Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data. It is similar to a password in usage, but a passphrase is generally longer for added security. Passphrases are often used to control both access to, and the operation of, cryptographic programs and systems, especially those that derive an encryption key from a passphrase. The origin of the term is by analogy with password. The modern concept of passphrases is believed to have been invented by Sigmund N. Porter in 1982.[1]

Security[2]

Considering that the entropy of written English is less than 1.1 bits per character,[3] passphrases can be relatively weak. NIST has estimated that the 23-character passphrase "IamtheCapitanofthePina4" contains a 45-bit strength. The equation employed here is:[4]

4 bits (1st character) + 14 bits (characters 2–8) + 18 bits (characters 9–20) + 3 bits (characters 21–23) + 6 bits (bonus for upper case, lower case, and alphanumeric) = 45 bits

(This calculation does not take into account that this is a well-known quote from the operetta H.M.S. Pinafore. An MD5 hash of this passphrase can be cracked in 4 seconds using crackstation.net, indicating that the phrase is found in password cracking databases.)

Using this guideline, to achieve the 80-bit strength recommended for high security (non-military) by NIST, a passphrase would need to be 58 characters long, assuming a composition that includes uppercase and alphanumeric.

There is room for debate regarding the applicability of this equation, depending on the number of bits of entropy assigned. For example, the characters in five-letter words each contain 2.3 bits of entropy, which would mean only a 35-character passphrase is necessary to achieve 80 bit strength.[5]

If the words or components of a passphrase may be found in a language dictionary—especially one available as electronic input to a software program—the passphrase is rendered more vulnerable to dictionary attack. This is a particular issue if the entire phrase can be found in a book of quotations or phrase compilations. However, the required effort (in time and cost) can be made impracticably high if there are enough words in the passphrase and if they are randomly chosen and ordered in the passphrase. The number of combinations which would have to be tested under sufficient conditions make a dictionary attack so difficult as to be infeasible. These are difficult conditions to meet, and selecting at least one word that cannot be found in any dictionary significantly increases passphrase strength.

If passphrases are chosen by humans, they are usually biased by the frequency of particular words in natural language. In the case of four word phrases, actual entropy rarely exceeds 30 bits. On the other hand, user-selected passwords tend to be much weaker than that, and encouraging users to use even 2-word passphrases may be able to raise entropy from below 10 bits to over 20 bits.[6]

For example, the widely used cryptography standard OpenPGP requires that a user make up a passphrase that must be entered whenever decrypting or signing messages. Internet services like Hushmail provide free encrypted e-mail or file sharing services, but the security present depends almost entirely on the quality of the chosen passphrase.

Compared to passwords

Passphrases differ from passwords. A password is usually short—six to ten characters. Such passwords may be adequate for various applications if frequently changed, chosen using an appropriate policy, not found in dictionaries, sufficiently random, and/or if the system prevents online guessing, etc.[citation needed], such as:

  • Logging onto computer systems
  • Negotiating keys in an interactive setting such as using password-authenticated key agreement
  • Enabling a smart-card or PIN for an ATM card where the password data (hopefully) cannot be extracted

But passwords are typically not safe to use as keys for standalone security systems such as encryption systems that expose data to enable offline password guessing by an attacker.[7] Passphrases are theoretically stronger, and so should make a better choice in these cases. First, they usually are and always should be much longer—20 to 30 characters or more is typical—making some kinds of brute force attacks entirely impractical. Second, if well chosen, they will not be found in any phrase or quote dictionary, so such dictionary attacks will be almost impossible. Third, they can be structured to be more easily memorable than passwords without being written down, reducing the risk of hardcopy theft. However, if a passphrase is not protected appropriately by the authenticator and the clear-text passphrase is revealed its use is no better than other passwords. For this reason it is recommended that passphrases not be reused across different or unique sites and services.

In 2012, two Cambridge University researchers analyzed passphrases from the Amazon PayPhrase system and found that a significant percentage are easy to guess due to common cultural references such as movie names and sports teams, losing much of the potential of using long passwords.[8]

When used in cryptography, commonly the passphrase protects a long machine generated key, and the key protects the data. The key is so long a brute force attack directly on the data is impossible. A key derivation function is used, involving many thousands of iterations (salted & hashed), to slow down password cracking attacks.

