P
Pattern of Blood Vessels
“A good password is one that is easily remembered, yet
difficult to guess” [
]. Because of the importance of choos-
ing “good” passwords for maintaining password security,
users should be educated and given guidelines for choosing
passwords. The most important ones are:
. Choose long passwords to enlarge the search space for
an attacker.
. Do not choose words that are likely to appear in a
dictionary, not even with variations.
. Do not base passwords on any public information
about yourself (birthdate, hobby, children’s names),
because it may help attackers in guessing.
. Use the initial letters of the words in a sentence that you
can remember, e.g., turn a sentence like “my daughter
prefers muffins over cheese cake most of the time” into
a password “
mdpmoccmott
”. Words created in this
manner are unlikely to be found in any dictionary.
. Insert punctuation characters and digits freely, and
capitalize some characters, e.g., turn “
mdpmoccmott
”
into “
mD4pMo,cCmott
” to further enlarge the search
space.
Three main lines of defense against attacks on password
security can be identified:
. Reactive – carry out internal dictionary attacks to
check for weak passwords. If a weak password is found,
the respective account should be blocked until the user
chooses a new password.
. Proactive – educate users about the importance of
choosing good passwords. Prevent them from choos-
ing weak passwords, i.e., reject passwords that are too
short, that are found within a dictionary, or are oth-
erwise considered easy to guess. Proactive password
checks can be integrated into the system programs
that modify a password so that any new password is
checked to be reasonably secure before it is accepted.
. Secretive – protect password files so that not even
the encrypted or hashed passwords can be obtained.
It is standard practice in modern UNIX systems to
“shadow” out passwords from the password file, i.e.,
maintain a separate file that can only be read by system
administrators.
In summary, passwords are a compromise between
convenience, user acceptance, and cost versus security. In
highly sensitive environments, alternative authentication
mechanisms should be considered, e.g., mechanisms based
on biometric identification, on small user devices that gen-
erate one-time passwords, such as RSA’s SecurID (TM), or
on combinations of these mechanisms.