Password Entropy explained

  Рет қаралды 4,350

Security and Privacy Academy

Security and Privacy Academy

Күн бұрын

Пікірлер: 19
@elfrancisco9954
@elfrancisco9954 Жыл бұрын
Very interesting and helpful too. Was looking for the total number of special characters and I found it here. Keep going. We need more security content like this
@youtube_user_427
@youtube_user_427 Жыл бұрын
Very clear and helpful, excellent content!
@fritz3039
@fritz3039 8 ай бұрын
Thank you very much for the explanation. Our lecturer, a Prof. Dr., was not able to explain the whole thing in simple terms for us students.
@CyberMedics
@CyberMedics Жыл бұрын
Liked & subscribed. Best explanation I've seen on password enthropy! How exactly is enthropy affected if capitalization is added?
@SecPrivAca
@SecPrivAca Жыл бұрын
Thanks! I am not sure, I understand your question. In the video I already include capital letters as part of the 78 different characters used (0:52). So if we know that only the first letter is capitalized, the entropy would be considerably lower. Edit: I think I get it now. You probably mean the xkcd-example. Capitalization would not change much, since most dictionaries have many different versions of all words. For example: password, Password, pa$$word, p4ssw02d, etc..
@CyberMedics
@CyberMedics Жыл бұрын
@SecPrivAca Sorry for the confusion. Yes I did mean xlcd example since our video used the EFF version of diceware list. Injecting just one capital letter and one special character seemed to increase the security of the passphrase, but not sure from a purely mathmatical entropy analysis. That is why we'd appreciate your critique comment on the video. Thank you
@user-fb6sg3uy2z
@user-fb6sg3uy2z Жыл бұрын
Great video, helped me a lot. Can I ask tho, where have you got the number of 100B passwords/second from? I am creating a password strength estimator and cannot find conclusive numbers of how many passwords a modern PC can try per second (offline)
@Ken.-
@Ken.- Жыл бұрын
google gpu password cracking
@SecPrivAca
@SecPrivAca Жыл бұрын
Mainly from this SO-post which seems legit to me: stackoverflow.com/questions/54733868/how-many-attempts-per-second-can-a-password-cracker-actually-make
@ChozoSR388
@ChozoSR388 Жыл бұрын
The thing that bothers me, and I know this is beyond the scope of this video but, is when some websites, particularly government agencies, make it a point to limit the length and character set that you can use for a password, for example, I used one government resource at one point, that limited password length to between 6 and 8 characters, and then disallowed the use of special characters. Granted, that's still a 62-character complement character set, but it just feels like they're being purposefully obtuse in the name of convenience over security, especially in a day and age where we live in a world where we don't (typically, unless we're out and about) even have to necessarily memorize passwords anymore, with the advent of password managers and OS-based key chains.
@SecPrivAca
@SecPrivAca Жыл бұрын
This is completely crazy and undermines NIST guidelines (which are a government agency after all). If you as an attacker know that passwords are only between 6 and 8 characters it makes cracking incredibly easy.
@larrydevito8679
@larrydevito8679 11 ай бұрын
I do not understand time to guess password. Must 'try' each new guess in an attack; this will limit speed.
@SecPrivAca
@SecPrivAca 11 ай бұрын
do you mean how many passwords can be guessed per second? This number is relatively common.
@larrydevito8679
@larrydevito8679 11 ай бұрын
@@SecPrivAca Just guessing next password is only part of attack; must also submit the new guess to see if it is correct.
@SecPrivAca
@SecPrivAca 11 ай бұрын
I see. In the video I am talking about offline attacks, meaning attacks that are carried out against, e.g, leaked password hashes. You are referring to online attacks which is obviously much harder, since you can limit the amount of tries, as you point out.
@larrydevito8679
@larrydevito8679 11 ай бұрын
@@SecPrivAca OK. Leaked hashes. Yes, that can be fast. Thanks.
@hubertlenningrad2252
@hubertlenningrad2252 Жыл бұрын
I cant hear you.
@SecPrivAca
@SecPrivAca Жыл бұрын
What do you mean?
Hash Functions explained
5:34
Security and Privacy Academy
Рет қаралды 376
What is a Passkey?
18:05
Ask Leo!
Рет қаралды 55 М.
Thank you Santa
00:13
Nadir Show
Рет қаралды 52 МЛН
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 6 МЛН
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 84 МЛН
Accompanying my daughter to practice dance is so annoying #funny #cute#comedy
00:17
Funny daughter's daily life
Рет қаралды 25 МЛН
Diceware & Passwords - Computerphile
10:56
Computerphile
Рет қаралды 306 М.
What is password entropy and why it really, really, matters
11:19
The Most Important Bitwarden Setting You Never Heard Of
12:20
Jason Rebholz - TeachMeCyber
Рет қаралды 61 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 9 МЛН
FIDO Promises a Life Without Passwords
9:58
IBM Technology
Рет қаралды 411 М.
This Trick Will Make Your Passwords Even More Secure
5:20
Gary Explains
Рет қаралды 24 М.
How To Protect Yourself From A Two Factor Hack
13:06
Ask Leo!
Рет қаралды 7 М.
Intuitively Understanding the Shannon Entropy
8:03
Adian Liusie
Рет қаралды 103 М.
Thank you Santa
00:13
Nadir Show
Рет қаралды 52 МЛН