Recommended: Strong Passwords Technique

July 7, 2015 | Views: 6618

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

I hope this helps others; I find this helpful and useful for my accounts.

My technique of using strong and different passwords for any accounts is done through the use of the message digest or hash value. The calculated hash value of a certain word or file is what I used as my password.

A strong password must include the following:

  • small letters
  • capital letters
  • numbers
  • special characters
  • the maximum number of characters required if possible, or longer

 

Some basic information about the hash value:

  • using an online or an application as a hash calculator, the hash value of a file or word is the same for the selected or specified algorithm
  • we can have the option for small letters or capital letters as the output for the hash value
  • MD5 has an output of 32 characters, regardless of the size of the file to hash or regardless of the words to hash
  • SHA1 has an output of 40 characters, regardless of the size of the file to hash or regardless of the words to hash

 

The hash value can already solve the other requirements of strong password. What we need now are the special characters and type of letters to use.

Concept (My Actual Implementation)

1) Select the source of your message digest value as a password.

a) A simple and very easy word or number to remember. This will be anything that’s very easy for you to remember regardless if it’s only a single character.

shot 1-2

In my case it’s cybrary.it and I use my first name: “rubin”

b) You can have the option to use a file instead of a word. The file you use must not be easily altered or changed or tampered (it’s recommend not to use Office or text documents like .doc or .txt).

In my other accounts, I use my favorite images.

One of the disadvantage is that it will limit me to open my online accounts only on devices where I have a copy of the file.

shot 2-2

2) Using hash calculator, calculate the hash value of the preferred word or file, then select your preferred algorithm and character type.

 

shot 3-2Linux application hash calculator example.


shot 4-2
Online hash calculator example and online and application hash calculator comparison.

 

3) Copy the generated hash value.shot 5-2

4) Paste the hash value into the password box.

5) For password that has a maximum of 32 characters only:

a) I delete the first 5 or the last 5 characters of the password

b) I replace deleted characters with “RSA^&”

  • RSA^& stands for:
    • R – is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ – is for Shift + 6 – my birth year 1967
    • & – is for Shift + 7 – my birth year 1967

 

6) For password that is more than 32 characters:

  •  I simply add at the beginning or at the end of the password “RSA^&”RSA^&, which stands for:
    • R – is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ – is for Shift + 6 – my birth year 1967
    • & – is for Shift + 7 – my birth year 1967

 

7) After that, we can now click the login button to login. That’s it. And if you’re convinced to use similar technique:

a) understand hash function and its algorithm (different character lengths)

b) be familiar with the procedures

b) practice

c) and more practice

d) then implement

e) you can use this in your own creative way

 

8) Check your password strength at the URL’s provided with care:

a) never give your true password for checking

b) alter some parts of your real password

c) use your imagination of how to alter

https://passfault.appspot.com/

shot 6-2

https://www.grc.com/haystack.htm

shot 7-2

https://howsecureismypassword.net/

shot 8-2

 

Again, I hope helps. Enjoy and have fun!

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
51 Comments
  1. thanks its very useful

Page 10 of 10« First...«678910
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 331 / December 14, 2019
How do I Get MTA Certified?
Views: 923 / December 12, 2019
How much does your PAM software really cost?
Views: 1376 / December 10, 2019
How Do I Get into Android Development?
Views: 1754 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel