Home 0P3N Blog Recommended: Strong Passwords Technique
Ready to Start Your Career?
Create Free Account
rubins s profile image
By: rubins
July 7, 2015

Recommended: Strong Passwords Technique

By: rubins
July 7, 2015
rubins s profile image
By: rubins
July 7, 2015
Recommended: Strong Passwords Technique - CybraryI hope this helps others; I find this helpful and useful for my accounts.My technique of using strong and different passwords for any accounts is done through the use of the message digest or hash value. The calculated hash value of a certain word or file is what I used as my password.A strong password must include the following:
  • small letters
  • capital letters
  • numbers
  • special characters
  • the maximum number of characters required if possible, or longer
 Some basic information about the hash value:
  • using an online or an application as a hash calculator, the hash value of a file or word is the same for the selected or specified algorithm
  • we can have the option for small letters or capital letters as the output for the hash value
  • MD5 has an output of 32 characters, regardless of the size of the file to hash or regardless of the words to hash
  • SHA1 has an output of 40 characters, regardless of the size of the file to hash or regardless of the words to hash
 The hash value can already solve the other requirements of strong password. What we need now are the special characters and type of letters to use.

Concept (My Actual Implementation)

1) Select the source of your message digest value as a password.a) A simple and very easy word or number to remember. This will be anything that's very easy for you to remember regardless if it's only a single character.shot 1-2In my case it's cybrary.it and I use my first name: “rubin”b) You can have the option to use a file instead of a word. The file you use must not be easily altered or changed or tampered (it's recommend not to use Office or text documents like .doc or .txt).In my other accounts, I use my favorite images.One of the disadvantage is that it will limit me to open my online accounts only on devices where I have a copy of the file.shot 2-22) Using hash calculator, calculate the hash value of the preferred word or file, then select your preferred algorithm and character type. shot 3-2Linux application hash calculator example.shot 4-2Online hash calculator example and online and application hash calculator comparison. 3) Copy the generated hash value.shot 5-24) Paste the hash value into the password box.5) For password that has a maximum of 32 characters only:a) I delete the first 5 or the last 5 characters of the passwordb) I replace deleted characters with "RSA^&"
  • RSA^& stands for:
    • R - is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ - is for Shift + 6 - my birth year 1967
    • & - is for Shift + 7 - my birth year 1967
 6) For password that is more than 32 characters:
  •  I simply add at the beginning or at the end of the password "RSA^&"RSA^&, which stands for:
    • R - is for Rubin my first name
    • S – is for Santos my middle initial
    • A – is for Atillo my last name
    • ^ - is for Shift + 6 - my birth year 1967
    • & - is for Shift + 7 - my birth year 1967
 7) After that, we can now click the login button to login. That’s it. And if you’re convinced to use similar technique:a) understand hash function and its algorithm (different character lengths)b) be familiar with the proceduresb) practicec) and more practiced) then implemente) you can use this in your own creative way 8) Check your password strength at the URL's provided with care:a) never give your true password for checkingb) alter some parts of your real passwordc) use your imagination of how to alter- https://passfault.appspot.com/shot 6-2- https://www.grc.com/haystack.htmshot 7-2- https://howsecureismypassword.net/shot 8-2 Again, I hope helps. Enjoy and have fun!
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry