短密码真的那么不安全吗?

超级用户读者user31073很好奇他是否真的应该注意那些简短的密码警告:...

短密码真的那么不安全吗? You know the drill: use a long and varied password, don’t use the same password twice, use a different password for every site. Is using a short password really that dangerous? Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

问题

超级用户读者user31073很好奇他是否真的应该注意那些简短的密码警告:

Using systems like TrueCrypt, when I have to define a new password I am often informed that using a short password is insecure and “very easy” to break by brute-force.

I always use passwords of 8 characters in length, which are not based on dictionary words, which c***ists of characters from the set A-Z, a-z, 0-9

I.e. I use password like sDvE98f1

How easy is it to crack such a password by brute-force? I.e. how fast.

I know it heavily depends on the hardware but maybe someone could give me an estimate how long it would take to do this on a dual core with 2GHZ or whatever to have a frame of reference for the hardware.

To brute-force attack such a password one needs not only to cycle through all combinati*** but also try to decrypt with each guessed password which also needs some time.

Also, is there some software to brute-force hack TrueCrypt because I want to try to brute-force crack my own password to see how long it takes if it is really that “very easy”.

短随机字符密码真的有风险吗?

答案

超级用户贡献者Josh K.强调了攻击者需要什么:

If the attacker can gain access to the password hash it is often very easy to brute force since it simply entails hashing passwords until the hashes match.

The hash “strength” is dependent on how the password is stored. A MD5 hash might take less time to generate then a SHA-512 hash.

Windows used to (and may still, I don’t know) store passwords in a LM hash format, which uppercased the password and split it into two 7 character chunks which were then hashed. If you had a 15 character password it wouldn’t matter because it only stored the first 14 characters, and it was easy to brute force because you weren’t brute forcing a 14 character password, you were brute forcing two 7 character passwords.

If you feel the need, download a program such as John The Ripper or Cain & Abel (links withheld) and test it.

I recall being able to generate 200,000 hashes a second for an LM hash. Depending on how Truecrypt stores the hash, and if it can be retrieved from a locked volume, it could take more or less time.

Brute force attacks are often used when the attacker has a large number of hashes to go through. After running through a common dictionary they will often start weeding passwords out with common brute force attacks. Numbered passwords up to ten, extended alpha and numeric, alphanumeric and common symbols, alphanumeric and extended symbols. Depending on the goal of the attack it can lead with varying success rates. Attempting to compromise the security of one account in particular is often not the goal.

另一位撰稿人Phoshi进一步阐述了这一观点:

Brute-Force is not a viable attack, pretty much ever. If the attacker knows nothing about your password, he isn’t getting it through brute-force this side of 2020. This may change in the future, as hardware advances (For example, one could use all however-many-it-has-now cores on an i7, massively speeding up the process (Still talking years, though))

If you want to be -super- secure, stick an extended-ascii symbol in there (Hold alt, use the numpad to type in a number larger than 255). Doing that pretty much assures that a plain brute-force is useless.

You should be concerned about potential flaws in truecrypt’s encryption algorithm, which could make finding a password much easier, and of course, the most complex password in the world is useless if the machine you’re using it on is compromised.

我们可以将Phoshi的回答解释为“暴力不是一个可行的攻击,当使用复杂的当前一代加密时,几乎从来没有”。

正如我们在最近的文章中强调的,暴力攻击解释了:所有的加密都是易受攻击的,加密方案老化,硬件能力增加,所以过去的硬目标(如微软的NTLM密码加密算法)在几个小时内就可以被击败只是时间问题。


有什么要补充的解释吗?在评论中发出声音。想从其他精通技术的Stack Exchange用户那里了解更多答案吗?在这里查看完整的讨论主题。

  • 发表于 2021-04-11 18:12
  • 阅读 ( 162 )
  • 分类:互联网

你可能感兴趣的文章

6个你可能不知道的有用的android设置

... 4使密码可见 ...

  • 发布于 2021-03-11 14:56
  • 阅读 ( 190 )

频繁更改密码对您的安全有好处吗?

您多久更改一次密码?我们打赌你的一些证书已经有十多年的历史了。 ...

  • 发布于 2021-03-11 15:13
  • 阅读 ( 879 )

在facebook、instagram或snapchat上不被黑客攻击该怎么办

... 1不要使用强密码 ...

  • 发布于 2021-03-12 05:12
  • 阅读 ( 279 )

破解wi-fi网络有多容易?

...i的安全性有所了解。你会知道你的Wi-Fi网络有一个很长的密码,密码中有标点符号和数字。您甚至可能偶然发现了对其他人隐藏网络名称的设置。您已经充分利用了这些工具--确信您的网络处于锁定状态。或者你是这么想的。一...

  • 发布于 2021-03-12 13:20
  • 阅读 ( 235 )

你的树莓皮安全吗?

... 首先,您应该更改Pi的默认用户名和密码。如果不这样做,任何人都可以通过SSH远程连接到您。他们用默认凭据登录不会花很长时间。他们甚至可能更改用户名和密码,以防止您再次连接到Pi! ...

  • 发布于 2021-03-13 03:37
  • 阅读 ( 224 )

默默无闻的安全性比开源软件安全吗?

... 默默无闻的安全性本身并不能为系统提供安全性。在密码学的世界里,这被视为一个给定的条件。Kerckhoff的原理认为,即使密码机制落入敌人手中,密码系统也应该是安全的。这个原则可以追溯到19世纪末。 ...

  • 发布于 2021-03-14 23:58
  • 阅读 ( 382 )

锁定windows pc的6种最佳方法

...有人可以完全访问您的计算机,窃取您的文件,复制您的密码,或冒充您使用您的在线帐户。 ...

  • 发布于 2021-03-15 06:46
  • 阅读 ( 197 )

克服安全疲劳和保持安全在线的3种方法

...还有很多事情你需要记住去做。您需要批准更新、输入新密码、运行病毒扫描、确保备份文件等等。 ...

  • 发布于 2021-03-17 04:44
  • 阅读 ( 162 )

如何发现短信诈骗和下一步怎么办

...到这样的消息,那么攻击者很可能已经拥有您的用户名和密码,但需要最后一块拼图才能让自己进入。这绝对是明智的改变你的密码,也许使用一个密码管理器,使他们安全。 ...

  • 发布于 2021-03-17 05:04
  • 阅读 ( 229 )

对于windows技术支持骗局,您应该怎么办?

...的服务要钱。如果你拒绝,有可能是骗子远程更改了你的密码或加密了你的文件。Windows技术支持电话刚刚变成了勒索软件诈骗。 ...

  • 发布于 2021-03-19 12:07
  • 阅读 ( 281 )