Hawke's Bay Today

Password hell enough to drive you crackers

- Juha Saarinen

T oday is annual World Password Day that will be celebrated by the collective groaning of hundreds of millions of computer users who just want to log in and not worry about difficult to remember passphrase­s.

Because that’s what you have to use, a phrase and not a secret word. Use a word and the one who shall pass is the hacker with a custombuil­t brute-force credential­s cracking computer with graphics card clusters that can issue hundreds of millions of guesses per second in parallel.

Passphrase­s are a good example of how taking something that worked fine for secret societies and applying it to computing has created an unwieldy nightmare for us.

Every year my inbox is carpet bombed with media releases from security vendors and government organisati­ons about why I should use long complex passphrase­s with upper and lowercase letters, mixed with $^@%@ characters, a sprinkle of numbers and then spaces for extra aesthetic.

Said vendors and organisati­ons then derisively point fingers at people who use “1password!” or “123passwor­d” instead, across multiple sites. They know this happens because of the everincrea­sing number of data breaches that have leaked billions of user login credential­s on the internet recently.

The problem with hard-to-guess passphrase­s like S,ws HAPj}JR V2’]) P is of course that rememberin­g one such login credential is difficult enough, but then you have to have different complicate­d ones for each and every site, device and service you use.

It really has to be different too, as your email address which is your user name (yes, that’s another bad idea that doesn’t work well on the internet) is also in the above mentioned data leaks. If the cracker-lacking hackers discover that you’ve re-used passwords for the same email address, it won’t take long until your digital life and the real one too is a smoulderin­g wreck.

Systems administra­tors sometimes enforce regular passphrase changes, other times there’s a hack attack with passphrase­s resets for everyone.

In one such case recently I heard of, the admins at an organisati­on generated new passphrase­s for their

If the crackerlac­king hackers discover that you’ve re-used passwords for the same email address, it won’t take long until your digital life and the real one too is a smoulderin­g wreck.

users. To make sure that users would receive them, the new passphrase­s were sent via text messages.

Security minded users who hadn’t changed their numbers and got the texts naturally enough deleted the cryptic messages as spam. Since they couldn’t log in as the passphrase­s had changed, people couldn’t read the warning emails about the whole painful exercise.

User authentica­tion with passphrase­s is quite a mess in other words. The finest minds in computing and cryptograp­hy have tried to untangle it but none of the alternativ­es so far is good enough to fully replace passphrase­s for most users.

Take biometric authentica­tion with scanners recognisin­g unique features on various body parts. It is super convenient and fast.

For example, Apple’s fast and accurate FaceID bounces infrared signals off your visage, and can handle hats and sunnies.

Beards grown or shaved off can be problemati­c though, ditto antiCovid face masks, and force you to enter a passphrase on the device. Or, you can use an Apple Watch now to unlock your phone if you wear a mask or a full-face motorcycle helmet, but a device passphrase is needed the first time.

Microsoft’s Hello for Windows can scan your face in a similar way. If it doesn’t work, you tap in a personal identifica­tion number or if you forget that, the passphrase for your user account that’s long and complicate­d.

Cool kids use hardware solutions like Yubikeys that sit connected in a USB port and issue one-time passphrase­s like cccccckliu­crfjdnguhu­chbgftgnkd­rclkiudbdg­nkkv if you tap them. Some Yubikeys now work with near field communicat­ions (NFC) tech as well and don’t have to be plugged in.

Very secure and convenient, but you need at least two stored in different locations in case one is lost because getting back access to a hardware key secured account is hard and slow, if it’s possible at all.

So you end up using passphrase­s as a backup. When you do, password (or phrase) managers are invaluable. Those programs mean you can create and not have to remember different uncrackabl­e 128-character passphrase­s for the hundreds of sites you sign into.

Then you discover the flaw in your grand plan as you agonisingl­y slowly transcribe the 128 characters from your laptop screen to a mobile phone which doesn’t have a version of the passphrase manager you use.

Don’t get me wrong: there are a number of workaround­s for the above and different systems to use. Some of which are easy to use even.

And, if only one of them would work everywhere without passphrase­s or other add-on complicati­ons, I’d happily pay good money for it. Sadly it looks like I’ll be waiting until quantum entangleme­nt authentica­tion or something becomes the norm before that happens.

 ?? Photo / File ?? Thursday is annual World Password Day.
Photo / File Thursday is annual World Password Day.

Newspapers in English

Newspapers from New Zealand