

#Pass the phrase password#
A password is usually short-six to ten characters. Internet services like Hushmail provide free encrypted e-mail or file sharing services, but the security present depends almost entirely on the quality of the chosen passphrase. įor example, the widely used cryptography standard OpenPGP requires that a user make up a passphrase that must be entered whenever decrypting or signing messages. On the other hand, user-selected pass words tend to be much weaker than that, and encouraging users to use even 2-word passphrases may be able to raise entropy from below 10 bits to over 20 bits. In the case of four word phrases, actual entropy rarely exceeds 30 bits. If passphrases are chosen by humans, they are usually biased by the frequency of particular words in natural language. These are difficult conditions to meet, and selecting at least one word that cannot be found in any dictionary significantly increases passphrase strength. The number of combinations which would have to be tested under sufficient conditions make a dictionary attack so difficult as to be infeasible. However, the required effort (in time and cost) can be made impracticably high if there are enough words in the passphrase and if they are randomly chosen and ordered in the passphrase. This is a particular issue if the entire phrase can be found in a book of quotations or phrase compilations.
#Pass the phrase software#
If the words or components of a passphrase may be found in a language dictionary-especially one available as electronic input to a software program-the passphrase is rendered more vulnerable to dictionary attack. For example, the characters in five-letter words each contain 2.3 bits of entropy, which would mean only a 35-character passphrase is necessary to achieve 80 bit strength. There is room for debate regarding the applicability of this equation, depending on the number of bits of entropy assigned. Using this guideline, to achieve the 80-bit strength recommended for high security (non-military) by NIST, a passphrase would need to be 58 characters long, assuming a composition that includes uppercase and alphanumeric.

#Pass the phrase cracked#
An MD5 hash of this passphrase can be cracked in 4 seconds using, indicating that the phrase is found in password cracking databases.) (This calculation does not take into account that this is a well-known quote from the operetta H.M.S. The equation employed here is: 4 bits (1st character) + 14 bits (characters 2–8) + 18 bits (characters 9–20) + 3 bits (characters 21–23) + 6 bits (bonus for upper case, lower case, and alphanumeric) = 45 bits NIST has estimated that the 23-character passphrase "IamtheCapitanofthePina4" contains a 45-bit strength. Considering that the entropy of written English is less than 1.1 bits per character, passphrases can be relatively weak.
