KenCrooker.com

Fingers Were Meant to be Inky

TwitterFacebookPhotosRSS
  • Home
  • Reviews
  • Pen Pain
  • Internet Safety
  • About
  • Contact
  • Toggle Mobile Menu
  • Back to Top

March 2, 2014 / Ken Crooker / Security, Tech, Tutorials / Leave a Comment

Show Me How: Make Great Passwords

Sign In

So over the past few weeks, I informed you that your passwords probably suck and why they suck, and then I gave you some general tips on how to make sure your passwords are strong. Today, we’ll take a look at how to actually put together some killer passwords that aren’t going to get hacked (unless you write them down on sticky notes and plaster them all over your office…I just can’t help you with that one).

In Part III of my passwords series, I discussed two major rules for making strong passwords:

  1. Follow the Rule of Four: Make sure you use all four character sets when creating a password (lowercase letters, uppercase letters, numbers, and special characters).
  2. Longer is Stronger: The longer your password is, the longer it takes a hacker to brute force it open. By today’s standard, 14 characters is probably long enough (it could take up to 15 thousand centuries to crack if you use all four character sets).

The trouble with long passwords that contain all four character sets is that they can get unwieldy and hard to remember, especially if you’re using a different password for every site you use, which you are doing…right? In a perfect world, your passwords need to be unique and too long for a hacker to crack, but easy enough for you to remember. Follow me to that perfect world…

For this article, I’m going to return to security expert Steve Gibson’s Password Haystack concept because, well, the guy’s a genius and his approach to passwords is spot-on. Mr. Gibson introduces the concept of padding where you come up with a short, easy-to-remember word or phrase, then add easy-to-remember padding to it to make it longer and stronger. In his post, Mr. Gibson asks us which of the following passwords we think is more secure:

D0g…………………

PrXyc.N(n4k77#L!eVdAfp9

Believe it or not, the first password takes approximately 95 times longer to brute-force crack as the second one, even though it’s so much easier to remember. Mr. Gibson goes into a lot more detail in his article, and I’d recommend reading it. Or if video is more up your alley, he discusses his theories in his Security Now podcast.

Now, don’t go slapping a bunch of periods at the end of your crummy passwords and expect good things. The Haystack article is over two years old and the hackers have caught on to the “periods at the end” thing. But the concept is still valid. What you need to do is come up with your own padding schemes and use them with your own base words to make them unique, easy to remember, and super secure. Let’s look some examples:

EXAMPLE 1:

Say you’re a Chevy person and you really love the Camaro. It’s a beauty, ain’t it? Anyway, you could start with a base of Camaro. You have Uppercase and Lowercase letters, so it’s a decent start.

For padding, you could use symbols that look like the front of a car: 0o..=..o0 – That adds numbers (zeros) and special characters (periods and equals sign) so you’re meeting the Rule of Four. Add the word and the padding together and you get a 15-character password.

The Haystack Calculator indicates that Camaro0o..=..o0 would take between 15,000 centuries and 1.5 million centuries to brute force. And if you like the Camaro, it should be easy for you to remember.

EXAMPLE 2:

You’re really into Valentine’s day, so your base word is: Cupid

It’s an easy word, so you decide to change the i to a number 1 to make it slightly harder to crack: Cup1d

You come up with some padding that looks like an arrow piercing a heart: >>–<3–>

Nothing says you can’t put the padding at the beginning, so you have >>–<3–>Cup1d as a final password. It consists of 14 characters and uses all four character sets, so it should be safe for several thousand centuries.

EXAMPLE 3:

Maybe you dig airplanes, so you start with a base: JetPlane

You build padding that resembles an airplane coming toward you: ––0-^V^-0––

Nothing says you can’t put the padding in the middle, so you have Jet––0-^V^-0––Plane …It’s 19 characters that should be safe from a brute force attack for about a hundred trillion centuries.

I hope you’re starting to see how this all works. By starting with common words and generating padding, you can come up with many passwords that are both easy for you to remember and too hard for a hacker to crack. The padding examples I came up with above are fairly elaborate. You can always make simpler ones like **8** or >-3-< or <===L7=.

