📜 ⬆️ ⬇️

How to remember a bunch of secure passwords, and do not go crazy

A colleague here asked to share my “password protection” scheme , i.e. inventing conveniently remembered (or recalled) passwords . Since it actually means to reveal a significant part of the passwords of my passwords, which will make them very vulnerable, I decided to refine the scheme taking into account the fact that I did not like the results of a rather long use (more than half a year, perhaps).
So when seeing a picture like this
you did not become like this man
imageimage
Read the topic further.

What for?


The advantages of the password scheme over the password manager as a principle:Disadvantages:I know that special clever men will say that the password manager can be portable on a flash drive, which is always with you. But it can hardly be cross-platform, not requiring any configuration of a random computer and protected from the loss of the flash drive.
Differences from other password creation schemes:So, the question “why?” We consider solved and resolutely discarded.

Disclaimer


The scheme is supposed to be used to generate passwords for the whole bunch of web services (first of all it is them, why - below), which are not of fundamental importance, but by people who are seriously hooked on the Internet and do not want to fall victim to a virtual enemy or a fraudster who can bring down all your virtual life, having learned one password, because you did not deign to use either the password managers or the password scheme. Thus, it will go to the next left social forum, forum and blog, but it is necessary to generate mail or webmoney using at least the same scheme, but with a different “key”. It is quite obvious.
And in general, the scheme for creating passwords is effective, while nobody knows about it. Individual and difficult to recognize. So maybe I'm doing a mistake. Now all my passwords will be kidnapped! 11
It should also be noted that in modern computer technology protection the weakest link is the person, that is, you, the user of these passwords. All kinds of scam and phishing sites have filled the Internet, so, no matter how cool the password you have, you need not yet merge it directly into the hands of the attacker. Well, beware of thermorectal cryptanalysis.
Also, I am not a specialist in cryptography or the like, and if someone knows why the proposed scheme is bad, how to improve it - you are welcome in comments. I am really interested in the opinion of a hacker / defense specialist, in the extreme case - throw a reference to literature that is not very difficult to master (behind the basics of matan, ruler and Terver, although I do not pretend to really good knowledge of the items, the last of these I forgot 90% ).
Also, I am not a child prodigy, but I also do not think that the described generation method is so complicated that it is uncomfortable to use it. In the end, I'm not agitating anyone.
It may not be very easy to understand right away, but at least read the beginning - maybe the idea will seem worthwhile.
')

Passwords Overview


You can skip this section if you already know what a normal password should be.
And he should be like this:Further

Additional requirements on the basis of which this password protection scheme is based


Here they are:

Idea


So here. What we have is the most common and accessible identifier of a web service? That's right - the domain name. Consider some not very distant from life example.
You are going to play Warhammer Online on the occasion of a no-limit trial. Well, you need to register. Having passed on some link somewhere on the site you get to a page with an address like
https://accounts.eamythic.com/war/trial
Well, on it enter all registration info, incl. and password. Here is the password and generation: take, for example, the number of characters in each part of the domain name, separated by a dot, add (8 + 8 + 3 = 19), we get the first 2 characters of the password. Then we take either a meaningful phrase that you will clearly associate with this game (“Warhammer”, for example; this is not a good option, because the meaning in the password is evil), or a permanent strong eight-digit password that you previously memorized and you can call even being woken up at 3 am (let it be JE82adw] ).

Generation for example:
19 8 JE 8 82 ad 3 w]
Those. The first 2 digits are the sum of the number of characters in the first, second, and third parts of the domain name (to the point, between two points, after the point). In the second position - the number of characters in the first part of the domain name, in the third - 2 characters from our prepared password, in the fourth - the second part of the domain name, well, I think you understood the point. We received a 13-digit password, of which 8 characters we cared about, and the remaining 5 were obtained from the domain name. In general, the point is that in the same your password you insert pieces that you get by decrypting readily available information. It’s clear that using a domain name explicitly is a big pale, coding for example l33t 'is also chosen as a dictionary, therefore you need to be more sophisticated (although, as long as the password is not fully l33t-coded, you can use ). In general, the law of encryption - what you want. If you want to raise the power, you want to look for the difference between the number 100 and the length of the name of the web service — anything. Although the length of the three-dimensional vector of the lengths of the 3 parts of the domain name is looking for. What is important is that the law of your choice is the same for the whole “series” of services. Let there be one for the garbage dumps, another for the rank and file, another for the important ones. But you must clearly know where what is, otherwise it will be necessary for each login to recover the password.

An important thought, which I reached only in the process of describing the scheme


Such a scheme loses its meaning when receiving multiple passwords from one series. Two common passwords contain a common subsequence, and this is already more than half of the password. The law is also not hard to find. Yes, even if it is not found - knowing the places where there should be numbers, and knowing that there are only numbers, it becomes very easy to pick it up.
Here, the options are either to split the passwords into groups, within which there will be the same constant part, or to create an encrypted part such that even after recognizing the constant part, the passwords remain difficult to find, or even to split into groups, within which there will be the same encryption law. If the encrypted part is also safe (8 characters, at least letters / numbers), then this is a decrease in security when receiving 2 passwords only (conditionally) 2 times (I know that the complexity of the selection of a password is not linearly dependent). And it is better to combine these 3 options together.

Final option


Thus, it is necessary:

results


We get:Thanks to those who read to the end.
I hope the post was useful to you, you are welcome to the discussion.
PS If you consider it necessary to post - move to a suitable blog.

Source: https://habr.com/ru/post/79495/


All Articles