Passphrases selection

Typical advice about choosing a passphrase includes suggestions that it should be:[9]

  • Long enough to be hard to guess
  • Not a famous quotation from literature, holy books, et cetera
  • Hard to guess by intuition—even by someone who knows the user well
  • Easy to remember and type accurately
  • For better security, any easily memorable encoding at the user's own level can be applied.
  • Not reused between sites, applications and other different sources

Example methods

One method to create a strong passphrase is to use dice to select words at random from a long list, a technique often referred to as diceware. While such a collection of words might appear to violate the "not from any dictionary" rule, the security is based entirely on the large number of possible ways to choose from the list of words and not from any secrecy about the words themselves. For example, if there are 7776 words in the list and six words are chosen randomly, then there are 7,7766 = 221,073,919,720,733,357,899,776 combinations, providing about 78 bits of entropy. (The number 7776 was chosen to allow words to be selected by throwing five dice. 7776 = 65) Random word sequences may then be memorized using techniques such as the memory palace.

Another is to choose two phrases, turn one into an acronym, and include it in the second, making the final passphrase. For instance, using two English language typing exercises, we have the following. The quick brown fox jumps over the lazy dog, becomes tqbfjotld. Including it in, Now is the time for all good men to come to the aid of their country, might produce, Now is the time for all good tqbfjotld to come to the aid of their country as the passphrase.

There are several points to note here, all relating to why this example passphrase is not a good one.

  • It has appeared in public and so should be avoided by everyone.
  • It is long (which is a considerable virtue in theory) and requires a good typist as typing errors are much more likely for extended phrases.
  • Individuals and organizations serious about cracking computer security have compiled lists of passwords derived in this manner from the most common quotations, song lyrics, and so on.

The PGP Passphrase FAQ[10] suggests a procedure that attempts a better balance between theoretical security and practicality than this example. All procedures for picking a passphrase involve a tradeoff between security and ease of use; security should be at least "adequate" while not "too seriously" annoying users. Both criteria should be evaluated to match particular situations.

Another supplementary approach to frustrating brute-force attacks is to derive the key from the passphrase using a deliberately slow hash function, such as PBKDF2 as described in RFC 2898.

Windows support

If backward compatibility with Microsoft LAN Manager is not needed, in versions of Windows NT (including Windows 2000, Windows XP and later), a passphrase can be used as a substitute for a Windows password. If the passphrase is longer than 14 characters, this will also avoid the generation of a very weak LM hash.

Unix support

In recent versions of Unix-like operating systems such as Linux, OpenBSD, NetBSD, Solaris and FreeBSD, up to 255-character passphrases can be used.[citation needed]

See also

References

  1. ^ Porter, Sigmund N. (1982). "A password extension for improved human factors". Computers & Security. 1 (1): 54–56. doi:10.1016/0167-4048(82)90025-6.
  2. ^ Nosenko, Alex; Cheng, Yuan; Chen, Haiquan (August 27, 2022). "Password and Passphrase Guessing with Recurrent Neural Networks". Information Systems Frontiers. doi:10.1007/s10796-022-10325-x. ISSN 1387-3326.
  3. ^ Matt Mahoney. "Refining the Estimated Entropy of English by Shannon Game Simulation". Florida Institute of Technology. Retrieved March 27, 2008.
  4. ^ "Electronic Authentication Guideline" (PDF). NIST. Retrieved September 26, 2016.
  5. ^ Jesper M. Johansson. "The Great Debates: Pass Phrases vs. Passwords. Part 2 of 3". Microsoft Corporation. Retrieved March 27, 2008.
  6. ^ Joseph Bonneau, Ekaterina Shutova, Linguistic properties of multi-word passphrases, University of Cambridge
  7. ^ Urbina, Ian (November 19, 2014). "The Secret Life of Passwords". The New York Times Magazine.
  8. ^ Godwin, Dan (March 14, 2012). "Passphrases only marginally more secure than passwords because of poor choices". Retrieved December 9, 2014.
  9. ^ Lundin, Leigh (August 11, 2013). "PINs and Passwords, Part 2". Passwords. Orlando: SleuthSayers.
  10. ^ Randall T. Williams (January 13, 1997). "The Passphrase FAQ". Retrieved December 11, 2006.

Read other articles:

追晉陸軍二級上將趙家驤將軍个人资料出生1910年 大清河南省衛輝府汲縣逝世1958年8月23日(1958歲—08—23)(47—48歲) † 中華民國福建省金門縣国籍 中華民國政党 中國國民黨获奖 青天白日勳章(追贈)军事背景效忠 中華民國服役 國民革命軍 中華民國陸軍服役时间1924年-1958年军衔 二級上將 (追晉)部队四十七師指挥東北剿匪總司令部參謀長陸軍總…

Andreas OsianderLahir19 Desember 1498Gunzenhausen, Kepangeranan AnsbachMeninggal17 Oktober 1552Königsberg, Kadipaten PrusiaPendidikanUniversitas Ingolstadt(tanpa gelar)[1]GerejaLutheran Andreas Osiander ( Jerman: [ˈoːziˌandɐ] ; 19 Desember 1498 – 17 Oktober 1552) adalah seorang teolog Lutheran Jerman dan reformator Protestan. Karier Lahir di Gunzenhausen, Ansbach, di wilayah Franken, Osiander belajar di Universitas Ingolstadt sebelum ditahbiskan sebagai imam pada…

