Recommended: Strong Passwords Technique

July 7, 2015 | Views: 6733

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

I hope this helps others; I find this helpful and useful for my accounts.

My technique of using strong and different passwords for any accounts is done through the use of the message digest or hash value. The calculated hash value of a certain word or file is what I used as my password.

A strong password must include the following:

  • small letters
  • capital letters
  • numbers
  • special characters
  • the maximum number of characters required if possible, or longer


Some basic information about the hash value:

  • using an online or an application as a hash calculator, the hash value of a file or word is the same for the selected or specified algorithm
  • we can have the option for small letters or capital letters as the output for the hash value
  • MD5 has an output of 32 characters, regardless of the size of the file to hash or regardless of the words to hash
  • SHA1 has an output of 40 characters, regardless of the size of the file to hash or regardless of the words to hash


The hash value can already solve the other requirements of strong password. What we need now are the special characters and type of letters to use.

Concept (My Actual Implementation)

1) Select the source of your message digest value as a password.

a) A simple and very easy word or number to remember. This will be anything that’s very easy for you to remember regardless if it’s only a single character.

shot 1-2

In my case it’s and I use my first name: “rubin”

b) You can have the option to use a file instead of a word. The file you use must not be easily altered or changed or tampered (it’s recommend not to use Office or text documents like .doc or .txt).

In my other accounts, I use my favorite images.

One of the disadvantage is that it will limit me to open my online accounts only on devices where I have a copy of the file.

shot 2-2

2) Using hash calculator, calculate the hash value of the preferred word or file, then select your preferred algorithm and character type.


shot 3-2Linux application hash calculator example.

shot 4-2
Online hash calculator example and online and application hash calculator comparison.


3) Copy the generated hash value.shot 5-2

4) Paste the hash value into the password box.

5) For password that has a maximum of 32 characters only:

a) I delete the first 5 or the last 5 characters of the password

b) I replace deleted characters with “RSA^&”

  • RSA^& stands for:
    • R – is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ – is for Shift + 6 – my birth year 1967
    • & – is for Shift + 7 – my birth year 1967


6) For password that is more than 32 characters:

  •  I simply add at the beginning or at the end of the password “RSA^&”RSA^&, which stands for:
    • R – is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ – is for Shift + 6 – my birth year 1967
    • & – is for Shift + 7 – my birth year 1967


7) After that, we can now click the login button to login. That’s it. And if you’re convinced to use similar technique:

a) understand hash function and its algorithm (different character lengths)

b) be familiar with the procedures

b) practice

c) and more practice

d) then implement

e) you can use this in your own creative way


8) Check your password strength at the URL’s provided with care:

a) never give your true password for checking

b) alter some parts of your real password

c) use your imagination of how to alter

shot 6-2

shot 7-2

shot 8-2


Again, I hope helps. Enjoy and have fun!

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. this helped me for easy and secure password for my sites

  2. Very informative!

  3. Great post I Learned a lot… thanks to the contributor of this topic cheers….

    • i cant understand the concepts help me to learn clearly ….

      • this is simple

        1) instead of using any strings from our mind as passwords, here we will use the hash value of file or any string easy for you to remember

        2) this hash value will then be use as our password, we will simply copy this hash value and paste into the password box

        3) to add more strentgh into the password since the hash values I prefer are in small letters, I add at the end of the password the initials of my name in capital letters

        4) also I add or append at the end of the password the year I was born which is 1967 using the shift key (only 67 I added)

        5) with this I can have a strong password which is easy to remember or make

        6) using the reference sites, we can check our selected password strength

        7) the strength can be identified by the time it takes to crack your password as generated by the referenced sites

        8) I hope this could help

  4. Thanks guy…


Page 1 of 1012345»...Last »
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?