Best Practices for Password Strength
|
|
|
- Jemima Dawson
- 10 years ago
- Views:
Transcription
1 A. Allan Research Note 6 December 2004 Passwords Are Near the Breaking Point Mitigating authentication weaknesses by increasing password length and complexity will reduce security if passwords are pushed beyond the peak of their effectiveness. They are approaching this point now. Core Topic Security and Privacy: Security Administration Key Issue How will identity and access management evolve as an enterprise infrastructure? Strategic Planning Assumption By 2007, 80 percent of organizations will reach the password breaking point and will need to strengthen user authentication with alternative security methods (0.8 probability). Passwords are a ubiquitous authentication method, despite many well-known vulnerabilities (see "Best Practices for Managing Passwords: Overview"). Password management was seldom a major issue in the desktop/tower PC world because an attacker needed physical access to the desktop PC, which wasn't easy to get. Thus, over-the-network attacks against vulnerabilities were the path of least resistance. However, it is much easier for attackers to gain physical access to laptops and personal digital assistants (PDAs) because these devices are portable and thus often lost or stolen. Although stronger authentication becomes more important as the use of laptops and PDAs increases, most organizations are responding by making simple passwords longer and more complex. This also makes passwords more difficult to remember. Even with simple passwords, many users write down their passwords even when corporate security policies say they shouldn't, which reduces the security that passwords offer. Increasing the length and complexity of passwords will drive so many users to write down their passwords that it will yield a net reduction in security the password breaking point. Best Practices for Password Strength Our recommendations for password length, as defined in "Best Practices for Managing Passwords: Formation," are: A password of eight or more characters is strongly recommended. A password of six or more characters is the minimum acceptable length. Sensitive systems or situations (for example, remote access) demand longer passwords approximately twice as long as for nonsensitive systems. Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Length is one of two criteria for password strength the other is complexity. Our best practices provide seven rules for complexity, with the fundamental aim that a password should be as unlike a word, phrase, date or other string with semantic content as possible. Our password guidelines recommend that users construct passwords from the first letter of each word of a favorite song, poem, quotation or other source, and substitute numbers and other characters. Similarly, the United States Computer Emergency Response Team's Cyber Security Tip ST (11 February 2004) recommends that users "develop a mnemonic for remembering complex passwords" for example, the phrase "I like to play basketball" could yield the password "iltpbb" or (better) "il!tpbb." An alternative approach is to use a very long but less-complex password, such as a "passphrase" (see Note 1). Note 1 Passphrases The security of weak chosen passwords is low but persistent. Very-long chosen text that is, a "passphrase" may offer more security than a shorter complex password. However, the security of passphrases may be reduced by an increased susceptibility to shoulder-surfing attacks (and social engineering attacks), because passphrases take longer to type and may be more easily guessed by an attacker who sees only part of the phrase. Another barrier to the broad use of passphrases is the lack of support for long passwords. Although Windows operating systems, from Windows 2000 onward, support a maximum password length of 127 characters, many systems have much lower limits (for example, eight in z/os RACF). Completely random passwords offer the most complexity. However, a password must be memorable to be useful, and many users would have difficulty remembering a random sixcharacter password, nevermind a dozen or so that they may need to use. (A number of tools simplify password management for users; see "Take Care With Password Management Tools to Achieve Security" and "Enterprise Single Sign-On Tools Are Comprehensive but Costly.") Entropy as a Measurement of Password Strength The strength of a password that follows from length and complexity can be measured by its entropy. The easiest way to express entropy is in terms of the number of bits of complexity that the password has. For example, a random password that is 8 bytes in length (with 8 bits per byte) would have 8 x 8 = 64 bits of entropy typically, 2 63 passwords must be tried before the password could be cracked. However, it is difficult to achieve 8 bits of entropy per character because keyboards restrict the number of characters that users can easily enter, and users have difficulty remembering passwords that don't have a structure. Figure 1 plots password entropy against password length for "weak chosen" (2.5 bits of entropy per character), "strong chosen" (4.3 bits) and "random" (6.5 bits) passwords. It also shows estimates for passwords that follow our good password guidelines that is, "initialisms." Because initialisms are not formed from English words, the entropy reduction due to patterning is greatly reduced, although initialisms are not truly random. The entropy per character is probably between 5 bits and 6 bits. (An analysis of a possible source of such initialisms an English edition of Leo Tolstoy's "War and Peace" yields 5.7 bits to 5.9 bits.) For comparison, Figure 1 also includes 6 December