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: List of smoking bans in the United States – news · newspapers · books · scholar · JSTOR (January 2022) (Learn how and when to remove this message) Statewide smoking bans in the United States as of 2018:  No ban   Banned in restaurants  …

Election in Indiana Main article: 2008 United States presidential election 2008 United States presidential election in Indiana ← 2004 November 4, 2008 2012 →   Nominee Barack Obama John McCain Party Democratic Republican Home state Illinois Arizona Running mate Joe Biden Sarah Palin Electoral vote 11 0 Popular vote 1,374,039 1,345,648 Percentage 49.85% 48.82% County Results Congressional District Results Obama   40-50%   50-60% &…

Questa voce sull'argomento contee dell'Illinois è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Contea di McDonoughconteaLocalizzazioneStato Stati Uniti Stato federato Illinois AmministrazioneCapoluogoMacomb Data di istituzione1826 TerritorioCoordinatedel capoluogo40°27′36″N 90°40′48″W / 40.46°N 90.68°W40.46; -90.68 (Contea di McDonough)Coordinate: 40°27′36″N 90°40′48″W / 40.46°N 90.68°W4…

Scottish footballer For the fictional character, see Noughts & Crosses (novel series). This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (February 2023) Callum McGregor McGregor lining up for Scotland in 2019Personal informationFull name Callum William McGregor[1]Date of birth (1993-06-14) 14 June 1993 (age 30)[1]Place of birth …

State capitol building of West Virginia, United States United States historic placeWest Virginia State CapitolU.S. Historic districtContributing property West Virginia State CapitolLocation1900 Kanawha Boulevard East, Charleston, West Virginia, U.S.Coordinates38°20′10″N 81°36′43″W / 38.33611°N 81.61194°W / 38.33611; -81.61194Built1924–1932ArchitectCass GilbertArchitectural styleNeoclassicalPart ofWest Virginia Capitol Complex (ID74002009[1])Adde…

Menara Shanghai上海中心大厦Shànghǎi Zhōngxīn DàshàMenara Shanghai pada tahun 2015.Informasi umumStatusSelesai dibangunLokasiLujiazui, Pudong, Shanghai, TiongkokMulai dibangun29 November 2008[1]Perkiraan rampungTutup atap: 3 Agustus 2013[2][3] Overall completion: 2014[4]BiayaUS$2,2 miliar[4]TinggiArsitektural632 m (2.073 ft)[5]Lantai atas5.567 m (18.264 ft)[5]Data teknisJumlah lantai121[5]Luas lantai38…

GeneralfeldmarschallWerner von BlombergWerner von Blomberg tahun 1934 Menteri PerangNazi JermanMasa jabatan21 Mei 1935 – 27 Januari 1938PendahuluDia sendiri, sebagai Menteri pertahananPenggantiWilhelm Keitel sebagai Petinggi OKWMenteri PertahananNazi JermanMasa jabatan28 Januari 1933 – 21 Mei 1935PendahuluKurt von SchleicherPenggantiDia sendiri, sebagai Menteri perangPetinggi opsir pasukan ke-5Republik WeimarMasa jabatan27 Januari 1927 – 30 September 1929Pendahul…

Type of male genital piercing Reverse Prince AlbertReverse Prince Albert piercingNicknamesRPALocationUrethraJewelryCBRHealing3 months The Reverse Prince Albert piercing (RPA) is a form of male genital piercing. Characteristics The reverse Prince Albert piercing enters through the urethra and exits through a hole pierced in the top of the glans.[1] Because it passes through this thicker glans tissue rather than the comparatively thinner membrane between the urethra and the underside of th…

此条目序言章节没有充分总结全文内容要点。 (2019年3月21日)请考虑扩充序言,清晰概述条目所有重點。请在条目的讨论页讨论此问题。 哈萨克斯坦總統哈薩克總統旗現任Қасым-Жомарт Кемелұлы Тоқаев卡瑟姆若马尔特·托卡耶夫自2019年3月20日在任任期7年首任努尔苏丹·纳扎尔巴耶夫设立1990年4月24日(哈薩克蘇維埃社會主義共和國總統) 哈萨克斯坦 哈萨克斯坦政府與…