The possibilities are endless. Go ahead, come up with your own…they’ll be easier for you to remember that way!

I came up with above. Because I’m publishing this article to the Internet, there’s a chance hackers will find this site and add these specific passwords to their dictionaries.

NEXT STEP: DEVELOP A SYSTEM

So now you know how to make a password strong and easier to remember. And that’s great if you need to come up with one password. But remember, you want to come up with a different password for each site you log in to. What if that’s 100 sites? Then the task of coming up with 100 passwords becomes daunting. Unless, of course, you have some sort of system to keep it manageable.

Say you use a combination of two words for a base. Maybe an adjective + a noun. For example the term Vanilla Pudding. If you come up with five adjectives and five nouns, you now have 25 possible combinations.

Now here’s the beauty, simply come up with four different padding schemes, and you now have 100 possible unique combinations. And to further spice things up, you can place the padding either at the beginning of the password, at the end of the password, or in between the two terms. Technically, this now gives you 300 different unique combinations out of ten starting terms and four padding schemes.

[table width=100%] “Adjectives”,”Nouns”,”Padding”,”Padding Placement”
“Vanilla”,”Pudding”,”0o–=–o0″,”Beginning”
“Chocolate”,”Custard”,”>-8-<“,”In Between”
“Cherry”, “Jelly”,”>>–<3–>”,”End”
“Coconut”,”Creme”,”[[[19]]]”,” ”
“Lemon”,”Sherbet”,” “,” ”
[/table]

You get a lot of bang for your buck with a system like this.

FINAL THOUGHT: DON’T WRITE THEM DOWN!

So once you’ve gone through all the paces, you have yourself a pile of strong, unique, easy-to-remember passwords. You’ll still need help remembering them, but you can’t write them down. If someone breaks into your house and finds your sticky notes or notebook, they’ll get access to everything. Instead, come up with code words for your terms that only you know.

For example, say you combine terms and come up with Vanilla0o–=–o0Jelly as a password. Don’t write it like that. Maybe you’re a big Golden Earring fan and you love the song Vanilla Queen. And maybe the term Jelly reminds you of the band Green Jelly and their song about the Big Bad Wolf. And you know the padding as the Camaro padding from the Example above. So instead of writing down the real password, you can write down QueenCamaroWolf. No one else knows what that means, but you know they stand for Vanilla, 0o–=–o0, and Jelly.

Sound easier than you thought it would? I hope so. In my next article about passwords, I’ll talk a little about ways to manage passwords so they don’t get out of hand. Until then, use this handy little checklist to make sure you’re passwords are up to snuff:

  • Did you use characters from all four character sets (lowercase letters, uppercase letters, numbers, special characters)?
  • Do you have at least 14 characters in your password?
  • Did you make sensible use of padding?
  • Is your password easy to remember?

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

Related

hackers passwords security technology tutorial

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

What’s Next?

You may have noticed that I haven't posted anything in a really long time. Sorry about that. Once we started up the St. Louis Pen Show and the St. Louis pen meetups, most of my free "pen time" started going into those activities.

My goal was always to write very thorough reviews with lots of great pictures, and that takes a ton of time. The writing, editing, and photo editing for one review took up a full weekend, and that doesn't take into account actually using the pens and taking notes along the way. With all I have going on, it just wasn't sustainable to keep this site going on a consistent basis.

Will I ever come back and start doing reviews again? Maybe. But not anytime soon. I am still around, though. You can catch me at the monthly St. Louis Area Pen Meetup & Eats (SLAPME) events, the St. Louis Pen Show, and a handful of other pen shows around the country.

Subscribe!

Type your email, click Subscribe, and you'll get notified via email when I post!

Categories

Babble Commentary Conspiracy Entertainment Fountain Pens Ink Music Paper Pen Pain Photography Reviews Security Social Tech Tutorials Uncategorized

Copyright KenCrooker.com

 

Loading Comments...