I’m going to predict that
the last password you used had the number 1 in it? No, what about the number 2?
If you answered yes then you're in the ~30% of people that use a tailing 1 or 2
in their passwords. What about letters, does your password include the letter
e, the letter t? If it does then you’re also in the high percentage of people
where e’s and t’s are their most used letters.
People are predictable. We follow patterns, schedules and do
what we know and are comfortable with. There is already some great research out
there on why we do the things we do. Whether it’s movement dynamics in crowds or looking at how we
create traffic jams without a bottleneck. The real
question, for us, comes down to how we can use these principles in computer
security.
Passwords are one of the most intrinsic parts of our online
lives. Some great teams, from Troy Hunt withHave I Been Pwned to the people at WPengine andtheir research on ten million passwords, have been doing great
work in both correlating and analyzing the passwords we use day to
day.
Let’s take a step back and look back at our earlier prediction. Benford's law is a principle which defines
that lower digits are more likely to be used over larger ones. From bus numbers
to Twitter followers, we can see Benford's law put into practice in our day to
day lives.
We can also see this in password security. In a study by
WPengine of ten million passwords they concluded that the top three trailing
numbers for passwords came down to 1 (23.84%), 2 (6.27%) and 3 (3.86%). This
matches quite closely to the premise behind Benford's law.
Next we have letters. In a similar way to how Benford's law
predicts the occurrence of numbers, frequency analysis can be used to predict
the occurrence of letters. If we perform frequency analysis on the English
language we can see that the most common letters are: e, t, and a.
Looking back at the WPengine research, and their ten most common
password list, we can see that the letter e alone shows up in 60% of the
passwords.
There is a great quote from Steve Davidson in his book The
Crystal Ball that states: "Forecasting future events is often like
searching for a black cat in an unlit room, that may not even be
there." This is the same for predicting passwords. All in all there
are around: three quadrillion, twenty five trillion, nine hundred and eighty
nine billion, sixty nine million, one hundred and forty three thousand and
forty possible password permutations for an eight character password. That
being the case, we’re probably not going to be guessing anyone’s full password
any time soon.
We’re not going to give up there however. Even though it’s
unlikely that someone's going to guess a password right off the bat there are
still a plethora of ways that passwords can get compromised. This includes
social engineering and OSInt to data breaches and password complexity.
The tried and tested advice still stands: create strong or
random passwords, use a password manager (if that’s what works for you) and
don’t make predictable passwords.
No comments:
Post a Comment