3 telephone numbers with an entropy of log (10) = 3.3 bits per 2 character. Password Entropy (Bits) Figure 1 Password Entropy vs. Password Length Password Type Weak Chosen Phone Number Strong Chosen 40 Initialism 20 Random Source: Gartner Research (December 2004) Password Length (Characters) "Treat Passwords as Ineffective on PCs" states that standard recommendations for password strength of between six and eight characters may no longer be sufficient for secure systems. Our "one month to crack," 46-bits-of-entropy target could be met by a password that follows our best-practice recommendations. Entropy and Memorability Higher entropy makes a password more difficult for a user to memorize. Therefore, you can't make passwords arbitrarily strong, even if your software allows it, because at some point you will get diminishing security return. We believe that this breaking point is only a little beyond current best practices. The more difficult that a password is to remember, the greater the likelihood that a user will write it down even when prohibited by an organization's information security policy. We hope that the egregious use of sticky notes on PC monitors is a vanishing practice, but other common hiding places, such as under mouse mats or tissue boxes, don't offer much additional protection. The majority of financially damaging security breaches are the result of insider attacks. Thus, writing down a password that could be obtained by an unscrupulous colleague is dangerous. Figure 2 plots the percentage of users who will write down their passwords against password entropy. This is speculative, is based on anecdotal evidence and assumes a normal (Gaussian) distribution. Informal surveys tend to show that about a third of 6 December
4 users write down passwords that follow "common practice" password rules six characters, with some format restrictions, for 6 x 4.3 ~ 25 bits of entropy. A distribution with a mean of 30 and a standard deviation of 9 seems to be a reasonable, although simplified, assumption. Some users will be able to remember long, complex passwords or will be less likely to "misbehave" than others. Thus, there may be a more-attenuated distribution for high password entropy, perhaps following a Maxwell-Boltzmann distribution. For this research, we made the simplified assumption. Figure 2 Users Who Write Down Their Passwords vs. Password Entropy 120% 100 Percentage of Users Who Will Write Down Their Passwords Source: Gartner Research (December 2004) Password Entropy (Bits) Difficult-to-Remember Passwords Are Less Secure What is the impact on security if users write down their passwords? Figure 3 plots effective entropy a measure of the true security afforded by passwords across many users in an organization against password length. Effective entropy is calculated based on the fact that a password that is written down has zero entropy. This is another simplified assumption, because although an effectively hidden password will have an entropy that is higher than zero, most users choose easy-to-guess hiding places. Thus, the entropy of a password collapses to a close-tozero value when it is written down. The percentage of users who write down a password is equal to the percentage reduction in entropy. 6 December
5 Figure 3 Effective Entropy vs. Password Length Password Type Weak Chosen Phone Number Strong Chosen Initialism Random 12 Effective Password Entropy (Bits) Password Length (Characters) Source: Gartner Research (December 2004) Based on our assumed normal distribution, the maximum effective entropy of all types of passwords is about 18 bits. The number of characters required to reach maximum effective entropy for each password type is: Random three to four Initialism four Strong chosen five to six Weak chosen 10 6 December
6 If our assumptions are correct, then most organizations should have reached the breaking point of passwords. (Using a morerealistic Maxwell-Boltzmann distribution would have little impact on the maxima, although the distribution would be stretched out to the right of the peak.) However, this result doesn't fit with the apparent effectiveness of passwords. Perhaps we were too pessimistic in our simplified assumptions and, in fact, less than a third of users will write down their passwords, and users are twice as tolerant of password complexity. Using these revised assumptions, we can "smear out" the distribution in Figure 2 with a mean of 60 that is, for a password entropy of 60 bits, half of users will write down their passwords and a standard deviation of 19. The maximum effective entropy would then be about 35 bits, and the number of characters required to reach maximum effective entropy would be: Random seven Initialism eight to nine Strong chosen 10 to 11 Weak chosen 18 Even with these more-optimistic assumptions, organizations that implement best-practice recommendations for password formation (eight-character initialisms) are close to the password breaking point. The quantitative results may be inexact, but the qualitative result is sound: You can only push passwords so far. Best-practice password-formation recommendations appear to be approaching the limit. If you push passwords further, they will break and result in negative security return. Bottom Line: Increasing password length and complexity can yield an increase in security, but it places additional burden on users. The breaking point is near, if not already reached. For stronger authentication, consider using stronger authentication methods, rather than increasing the length and complexity of passwords. 6 December
Use This Eight-Step Process for Identity and Access Management Audit and Compliance
Research Publication Date: 28 March 2005 ID Number: G00126592 Use This Eight-Step Process for Identity and Access Management Audit and Compliance Roberta J. Witty, Ant Allan, Jay Heiser Authentication,
The Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
Research. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
Patch management point solution. Platform. Patch Management Point Solution
Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations
Management Update: CRM Success Lies in Strategy and Implementation, Not Software
IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure
Management Update: The Eight Building Blocks of CRM
IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful
Economics of the Cloud: Business Value Assessments
Economics of the Cloud: Business Value Assessments Gartner RAS Core Research Note G00168554, Joseph Feiman, David W. Cearley, 25 September 2009, RA7 042010 This research defines and quantitatively assesses
Business Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
The disaster recovery procedures started immediately. Services to IBM users were restored within 48 hours.
