK

  • Naked Science Forum King!
  • ******
  • 6596
  • Activity:
    0%
  • Thanked: 61 times
  • Site Moderator
Re: Comment on password security...
« Reply #3 on: 23/01/2014 21:06:13 »
A good system design should have a method for dealing with multiple password attempts.  For example a 24 hr (or unlimited with manual reset) lockout after 5 password attempts for each user. 

It should also detect when a single IP address is attempting more passwords and user-names than expected.  Unsuccessful login attempts for 3 different user names from the same IP address or subnet, and that IP address and subnet gets a 24 hr (or permanent) lock.

Of course one can augment it with statistics.  A "family" may have multiple accounts...  but not thousands of accounts. 

Personally I do not like accounts that use well known information for "security questions", birthday, parents middle names, parents birthdays, mother's maiden name, etc. 

As far as brute force cracking, the passwords that can be easily "cracked" are those that are 100% numeric, or exist as a word in some unabridged dictionary. 

There are somewhere between 100,000 to 1,000,000 words in the English language.  Throw in all European languages, and if one can test a billion passwords a second, then the password should be able to be cracked in less than a second.

Add a single digit or character from the keyboard to the first and last place in the word and it multiplies that by perhaps a factor of 100, still not too bad. 

A little more obfuscation, and the dictionary attack fails. 

A good security system should require for some level of obfuscation before accepting the passwords.

The key, of course, is to not allow a person to test a billion passwords in a few seconds. 

For the hacker, if one is limited to a few dozen password attempts, perhaps spread out over a few weeks, then one needs to come up with a far better algorithm to select passwords to probe.  One method might be some kind of baiting.  For example set up a personal's website.  Lovely women (or hot men) here, and try to entice the target to sign up.  With some luck they'll give you the SAME password as their bank account.  Or, of course, hacking their computer and looking for a plain-text password file, or adding a keystroke logger.  The key, of course, is to never use the same password for the high security and low security accounts.
Logged
 

Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: Comment on password security...
« Reply #4 on: 24/01/2014 01:24:05 »
Quote from: MrVat7 on 23/01/2014 11:41:12
How to make 'the most secure' password  ?

I did find a JavaScript implementation of the Keystretching algorithm PBKDF2 ...

 [ Invalid Attachment ]
http://anandam.name/pbkdf2/

You can save a copy of Parvez Anandam's pbkdf2 webpage on your computer and run it in your browser even when you are not connected to the internet, (so you can be sure the key derived is not transmitted over the internet).

PBKDF2 iterates the password+salt process hundreds or thousands of times, using SHA-1 rather than MD5,
SHA-1(password+salt) becomes the salt for the next iteration. The many iterations vastly increase the computational work required by the would-be cracker.

* JavaScript-implementation of PBKDF2 by Parvez Anandam.gif (39.96 kB, 668x729 - viewed 742 times.)
« Last Edit: 24/01/2014 01:37:20 by RD »
Logged
 



  • Print
Pages: [1]   Go Up
« previous next »
Tags:
 
There was an error while thanking
Thanking...
  • SMF 2.0.15 | SMF © 2017, Simple Machines
    Privacy Policy
    SMFAds for Free Forums
  • Naked Science Forum ©

Page created in 0.752 seconds with 44 queries.

  • Podcasts
  • Articles
  • Get Naked
  • About
  • Contact us
  • Advertise
  • Privacy Policy
  • Subscribe to newsletter
  • We love feedback

Follow us

cambridge_logo_footer.png

©The Naked Scientists® 2000–2017 | The Naked Scientists® and Naked Science® are registered trademarks created by Dr Chris Smith. Information presented on this website is the opinion of the individual contributors and does not reflect the general views of the administrators, editors, moderators, sponsors, Cambridge University or the public at large.