TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Using entropy for user-friendly strong passwords

19 pointsby jordwover 3 years ago

2 comments

Kranarover 3 years ago
This article uses an outdated scheme for password entropy&#x2F;strength originally published in the early 2000s by NIST. The scheme they use can be found at [1]. NIST has since dropped their recommendation for how to calculate the entropy of a password as it turned out that it was basically bunk and provided no actual security.<p>It was understandable at the time to come up with some system to evaluate password strength and the original scheme made what I guess could be sensible assumptions about the distribution of human generated passwords, but an actual empirical analysis of their scheme conducted on 32 million passwords demonstrated that it was basically worthless and consequently NIST has dropped their entropy calculating guidelines [2].<p>[1] <a href="https:&#x2F;&#x2F;cubicspot.blogspot.com&#x2F;2011&#x2F;11&#x2F;how-to-calculate-password-strength.html" rel="nofollow">https:&#x2F;&#x2F;cubicspot.blogspot.com&#x2F;2011&#x2F;11&#x2F;how-to-calculate-pass...</a><p>[2] <a href="https:&#x2F;&#x2F;834e27ae-a-62cb3a1a-s-sites.googlegroups.com&#x2F;site&#x2F;reusablesec&#x2F;Home&#x2F;presentations-and-papers&#x2F;CCS_Password_Metric_Measurement.pdf?attachauth=ANoY7cp7NpL5rcMYxPMxniQoXGCYYVI-DpKI52S3b1xi0zvpHoR1zhCoyeet_h89DVelrW5QKc_K37HcZCz6NcSZaaiHzFWRnaaweNy6y5vhXltWodStI_oVTMCZB6vJuXd3efHpaK14qpAu7BU15TZ_LZ_UC5_-cuehEgeDEmH_-UEZR--3j7r2ZVMDm-q0L-SX-IxK0g8hhdiCNUr10gJeSizOviXGZ76vFPH1lp9K-_5zMd4f9HvsW3cNyZDX--IbvsBTEtepQ7R5ARa-91QByRhQlP7uDA%3D%3D&amp;attredirects=0" rel="nofollow">https:&#x2F;&#x2F;834e27ae-a-62cb3a1a-s-sites.googlegroups.com&#x2F;site&#x2F;re...</a>
kevincoxover 3 years ago
&gt; Password: mikemikemikemikem<p>&gt; This password has similar entropy to the above password but would fail most common password requirements.<p>Citation needed. I suspect that repeating the password 2-5 times is fairly common and would expect password crackers to try passwords like this.<p>This is the problem of entropy for passwords, it depends on your distribution in complex ways. For passwords &quot;buxeisee&quot; has way more entropy than &quot;pineapple&quot; even though they appear to draw from the same symbol set and latter is longer. &quot;pineapplepineapple&quot; is much better than just &quot;pineapple&quot; but much worse than the random 8 letters and probably still worse than &quot;pineapplepear&quot;.