Beefy Boxes and Bandwidth Generously Provided by pair Networks
Syntactic Confectionery Delight
 
PerlMonks  

Re^4: Password strength calculation

by Ralesk (Pilgrim)
on Jan 22, 2012 at 01:23 UTC ( [id://949209]=note: print w/replies, xml ) Need Help??


in reply to Re^3: Password strength calculation
in thread Password strength calculation

I beg to differ here.

If we’re removing passwords shorter than, say, 8 (or 12) characters, or are requiring people to use capitals, digits and other characters, we might be removing things the attacker needs to check, yes… but in the end, we have not actually removed anything — we’re storing (salted) hashes, and the way cryptographic hashes (are supposed to) work, if you remove a small (and from the point of the entire possible space of input strings, negligible) part of the input space, you’re still going to end up with the same amount of possible hashes. As long as you do still have a much greater (possible) input space than the hash’s own data size, you should be fine. So it comes down to restricting utterly stupid input even at the cost of the attacker getting to know they need to eliminate a few things before trying, and using large (and slow) hashes to make an attack infeasible.

Some of your calculations — as also pointed out by others — also seem to assume that the attacker has their hands on your password DB and all they need to do is use CPU time to guess the password so they can get in afterwards, not needing to hammer on the site during this. That’s already a lost cause by that time, I’d say…

(PS: I might not have found the right spot in the thread to reply to, but oh well.)

(PPS: Also, this is not to say that passphrases are stupid, I’m all for them as opposed to weird alphanum vomits. Shame they don’t work on places like this, where you’re limited to a maximum of a few characters…)

Replies are listed 'Best First'.
Re^5: Password strength calculation
by BrowserUk (Patriarch) on Jan 22, 2012 at 13:38 UTC
    if you remove a small (...) part of the input space, you’re still going to end up with the same amount of possible hashes.

    The number of "possible hashes" does not enter into it. It is the input space that the hacker needs to iterate, not the hash space.

    That is to say, the hacker needs to find an input that when hashed, matches the hash in question. Smaller the input space, the less work he has to do.


    With the rise and rise of 'Social' network sites: 'Computers are making people easier to use everyday'
    Examine what is said, not who speaks -- Silence betokens consent -- Love the truth but pardon error.
    "Science is about questioning the status quo. Questioning authority".
    In the absence of evidence, opinion is indistinguishable from prejudice.

    The start of some sanity?

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://949209]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others studying the Monastery: (6)
As of 2024-04-19 11:10 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found