Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. short passwords

short passwords

Scheduled Pinned Locked Moved The Lounge
comdata-structurescryptography
13 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R raddevus

    I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

    P Offline
    P Offline
    PIEBALDconsult
    wrote on last edited by
    #4

    Paraphrased from a short-lived sit-com (circa 1983)... "I once had a colleague whose password was the names of the twelve apostles in reverse alphabetical order... poor fool was always the last to know anything."

    1 Reply Last reply
    0
    • R raddevus

      I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #5

      raddevus wrote:

      They shouldn't care how long the password is at all since they would throw it away anyways.

      No, they'd save a hash. And those are usually fixed in length.

      Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

      1 Reply Last reply
      0
      • R raddevus

        I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

        H Offline
        H Offline
        H Brydon
        wrote on last edited by
        #6

        They wouldn't store the password but a (fixed size, hopefully long enough) hashed version of it. If the hash is shorter than a "really long" password such as yours, then there will be guaranteed collisions. A brute force strategy would find (possibly multiple) valid password(s) that you did not intend. So in one sense, you are correct that they shouldn't care about password length - longer passwords weaken the answer. But that somewhat becomes your problem not theirs. In the big picture, users of that website should be concerned more about the hash length, but users are rarely privy to that info.

        If pigs could fly, just imagine how good their wings would taste! - Harvey

        H 1 Reply Last reply
        0
        • H H Brydon

          They wouldn't store the password but a (fixed size, hopefully long enough) hashed version of it. If the hash is shorter than a "really long" password such as yours, then there will be guaranteed collisions. A brute force strategy would find (possibly multiple) valid password(s) that you did not intend. So in one sense, you are correct that they shouldn't care about password length - longer passwords weaken the answer. But that somewhat becomes your problem not theirs. In the big picture, users of that website should be concerned more about the hash length, but users are rarely privy to that info.

          If pigs could fly, just imagine how good their wings would taste! - Harvey

          H Offline
          H Offline
          harvyk0
          wrote on last edited by
          #7

          H.Brydon wrote:

          If the hash is shorter than a "really long" password such as yours, then there will be guaranteed collisions

          Yeah, this is not a concern. The issue with collisions has to do with can you force a collision. So for instance, it's possible to create two completely different PDF documents, both which come up with the same MD5 hash. Obviously this is a problem if using an SSL certificate. But a password, hashed with a current secure hash, you've got as much chance of finding a valid collision with "Password" as you do with "GuessThisReallyLongPassword".

          L 1 Reply Last reply
          0
          • R raddevus

            I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

            M Offline
            M Offline
            Member 9167057
            wrote on last edited by
            #8

            My passwords are about a dozen characters long (note how I said "characters", not "letters") and didn't get hacked in either way. Length is nice, yes, but it's not everything.

            1 Reply Last reply
            0
            • H harvyk0

              H.Brydon wrote:

              If the hash is shorter than a "really long" password such as yours, then there will be guaranteed collisions

              Yeah, this is not a concern. The issue with collisions has to do with can you force a collision. So for instance, it's possible to create two completely different PDF documents, both which come up with the same MD5 hash. Obviously this is a problem if using an SSL certificate. But a password, hashed with a current secure hash, you've got as much chance of finding a valid collision with "Password" as you do with "GuessThisReallyLongPassword".

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #9

              Would collisions still occur with salted hashes? It’s my understanding that all password hashes ‘should’ be salted

              H 1 Reply Last reply
              0
              • L Lost User

                Would collisions still occur with salted hashes? It’s my understanding that all password hashes ‘should’ be salted

                H Offline
                H Offline
                harvyk0
                wrote on last edited by
                #10

                Salting is something different. The issue is that without salting (aka adding some random data into the password), then it's very easy to reverse hashed but not salted passwords back to plain text using things like rainbow tables. It also stands out if anyone gets hold of the password hashes if default passwords have been used. For example if you see every third account stating it's password is "B2E98AD6F6EB8508DD6A14CFA704BAD7F05F6FB1" it doesn't take long to realise that every user have all entered the same password. In this case Password123. If you want to see a rainbow table in action, do a google search for it, and enter in the above hash and you'll see what I mean. (I won't provide a link, because like all cracking websites, I would suggest being very careful using it, and I'm not willing to post a URL that turns out to be bad). As far as I know, salts can be stored safely with the hash (although I'm all ears if a security person wants to tell me otherwise). Edit - just to answer the actual question: yes, collisions are still technically possible with salted hashes. But again it's not if a collision is technically possible, but rather is there a known way you can cause a collision with two different piece of data.

                1 Reply Last reply
                0
                • R raddevus

                  I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

                  M Offline
                  M Offline
                  MichaelLuna
                  wrote on last edited by
                  #11

                  It really doesn't matter a phising trip is more likely the attack vector.

                  B 1 Reply Last reply
                  0
                  • M MichaelLuna

                    It really doesn't matter a phising trip is more likely the attack vector.

                    B Offline
                    B Offline
                    Bob work
                    wrote on last edited by
                    #12

                    How 'bout a password created from characters not on the keyboard? ¬└┴─╞σ¶§¶¬•♀⌐ÅÆôæ Unicode character [codes] based on significant dates, phone numbers, or lottery tickets - easy to remember. Press the alt key, enter the char code... Makes the character pool much larger for brute force attacks. but I think the only real way the make brute force or dictionary attacks unfeasible is a built-in delay, either in each attempt, or a lockout after a preset number of failed attempts. A thousand bots trying a thousand times a second are much more likely to find a password (or hash collision) than only being able to try three times, and then having to wait 30 minutes to try the next. I agree with you - phishing and social engineering are much more likely attack vectors these days.

                    -Bob

                    1 Reply Last reply
                    0
                    • R raddevus

                      I'm signing up for an Autocad (Eagle software) account and I am warned about my password (being too long because mine is 64 chars): https://i.stack.imgur.com/99w35.png[^] :| But, then, everyone wonders why so many accounts are hacked. :sigh: I don't. At least this one allows 50. Many only allow 15. And, I still don't understand why this would matter if the password is hashed and the company only stores the hash anyways. They shouldn't care how long the password is at all since they would throw it away anyways.

                      M Offline
                      M Offline
                      Martin ISDN
                      wrote on last edited by
                      #13

                      > They shouldn't care how long the password is at all since they would throw it away anyways. they shouldn't care how short it is neither

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups