'End of passwords' predictions are premature - Cambridge boffin

Nice fresh well-salted hash will keep them healthy

Reducing security risks from open source software

Advances in the power of computers won't automatically make passwords obsolete, according to a top computer science researcher.

Joseph Bonneau, a postgrad researcher at Cambridge University, looked into the perceived wisdom that runs along these lines: "Since computers are getting exponentially faster, yet the human brain is constant, then password crackers will eventually beat human memory."

Remarks such as this are often made when the latest advances in increasingly powerful graphics processors for password cracking or similar stories hit the news. Bonneau doesn't dispute that password cracking is getting faster or that easily guessable or reused passwords are toast. Instead he disputes the idea that well thought out, complex passwords stored using a sufficiently robust hash function with proper salting have had their day.

A hash function is a mathematical process that takes a "message" and forms a message digest or hash from it. Storing plain text passwords as part of an online authentication system is an obviously bad idea. If a website is broken into and the passwords are lifted then even well thought out passwords are exposed.

Instead websites need to store password hashes, protected by salting, in order to prevent brute force attacks using rainbow tables.

A password hash is computationally easy to create but working out the corresponding password from a hash ought to be nearly impossible, given a correctly implemented hash function. Rainbow tables circumvent this snag by creating a large data set of hashes from nearly every possible password. Faster number-crunching chips make it possible to derive and run through an increasing volume of possible passwords, increasing the potency of such brute force attacks.

Bonneau argues however that this points towards an arms race necessitating the development of better hashing algorithms rather than an inexorable move towards the end of days for passwords.

"Password cracking is certainly getting faster," Bonneau explains. "In my thesis I charted 20 years of password cracking improvements and found an increase of about 1,000 in the number of guesses per second per unit cost that could be achieved, almost exactly a Moore’s Law-style doubling every two years.

"The good news though is that password hash functions can (and should) co-evolve to get proportionately costlier to evaluate over time. This is a classic arms race and keeping pace simply requires regularly increasing the number of iterations in a password hash. We can even improve against password cracking over time using memory-bound functions, because memory speeds aren’t increasing nearly as quickly and are harder to attack using parallelism," he adds.

Bonneau cautions against complacency: hashing passwords isn't going to get any more efficient over time and older algorithms will need to be replaced by more complex successors. As well as the brute force problem, hashing algorithms can come under increasing pressure from new types of cryptanalysis.

"Moore’s Law has indeed broken MD5 as a password hash and no serious application should still use it. Human memory isn’t more of a problem today than it used to be though. The problem is that we’ve chosen to let password verification become too cheap," Bonneau argued.

Booneau's remarks come days after Deloitte Canada warned that the password was doomed. It predicted more than 90 per cent of user-generated passwords will be vulnerable to hacking during the course of 2013.

“Passwords containing at least eight characters, one number, mixed-case letters and non-alphanumeric symbols were once believed to be robust. But these can be easily cracked with the emergence of advanced hardware and software,” Duncan Stewart, director, Deloitte Canada Research said. Deloitte Canada made the point while arguing for more widespread use of two-factor authentication using either tokens or mobile phone technology. Password vaults, secured by two-factor authentication, can play a role in driving the wider use of more complex passwords that users don't necessarily have to remember, the management consultancy argues, adding that disaster beckons for continued use of current password choices.

"In a recent study of six million actual user-generated passwords, the 10,000 most common passwords would have accessed 98.1 percent of all accounts," Deloitte Canada adds.

Easily guessable passwords are arguably a lesser problem than password re-use. The average user has 26 password-protected accounts, but only five different passwords across those accounts, according to a recent study by credit reference agency Experian.

Deloitte Canada's prognosis on password problems can can be read on page 11 of a larger report on tech trends here (PDF). ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story


Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.