https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&user=108.241.33.101&feedformat=atomexplain xkcd - User contributions [en]2024-03-19T13:21:16ZUser contributionsMediaWiki 1.30.0https://www.explainxkcd.com/wiki/index.php?title=936:_Password_Strength&diff=30633936: Password Strength2013-03-20T22:56:46Z<p>108.241.33.101: /* Transcript */</p>
<hr />
<div>{{comic<br />
| number = 936<br />
| date = August 10, 2011<br />
| title = Password Strength<br />
| image = password_strength.png<br />
| imagesize = <br />
| titletext = To anyone who understands information theory and security and is in an infuriating argument with someone who does not (possibly involving mixed case), I sincerely apologize.<br />
}}<br />
<br />
==Explanation==<br />
{{incomplete}}<br />
Computer security consultant Mark Burnett has posted an [http://xato.net/passwords/analyzing-the-xkcd-comic/ good discussion and analysis] of this comic on his blog.<br />
<br />
This comic is saying that the password in the top frames "Tr0ub4dor&3" is easier for password cracking software to guess than "correcthorsebatterystaple". And this is absolutely true that people make passwords hard to remember because that means that they are "safer".<br />
<br />
It is certainly true that length, all other things being equal, tends to make for very strong passwords and this can confirmed by using [http://rumkin.com/tools/password/passchk.php rumkin.com's password strength checker]. Even if the individual characters are all limited to [a-z], the exponent implied in "we added another lowercase character, so multiply by 26 again" tends to dominate the results.<br />
<br />
Now, what is not clearly addressed:<br />
* Will these passwords have to be ''entered manually''? And if so, how difficult is it, mechanically, to enter a each character of the password? On a keyboard it's easy, but on a smartphone or console... not so much.<br />
* How easy are these passwords to ''remember''? <br />
* How sophisticated are the password attacks? In other words, will they actually attempt common schemes like "dictionary words separated by spaces", or "a complete sentence with punctuation", or "leet-speak numb3r substitution" as implied by xkcd?<br />
<br />
{{w|Steve Gibson (computer programmer)|Steve Gibson}} from the {{w|Security Now}} podcast did a lot of work in this arena and found that this password <code>D0g.....................</code> (24 characters long) is stronger than <code>PrXyc.N(n4k77#L!eVdAfp9</code> (23 characters long) because both have at least one uppercase letter, lowercase letter, number, and "special" character, so length trumps perceived complexity. Steve Gibson makes this very clear in his password haystack [https://www.grc.com/haystack.htm reference guide and tester]:<br />
<br />
:"Once an exhaustive password search begins, '''the most important factor''' is password length!"<br />
<br />
The important thing to take away from this comic is that longer passwords are better because each additional character adds much more time to the breaking of the password. That's what [[Randall]] is trying to get through here. Complexity does not matter unless you have length in passwords. Complexity is more difficult for humans to remember. Length is not.<br />
<br />
==Transcript==<br />
The comic illustrates the relative strength of passwords assuming basic knowledge of the system used to generate them. <br />
A set of boxes is used to indicate how many bits of entropy a section of the password provides.<br />
The comic is laid out with 6 panels arranged in a 3x2 grid.<br />
On each row, the first panel explains the breakdown of a password, the second panel shows how long it would take for a computer to guess, and the third panel provides an example scene showing someone trying to remember the password.<br />
<br />
:[The password "Tr0ub4dor&3" is shown in the center of the panel. A line from each annotation indicates the word section the comment applies to.]<br />
<br />
:Uncommon (non-gibberish) base word<br />
:[Highlighting the base word - 16 bits of entropy.]<br />
:Caps?<br />
:[Highlighting the first letter - 1 bit of entropy.]<br />
:Common Substitutions<br />
:[Highlighting the letters 'a' (substituted by '4') and both 'o's (the first of which is substituted by '0') - 3 bits of entropy.]<br />
:Punctuation<br />
:[Highlighting the symbol appended to the word - 4 bits of entropy.]<br />
:Numeral<br />
:[Highlighting the number appended to the word - 3 bits of entropy.]<br />
:Order unknown<br />
:[Highlighting the appended characters - 1 bit of entropy.]<br />
:(You can add a few more bits to account for the fact that this is only one of a few common formats.)<br />
<br />
:~28 bits of entropy <br />
:2^28 = 3 days at 1000 guesses sec<br />
:(Plausible attack on a weak remote web service. Yes, cracking a stolen hash is faster, but it's not what the average user should worry about.)<br />
:Difficulty to guess: Easy.<br />
<br />
:[Cueball stands scratching his head trying to remember the password.]<br />
:Cueball: Was it trombone? No, Troubador. And one of the O's was a zero?<br />
:Cueball: And there was some symbol...<br />
:Difficulty to remember: Hard.<br />
<br />
:[The passphrase "correct horse battery staple" is shown in the center of the panel.]<br />
:Four random common words {Each word has 11 bits of entropy.}<br />
<br />
:~44 bits of entropy<br />
:2^44 = 550 years at 1000 guesses sec<br />
:Difficulty to guess: Hard.<br />
<br />
:[Cueball is thinking, in his thought bubble a horse is standing to one side talking to an off-screen observer. An arrow points to a staple attached to the side of a battery.]<br />
:Horse: That's a battery staple.<br />
:Observer: Correct!<br />
:Difficulty to remember: You've already memorized it<br />
<br />
The caption below the comic reads: Through 20 years of effort, we've successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.<br />
<br />
==External Links==<br />
* Some info were used from the highest voted answer given to the question of "how accurate is this XKCD comic" at StackExchange [http://security.stackexchange.com/questions/6095/xkcd-936-short-complex-password-or-long-dictionary-passphrase]<br />
* Similarly a question of "how right this comic is" was made at AskMetaFilter [http://ask.metafilter.com/193052/Oh-Randall-you-do-confound-me-so]<br />
* Also the Wikipedia article on 'Passphrase' is useful [http://en.wikipedia.org/wiki/Passphrase]<br />
* In case you missed it in the explanation GRC's Steve Gibson has a fantastic page [https://www.grc.com/haystack.htm] about this (and may have prompted this comic, as his podcast [http://www.grc.com/sn/sn-303.htm] about this was posted the month before this comic).<br />
<br />
{{comic discussion}}<br />
[[Category:Comics featuring Cueball]]<br />
[[Category:Math]]<br />
[[Category:Computers]]</div>108.241.33.101