'Andyhave3cats' is a better password than 'Shehave3cats,' study finds
Carnegie Mellon University researchers find that certain grammar use can make passwords easy to crack, no matter the length or use of numbers, symbols
Computerworld - Using a long phrase or a short sentence as a password may not be as secure as some security experts think.
Researchers at Carnegie Mellon University's Institute for Software Research have found that long passwords that incorporate grammar -- good or bad -- are easier to crack than short passwords without structure.
The research team tested more than 1,400 passwords containing 16 or more characters against a grammar-aware password-cracking algorithm and found that grammatical structure can undermine security.
Ashwini Rao, a Carnegie Mellon software engineering doctoral student and the lead researcher on the project, said that while phrases and sentences can make passwords easier to remember, their grammatical structure significantly narrows the possible word combinations and sequences that hackers -- and their tools -- need to guess.
"We should not blindly rely on the number of words or characters in a password as a measure of its security," said Rao who is scheduled to present the findings of the study on Feb. 20 at the Association for Computing Machinery's Conference on Data and Application Security.
"I've seen password policies that say, 'Use five words,'" Rao said in a statement. "If four of those words are pronouns, they don't add much security."
The passwords used in the study were gleaned from a previously published research paper on password strengths that was presented at an IEEE security conference last year.
About 18% of the passwords had defined grammatical structures in a sequence of two or more dictionary words, Rao said.
Some of the passwords were simple, some contained letter substitutions (such as a "3" for "e") while others tacked on an extra symbol or number. Examples include "abiggerbetterpassword," "thereisnomorered0ts" and "longestpasswordever8."
Several of the passwords also contained other types of structures, such as email addresses, URLs and postal addresses.
The research team developed what it described as a proof-of-concept grammar-aware password-cracking tool to test how long it would take to crack such passwords. The tool used a dictionary for each part of speech and identified a set of grammatical sequences such as "determiner-adjective-noun" that might be used to create a password.
The research team discovered that the strength of a password often has little to do with its length. In fact, the team found that two passwords of identical lengths can differ in strength by orders of magnitude depending on the use grammar.
According to the researchers, the tool evaluates different parts of speech are be used to construct a grammatically correct sentence or phrase.
For instance, pronouns are used less than verbs, which are used less than adjectives which are in turn used less than nouns, the researchers noted in the paper. So a passphrase like "Andyhave3cats" will always be stronger than "Shehave3cats", because the use of a pronoun in the latter passphrase allows it to be broken with a fewer number of guesses, the team noted.
- Feds declare big win over Cryptolocker ransomware
- Hackers hit more businesses through remote access accounts
- P.F. Chang's post-breach move to manual processing is telling
- Microsoft withholds monster IE update from Windows 8.1 dawdlers
- In baffling move, TrueCrypt open-source crypto project shuts down
- 'Oleg Pliss' hack makes for a perfect teachable IT moment
- Give IE the heave-ho until Microsoft patches zero-day
- Hackers find first post-retirement Windows XP-related vulnerability
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!