<i>The biggest drawback is that many sites these days limit the number of characters that you can use in your passwords, so these poems are probably too long for many of your accounts. But perhaps that will change someday soon. More and more sites are considering dropping the character limit, since shorter passwords are a lot less secure.</i><p>This is my biggest pet peeve. Actually, my second-biggest. My biggest is when registration silently fails because the password was too long.
But surely you can't remember a different poem for every service that requires a password?<p>Relegating you to use a password manager anyway, at which point you might as well just generate random passwords that don't rely on dictionaries?
"Most people use passwords. Some people use passphrases. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes."<p><a href="http://www.schneierfacts.com/fact/27" rel="nofollow">http://www.schneierfacts.com/fact/27</a>
"If you want your own little poem password, you can enter your e-mail here, and their program will send you a secure one, which will then be deleted from their server."<p>Uh...<p>They went through all the trouble of making a website. Maybe use https and just show me the password on the website?
And if we could only get password taking software to not require special characters and numbers if the password was longer than 15 characters, <i>life would be peachy</i>. (that is 19 characters if you're wondering, and no I don't use it as a password)
Using rhyme and meter to remember things has a rich history, back to the epic poems.<p>The phrasing of the title made me think of an Onion article along the lines of: They found the perfect password, it's '42Lemons?' and everyone should use it!<p>What they found is an excellent password scheme for humans.
That only works against basic bruteforce attacks, if you are using hybrid attacks those passwords become easier to crack.<p>What people don't realize that professionals who crack passwords for a living use quite sophisticated techniques using known information about the target, common masks, and patterns makes cracking specific passwords easier than just bruteforcing them.<p>If you use a 300K words dictionary and know or can assume that the paraphrase will be constructed out of 3-5 words the password entropy isn't as large as just thinking this is a single case or mixed case alpha with say 12-16 characters.<p>When dealing with generic password your basic unit is a character so a 16 char password is made out of 16 units each of those has a specific search space single case alpha it's 26, mixed alpha it's 52, single alpha numeric it's 36 and so on.<p>Here you have 3-4 units each has a fixed search space and that's the dictionary you use, the search space can be even more restricted if we can assume certain things about the algorithm that generated the passphrase.<p>If we take the poem example we can assume that words will not appear more than once in the passphrase and that they might need to rhyme this alone can reduce the password entropy considerably.<p>If we take other examples like story based passphrases e.g. "the quick brown fox jumps over the lazy dog" then we can base our assumptions based on what we know of the English language for example that words like "the" will appear at least once in such sentences as well as take some estimates about how many verbs, nouns, and pronouns will appear on average in each sentence based on their common distribution which allows you again to reduce the search space considerably.<p>Passphreases are still great when you need to ensure that your passwords won't be broken in bulk when a breach happens because unless your account is admin@ijustgothacked.com you most likely won't be a target and those types of datadumps are still usually broken through basic dictionary, masked and cheap bruteforce attacks.<p>If you might be targeted directly or phished than passphrases might not offer any sufficient level of protection and could actually be weaker than an annoying mixed-alpha-num-special password.<p>That of-course will change if everyone will start using passphrases if you expect that 50% of your hashed passwords dump is passphrases you will adapt your password cracking techniques accordingly.
Edward Snowden mentioned using a pseudo-random phrase like MargaretThatcherIs110%SEXY in his interview with John Oliver: <a href="https://www.youtube.com/watch?v=yzGzB-yYKcc" rel="nofollow">https://www.youtube.com/watch?v=yzGzB-yYKcc</a>
LoL at 'discover'
<a href="http://security.stackexchange.com/questions/22717/how-secure-are-passwords-made-of-whole-english-sentences" rel="nofollow">http://security.stackexchange.com/questions/22717/how-secure...</a><p>I think we should held a competition to find out how old this tibit of knowledge really is and also the oldest article about security experts demonstrating passphrases are wide open to dictionary attacks.<p>1982 reference on passphrases <a href="http://www.sciencedirect.com/science/article/pii/0167404882900256" rel="nofollow">http://www.sciencedirect.com/science/article/pii/01674048829...</a>
<i>All</i> passwords should not be memorable.<p>Once you see them as tokens that 3rd parties will probably lose, then you know our efforts should be in secure token management software (keepass, lastpass, 1password, etc).
I was wondering what the real "entropy" (?) for these kinds of passwords is? If you take the vocabulary of common words (ie. not generated from a list of eg. 300k words like in the article), aren't the permutations rather small?
If some person just makes these four words up from words they know (and probably use quite regularly)<p>Eg 10000^4 or even 1000^4 (for those types who would use "password" otherwise)? Isn't that quite bad or am I understandig something incorrectly?
Everyone who is serious about passwords should run a cracker for a week or so on some large set of passwords. You end up getting a pretty good sense on what falls quickly.
In 1997 I inherited a network which had a password I needed to recover... It was some Cisco Device -- I cant recall model number or how we recovered the password; but Ill never forget that password:<p>FeetFourMonkey
The problem with passphrases are wordlists and combinator attacks. This is been known for a long time.
This headline is <i>very</i> misleading and I hope no one use passphrase-based passwords for extremely sensitive data.