豪栄道 豪太郎 場所入りする豪栄道基礎情報四股名 澤井 豪太郎→豪栄道 豪太郎本名 澤井 豪太郎愛称 ゴウタロウ、豪ちゃん、GAD[1][2]生年月日 (1986-04-06) 1986年4月6日(38歳)出身 大阪府寝屋川市身長 183cm体重 160kgBMI 47.26所属部屋 境川部屋得意技 右四つ・出し投げ・切り返し・外掛け・首投げ・右下手投げ成績現在の番付 引退最高位 東大関生涯戦歴 696勝493敗66…

29th race of the 1992 NASCAR Winston Cup Series 1992 Hooters 500 Race details[1] Race 29 of 29 in the 1992 NASCAR Winston Cup Series season The 1992 Hooters 500 program cover, with it paying tribute to Richard Petty, who was retiring from NASCAR after the race.Date November 15, 1992 (1992-November-15)Official name Hooters 500Location Atlanta Motor Speedway, Hampton, GeorgiaCourse Permanent racing facility1.522 mi (2.449 km)Distance 328 laps, 499.216 mi (803.410 km)Weather …

Legislative Assembly election in Chhattisgarh, India 2008 Chhattisgarh Legislative Assembly election ← 2003 14 to 20 November 2008 2013 → All 90 seats to the Legislative Assembly46 seats needed for a majorityTurnout70.66% (0.64pp)   First party Second party Third party   Leader Raman Singh Ajit Jogi Mayawati Party BJP INC BSP Leader since 2003 1999 2003 Leader's seat Rajnandgaon Marwahi Last election 50 37 2 Seats won 50 38 2 Seat change 1…

Former air warfare service of the British Army For the computer game, see Flying Corps. Royal Flying CorpsActive13 April 1912–1 April 1918Disbandedmerged with RNAS to become Royal Air Force (RAF), 1918Country United KingdomAllegianceKing George VBranch British ArmySize3,300 aircraft (1918)Motto(s)Latin: Per Ardua ad AstraThrough Adversity to the StarsWarsFirst World WarCommandersNotablecommandersSir David HendersonHugh TrenchardInsigniaRoundelFlagMilitary unit The Royal Flying Corps …

American TV series ReacherSeason 1 posterGenre Action Crime drama Detective Thriller Based onJack Reacher novel seriesby Lee ChildDeveloped byNick SantoraShowrunnerNick SantoraStarring Alan Ritchson Malcolm Goodwin Willa Fitzgerald Chris Webster Bruce McGill Maria Sten Serinda Swan Shaun Sipos Ferdinand Kingsley Robert Patrick ComposerTony MoralesCountry of originUnited StatesOriginal languageEnglishNo. of seasons2No. of episodes16ProductionExecutive producers Lee Child Nick Santora Scott Sulliv…

British statesman The Right HonourableThe Lord GranthamPCPortrait by George RomneyFirst Lord of TradeIn office9 December 1780 – 11 July 1782MonarchGeorge IIIPrime MinisterLord North The Marquess of RockinghamPreceded byThe Earl of CarlisleSucceeded byThe Lord Sydney (President of the Committee on Trade and Foreign Plantations)Secretary of State for Foreign AffairsIn office13 July 1782 – 2 April 1783MonarchGeorge IIIPrime MinisterThe Earl of ShelburnePreceded byCharles James…

Proposed free trade agreement between Turkey and the United Kingdom Turkey–United Kingdom Free Trade Agreement  Turkey  United KingdomTypeFree trade agreementContextTrade agreement between Turkey and the United KingdomNegotiators Ömer Bolat Kemi Badenoch Parties Turkey United Kingdom LanguageEnglishTurkish The Turkey–United Kingdom free trade agreement (TUKFTA) is a proposed free trade agreement which began negotiations on 14 March 2024.[1] The trade agreement wi…

Township in Atlantic County, New Jersey, US For other places with similar names, see Hamilton, New Jersey. Township in New Jersey, United StatesHamilton Township, New JerseyTownshipWeymouth Road Bridge in Hamilton Township SealMotto: New Jersey's Largest MunicipalityLocation of Hamilton Township in Atlantic County highlighted in yellow (left). Inset map: Location of Atlantic County in New Jersey highlighted in black (right).Census Bureau map of Hamilton Township, Atlantic County, New Jersey…

Broadway musical based on play by Ossie Davis PurlieMusicGary GeldLyricsPeter UdellBookOssie DavisPhilip Rose Peter UdellBasisOssie Davis's play Purlie VictoriousProductions1970 Broadway 1971 U.S. tour 1972 Broadway revival 1975 2nd U.S. tour 1981 U.S. Television 2004 London fringe festival 2005 Encores! Purlie is a musical with a book by Ossie Davis, Philip Rose, and Peter Udell, lyrics by Udell and music by Gary Geld. It is based on Davis's 1961 play Purlie Victorious. Plot Purlie is set in an…