C. Da Rold, S. Mingay Research Note 7 November 2003 Commentary Italian Blackout Impacts IBM Image and Clients' Business IBM's data center in Vimercate failed to deliver IT services to several clients after
Don't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
Five Business Drivers of Identity and Access Management
Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,
Clinical Decision Support: Core Capability of Evolving CPR
Tutorials, B. Hieb, M.D. Research Note 6 November 2003 Clinical Decision Support: Core Capability of Evolving CPR More-sophisticated computer-based patient record systems can offer increasing value to
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Securing Remote Desktop for Windows XP
Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain
How To Calculate Hd Costs
Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update Gartner RAS Core Research Note G00209403, Federica Troni, Mark A. Margevicius, Michael A. Silver, 14 December 2010, RA12
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
COM-19-1316 A. White, K. Peterson, B. Lheureux
A. White, K. Peterson, B. Lheureux Research Note 1 February 2003 Commentary New P2P Solutions Will Redefine the B2B Supply Chain As multienterprise business processes evolve on a large scale, application
RBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
Lead architect. Business architect. Technical architect. Lead Architect
Tactical Guidelines, G. James Research Note 20 September 2002 Best Practices for Selecting Enterprise Architects A good enterprise architect needs not only excellent technical skills, but business and
How to Develop an Effective Vulnerability Management Process
Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
IP Contact Centers Approach Maturity
Decision Framework, S. Blood, T. Wright Research Note 11 December 2002 IP Contact Centers Approach Maturity Enterprises should evaluate IP-based contact-center applications and next-generation architecture
BYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
SSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
Hype Cycle for Customer Relationship Management, 2003
S. Nelson Strategic Analysis Report 6 June 2003 Hype Cycle for Customer Relationship Management, 2003 Customer relationship management is maturing as a business strategy, but many aspects of CRM are more
Simplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary
How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following
Protecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
The IFX Standard Opens the ATM and POS Channels
Strategic Planning, M. Knox, S. Cohen, B. Adrian Research Note 27 August 2003 The IFX Standard Opens the ATM and POS Channels Interactive Financial exchange v.1.4 introduced significant new messaging standards
Key Findings. Recommendations
Total Cost of Ownership Comparison of PCs With Server-Based Computing Gartner RAS Core Research Note G00159622, Federica Troni, Mark A. Margevicius, Michael A. Silver, 4 August 2008, R1 04032009 Server-based
Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside
Help protect your data and brand, and maintain compliance from the outside September 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE
IIPRD LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE P a g e 2 PATENT LANDSCAPE ANALYSIS ON BYOD- BRING YOUR OWN DEVICE Contents Executive Summary... 3 Introduction... 4 Benefits of bring your own device (BYOD)...
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Government Insights: Possible IT Budget Cuts
Tactical Guidelines, J. Kost Research Note 6 January 2003 Government Insights: Possible IT Budget Cuts In tough economic times, government leaders pressure CIOs to reduce IT budgets. Although IT investments
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise
Allstate: A Financial Services CRM Best Practice
Case Studies, K. Harris Research Note 18 August 2003 Allstate: A Financial Services CRM Best Practice Allstate Insurance found success at careful planning, testing, implementation and management of customer
Decision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing
Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Secure Remote Password (SRP) Authentication
Secure Remote Password (SRP) Authentication Tom Wu Stanford University [email protected] Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach
Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach 9 November 2009 Jay Heiser, John Girard Gartner RAS Core Research Note G00168944 The U.S. government agency responsible
Solution Guide Chapter 14 Mixing Fractions, Decimals, and Percents Together
Solution Guide Chapter 4 Mixing Fractions, Decimals, and Percents Together Doing the Math from p. 80 2. 0.72 9 =? 0.08 To change it to decimal, we can tip it over and divide: 9 0.72 To make 0.72 into a
DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check
A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
RSA SecurID Software Token Security Best Practices Guide
RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
CJIS News. N-Dex News. LERMS - Master Name Records. State of North Dakota
State of North Dakota N-Dex News New and Improved N-DEx: A search engine for law enforcement agencies is expanding nationwide this month. For more information go to The FBI Federal Bureau of Investigation
Don't Confuse CRM Benefits With ROI
Tutorials, B. Eisenfeld, E. Kolsky, J. Grigg Research Note 29 April 2003 Don't Confuse CRM Benefits With ROI In recent customer relationship management surveys, 52 percent of respondents claimed return
CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
