Question

In: Computer Science

Reusable Passwords The most common authentication credential is the reusable password, which is a string of...

Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets.Ease of Use and Low Cost: The popularity of password authentication is hardly surprising. For users, passwords are familiar and relatively easy to use. For corporate IT departments, passwords add no cost because operating systems and many applications have built-in password authentication.Dictionary Attacks The main problem with passwords is that most users pick very weak passwords. To break into a host by guessing and trying passwords, hackers often use password dictionaries. These are lists of passwords likely to succeed. Running through a password dictionary to see if a password is accepted for a username is called a dictionary attack. Password dictionaries typically have three types of entries: a list of common password, the words in standard dictionaries, and hybrid versions of words such as capitalizing the first letter and adding a digit at the end. If a password is in one of these dictionaries, the attacker may have to try a fewthousand passwords, but this will only take seconds. No password that is in a cracker dictionary is adequately strong, no matter how long it is. Fortunately, good passwords cannot be broken by dictionary attacks. Good passwords have two characteristics. First, they are complex. It is essential to have a mix of upper and lower case letters that does not have a regular pattern such as alternating uppercase letters lowercase letters. It is also good—and some would say necessary—to include non-letter keyboard characters such as the digits (0 through 9) and other special characters (&, #./,?, etc.). If a password is complex, it can only be cracked by a brute-force attack, in which the cracker first tries all combinations of one character passwords, all combinations of two-character passwords, andso forth, until the attacker finds one that works. Complexity is not enough, however. Complex passwords must also be long. For short complex passwords, brute force attacks will still succeed. Beyond about 10 or 12 characters, however, there are too many combinations to try in a reasonable period of time.Overall, while long complex passwords can defeat determined attacks, most users select passwords that can be cracked with dictionary attacks. Reusable passwords are no longer appropriate in an era when password cracking programs can reveal most passwords in seconds or minutes. Passwords are only useful for non-sensitive assets.

1.Discuss and explain the types of passwords are susceptible to dictionary attacks?[5marks]

2.Can a password that can be broken by a dictionary attack be adequately strong if it is very long?Justify your answer. [5marks]

3.Explain the types of passwords can be broken only by brute-force attacks.[5marks]

4.What are the characteristics of passwords that are safe from even brute-force attacks?[5marks]

5.Discuss why is it undesirable to use reusable passwords for anything but the least sensitive assets

Solutions

Expert Solution

A1) Passwords that include words from the English dictionary, or common strings like "12345" and combinations of the above 2 can be easily broken by a dictionary attack. If one wants to have a password that is insusceptible to dictionary attacks, they should try long, complex passwords that are uncommon and unique.

A2) The length of a password that can be broken by a dictionary attack will not significantly affect the chances of resisting a dictionary attack, as irrespective of the length of the string, as long as it exists in a dictionary or is a combination of common words and dictionary words, it will be tried by the attacker.

A3) A good rule of thumb for a password that can only be broken by brute force is one that holds no rhyme or reason. If one character is not related to the pervious character by any line of logic, then the password can only be broken by brute force. Employing a mix of special characters, numbers, and random capitalization mixed with length will ensure that a password can only be broken by brute force.

A4) Passwords that are long, have numbers and special characters, and do not have commonly used passwords or words from the English dictionary can only be broken by a brute force attack.

A5) Many times, a security leak can lead to a list of password and account pairs to be released on the internet. This has happened with secure companies who were betrayed by a disgruntled employee, or a bug in the latest patch of software. When this happens, an attacker will try the same password on your accounts on other platforms, and if you've reused a password, even if its a 256 bit pseudorandom string, it will be of no use.


Related Solutions

Evaluate the strengths and weakness of the following authentication categories: passwords, access cards, and biometrics. Which...
Evaluate the strengths and weakness of the following authentication categories: passwords, access cards, and biometrics. Which do you think works best? Why? You should list strengths and weaknesses for each and explain your thoughts on what works best.
C and Systems Programming Part I. Password Strength Meter Weak passwords are common source of e-mail...
C and Systems Programming Part I. Password Strength Meter Weak passwords are common source of e-mail and social website accounts hacks. To alleviate this problem, pro-grams, often, when the user chooses a new password, determine if it is an adequately strong password. You are to write a function that validates the password strength. The restrictions that we de ne as our de ned level of strength of passwords is the following: the password must be at least eight characters long,...
Write a Java method to check whether a string is a valid password. Password rules: A...
Write a Java method to check whether a string is a valid password. Password rules: A password must have at least ten characters. A password consists of only letters and digits. A password must contain at least two digits. There are at least SIX functions/methods as the following: 1. menu() – to print the password’s rules. 2. getString() – to get the password from the user. 3. isPassword() – to check either the password is valid based on the given...
Search the web to discover the ten most common user-selected passwords, and store them in an...
Search the web to discover the ten most common user-selected passwords, and store them in an array. -Draw a flowchart and pseudocode for a program that prompts a user for a password, and continue to prompt the user until the user has not chosen one of the common passwords. Make a working version of this program in Python. ( need correct code )
Search the web to discover the 10 most common user-selected passwords, and store them in an...
Search the web to discover the 10 most common user-selected passwords, and store them in an array. Design a JAVA program that prompts a user for a password, and continue to prompt the user until the user has not chosen one of the common passwords.
A password is a sequence of letters (a–z) and digits (0–9). Findthe number of passwords...
A password is a sequence of letters (a–z) and digits (0–9). Find the number of passwords of length 10 under the constraints in (a), (b) or (c) (three separate problems). Express your answer using factorials and integers, products and ratios of them, and/or sums of such things.(a) There are 3 letters and 7 digits, and at most one ‘9’.(b) There are 6 letters and 4 digits, and no digit occurs twice.(c) No letters are used BUT the first four digits...
A password is a sequence of letters (a–z) and digits (0–9). Find the number of passwords...
A password is a sequence of letters (a–z) and digits (0–9). Find the number of passwords of length 10 under the constraints in (a), (b) or (c) (three separate problems). Express your answer using factorials and integers, products and ratios of them, and/or sums of such things. (a) There are 3 letters and 7 digits, and at most one ‘9’. (b) There are 6 letters and 4 digits, and no digit occurs twice. (c) No letters are used BUT the...
A website has the following policy for creating a password: • Passwords must be exactly 8...
A website has the following policy for creating a password: • Passwords must be exactly 8 characters in length. • Passwords must include at least one letter (a-z, A-Z) or supported special character (@, #, $ only). All letters are case-sensitive. • Passwords must include at least one number (0-9). • Passwords cannot contain spaces or unsupported special characters According to this policy, how many possible passwords are available? (Round to the nearest trillion)
A password verification system that does not allow user passwords to be proper names or words...
A password verification system that does not allow user passwords to be proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems. Group of answer choices Attack Risk Asset Countermeasure
1-If attackers are able to get their hands on a password file, where all the passwords...
1-If attackers are able to get their hands on a password file, where all the passwords are hashed and salted, what would be their best approach to obtain at least one of these password? Here an example of the first two lines of a generic password file: HASH (SHA-256) SALT 1138275656b8e5d8f48a98c3c92df27e6fbfe24a750e72930c220a8e2caba935 535788591 ee65ef498fb368a2dfd38b40f0ee75c05963cd9da6e5f014118c7d9747fcc97f4 778035290 2-Play-Doh™ (Links to an external site.) has been used to get access to systems that used fingerprinting as access control (yup, and it worked 90% of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT