Risk
1/30/2013
12:41 PM
50%
50%

Want Stronger Passwords? Try Bad Grammar

Beware passwords built using too many pronouns or verbs, Carnegie Mellon security researchers say. String together nouns instead.

Want to build a better password? Stick to nouns and adjectives, and avoid verbs and pronouns.

That finding comes from a research paper written by Ashwini Rao, a Ph.D. student at Carnegie Mellon University, and two colleagues, titled "Effect of Grammar on Security of Long Passwords." Rao will present the paper at next month's Association for Computing Machinery's Conference on Data and Application Security and Privacy (CODASPY 2013) in San Antonio, Texas.

"Use of long sentence-like or phrase-like passwords such as 'abiggerbetterpassword' and 'thecommunistfairy' is increasing," the researchers said in their paper. But could some types of passphrases be inherently less secure than others?

To find out, they built a grammar-aware passphrase cracker and preloaded it with a dictionary for speech, as well as an algorithm for recognizing the types of sequences that are typically used to generate passphrases, such as "noun-verb-adjective-adverb."

Passphrases are an often-recommended technique for creating complex passwords. Instead of creating a password like "sheep," for example, security experts recommend a passphrase such as "wolves8sheep@sleep." Simply put, passphrases can add complexity -- making passwords harder to crack or guess for an attacker -- while still being easy to remember.

[ For the latest on Java's security vulnerabilities, see Java Security Work Remains, Bug Hunter Says. ]

But as is always the case with passwords, some types of passphrase complexity are better than others. The researchers tested their proof-of-concept software against 1,434 passwords, each containing 16 or more characters, and found that by taking grammar into consideration, they were able to crack three times as many passwords as current state-of-the-art cracking tools. In addition, their tool alone cracked 10% of the password data set.

Cue their resulting finding: The strength of long passwords does not increase uniformly with length.

Based on their research, good grammar comes at a security cost because some grammatical structures are scarcer than others, which in passphrases makes them easier to crack. In terms of scarcity, the researchers noted that pronouns are far fewer in number than verbs, verbs fewer than adjectives, and adjectives fewer than nouns.

The bottom line: Emphasize nouns and adjectives in passphrases. For example, the researchers found that the five-word passphrase "Th3r3 can only b3 #1!" was easier to crack that this three-word passphrase: "Hammered asinine requirements." Meanwhile, they found that the passphrase "My passw0rd is $uper str0ng!" was 100 times stronger than "Superman is $uper str0ng!" and in turn that phrase was 10,000 times stronger than "Th3r3 can only b3 #1!"

The researchers said their findings should be applied to help users select more secure passwords. They also said the research may apply not just to passphrases but to securing other types of structures such as postal addresses, email addresses and URLs present within long passwords -- or perhaps even encrypted sets of data.

"I've seen password policies that say, 'Use five words,'" said report author Rao in a statement. "Well, if four of those words are pronouns, they don't add much security."

To keep those recommendations in perspective, complex passwords won't immunize people's passwords against every type of attack -- especially if the passwords get stored insecurely.

But in cases where attackers obtained stored passwords that have been hashed or encrypted, the more complex the password, the longer it may take for an attacker to decrypt the password, if it can be decoded at all. Any delay can buy website owners time to spot the related breach, notify customers and immediately expire all current passwords, thus helping to contain the breach.

Your employees are a critical part of your security program, particularly when it comes to the endpoint. Whether it's a PC, smartphone or tablet, your end users are on the front lines of phishing attempts and malware attacks. Read our Security: Get Users To Care report to find out how to keep your company safe. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
JDC3
50%
50%
JDC3,
User Rank: Apprentice
1/30/2013 | 8:02:13 PM
re: Want Stronger Passwords? Try Bad Grammar
Good article. I find it interesting that the special characters did not add as much complexity as I would have thought. For strong passwords I recommend using a password manager like RoboForm. I use the password generator to create the strong passwords, and then the software saves the passwords so I don't need to remember them. There's others out there, but I like RoboForm the best.
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
1/31/2013 | 12:42:33 AM
re: Want Stronger Passwords? Try Bad Grammar
As an editor, I don't know if I can condone the use of bad grammar, even in the name of security.

Drew Conry-Murray
Editor, Network Computing
ComputerPhil
50%
50%
ComputerPhil,
User Rank: Apprentice
2/6/2013 | 4:48:54 PM
re: Want Stronger Passwords? Try Bad Grammar
Came to make a comment recommending RoboForm and am happy to see someone beat me to it. RoboForm creates statistically secure passwords for me, then encrypts and stores them so they can be replayed automatically by RoboForm and I don't have to worry about typing in the long passwords. I strongly suggest anyone concerned with security (or just looking to make their life on the internet easier) check out RoboForm by Siber Systems.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?