Password
Password
of Using Passwords
As the need for information security continues to grow at an ever-increasing rate, secure
transactions have become a necessity and great value to corporations. In this race to
have the best that money can buy, authentication systems have received much less
consideration. A time is fast approaching when passwords
will not and cannot be an effective security mechanism for our enterprise environments.
When we consider what a password provides, our discussion must encompass a two-
fold process. The First process is an identification phase (telling who you are), the
second is an authentication phase (obtaining and validating the identification).
Authentication should occur before any rights are granted to the
identifying party. A simple authentication process usually contains a prompt for a secret
password that only the identifying party knows. Identification is of very little value without
authentication in place. Since identification should always be backed up with some type
of credential to provide security, this process is
one of the first and easiest to implement in today’s information technology environments.
Password management years ago washed its hands of creating passwords for users
(“let the users set their own passwords”). Letting the user set his or her own password
nearly always leads to weak passwords. Once we force the setting of strong passwords,
“Sticky Note” passwords become all too common. If we consider current authentication
or password systems, it is easy to determine that certain weaknesses can be traced
back to specific components within the authentication system. The following discussion
highlights the weaknesses of today’s authentication system.
Password Transport
Once a user enters the password was it transmitted to the authenticating device securely
or insecurely? Unfortunately, the answer is insecurely, in most cases. How many times
have you been asked for a password to login to a specific Web page and noticed your
browser was not in a secure mode?
Additionally, many vendors using encrypted transport, which is weak or has other
limitations such as size. Transportation of the secret password is one of the most over-
looked issues in modern authentication devices.
Password Verification
How are passwords verified and correlated to the identity of the user? Many times,
passwords are cached, so the old or invalid password can be used instead of the correct
password. In some cases, the software that is conducting the verification can be over
written by access controls and permissions. The problem with this is the authentication
mechanism is then bypassed, allowing a failed authentication attempt to succeed.
Password Storage
How are the passwords stored on the system? There are 4 levels of storage— Clear,
Encrypted, Hidden-Clear, Hidden-Encrypted. Many software tools have adapted to poor
storage issues in the past, but some are using trivial encryption or allowing the files to be
obtained from the system. A simple brute force cracking program can easily bypass this
encryption. Some of the more popular programs have been developed for most versions
of Unix, Windows NT, Windows 95, and Windows 98, which allows for cracking of both
user passwords and cached passwords. Other programs can reclaim passwords saved
in browsers and applications such as Word, Excel and even Zip files.
Passwords
Passwords are indisputably the biggest risk area in the authentication arena, but they
are also the item we have the most control over. If our users continue to use weak
passwords, it makes no difference how strong we are with transport, storage, verification
and input— we will be compromised!
So why do we keep banging our heads against the “Password Brick Wall”? There are
several explanations. Passwords are the most cost-effective security mechanism; they
are usually free and built into almost all information technologies. Passwords are simple,
easy to use; most users can understand them so there are no barriers to
implementation.
Most password authentication systems work in much the same way, so management is
uniform on a good number of authentication systems. Although passwords may not be
the best security, they are better than nothing at all.
Problems associated with the password are security, brute forcible, common passwords,
lifetime expiration, and disclosure. Brute Forcing of passwords is just guessing the
password; in some cases, we use default passwords or common passwords that are
built into applications and devices. These are all known and usually easily guessable.
Brute forcing of strong passwords is also becoming faster and faster as technology
continues to increase.
Alpha 321,272,406
Upper/lowercase alpha 20,158,268,676
Numeric 1,111,110
Upper/lowercase alpha + numeric 57,731,386,986
Extended 1,108,378,656
Upper/lowercase alpha + numeric + extended 742,912,017,120
Alpha 217,180,147,158
Upper/lowercase alpha 54,507,958,502,660
Numeric 111,111,110
Upper/lowercase alpha + numeric 221,919,451,578,090
Extended 1,134,979,744,800
Upper/lowercase alpha + numeric + extended 6,704,780,954,517,120
Character Sets
Number and percentage of passwords with:.
Lowercase 2,745 86.8%
Uppercase 1,737 54.9%
Numbers 1,240 39.2%
Extended 49 1.6%
Some things that can be done to improve the security of password systems
It is important to note that even if you perform all the previously listed actions to improve
your password security, all you have really done is lengthen the time you can use
passwords securely. Every corporation’s, as well as individual’s, goal should be to find
another type of authentication mechanism, such as the use of digital certificates and
public keys.
S af eS cr ypt L t d.
667- 668 K es hava T ower s , 11th Main, Jayanagar 4th Block,Bangalore – 560011, India Phone No:
+ 91- 80- 6555104 Fax : + 91- 80- 6555300 E -m ai l : s af eex i m @ s af es cr ypt .com