I just encountered an article saying that, since today's GPUs are so powerful, there's no such thing as a secure password any more.
The death of the password is a bad thing, because smartphones
can get lost, broken, or bricked. Indeed, if people have to use
smartphones to log on to everything, they will be the new high-value
target.
However, Linux can set an example of how to make passwords work.
Using a GPU to brute-force a password requires an attacker
to have gotten a copy of the password file from the target
machine - that's how an attacker can try zillions of passwords, instead
of being locked out after three failed attempts, each of which took
several seconds.
So if one changed how password files stored passwords...
Use a better hash function.
I just encountered an article saying that, since today's GPUs are so powerful, there's no such thing as a secure password any more.I depends on the length. Longer passwords are better. The process of
On Thu, 28 Jul 2022 11:25:49 -0700 (PDT)
John Savard <quadibloc@gmail.com> wrote:
I just encountered an article saying that, since today's GPUs are so powerful, there's no such thing as a secure password any more.
I depends on the length. Longer passwords are better. The process of
cracking passwords when a hash table is available, even if salted, is decreasing because GPUs become faster and this process can easily be
split on many machines.
There are some steps that can increase the time:
Longer passwords (The amount of time needed increases exponential with
the length of the pw)
I just encountered an article saying that, since today's GPUs are so powerful, there's no such thing as a secure password any more.
John Savard
On Fri, 29 Jul 2022 08:36:57 +0200
Marco Moock <mo01@posteo.de> wrote:
On Thu, 28 Jul 2022 11:25:49 -0700 (PDT)
John Savard <quadibloc@gmail.com> wrote:
I just encountered an article saying that, since today's GPUs are so
powerful, there's no such thing as a secure password any more.
I depends on the length. Longer passwords are better. The process of
cracking passwords when a hash table is available, even if salted, is
decreasing because GPUs become faster and this process can easily be
split on many machines.
There are some steps that can increase the time:
Longer passwords (The amount of time needed increases exponential with
the length of the pw)
Assume that an attacker can test 10**12 passwords per second.
On Sun, 11 Jun 2023 10:30:40 -0000 (UTC), Spiros Bousbouras wrote:
On Fri, 29 Jul 2022 08:36:57 +0200
Marco Moock <mo01@posteo.de> wrote:
On Thu, 28 Jul 2022 11:25:49 -0700 (PDT)
John Savard <quadibloc@gmail.com> wrote:
I just encountered an article saying that, since today's GPUs are so
powerful, there's no such thing as a secure password any more.
I depends on the length. Longer passwords are better. The process of
cracking passwords when a hash table is available, even if salted, is
decreasing because GPUs become faster and this process can easily be
split on many machines.
There are some steps that can increase the time:
Longer passwords (The amount of time needed increases exponential with
the length of the pw)
Assume that an attacker can test 10**12 passwords per second.
What internet-facing firewall would entertain 10**12 password attemps
per second?!?!
On Sun, 11 Jun 2023 10:30:40 -0000 (UTC), Spiros Bousbouras wrote:
On Fri, 29 Jul 2022 08:36:57 +0200
Marco Moock <mo01@posteo.de> wrote:
I depends on the length. Longer passwords are better. The process of
cracking passwords when a hash table is available, even if salted, is
decreasing because GPUs become faster and this process can easily be
split on many machines.
There are some steps that can increase the time:
Longer passwords (The amount of time needed increases exponential with
the length of the pw)
Assume that an attacker can test 10**12 passwords per second.
What internet-facing firewall would entertain 10**12 password attemps
per second?!?!
Allodoxaphobia <trepidation@example.net> writes:
On Sun, 11 Jun 2023 10:30:40 -0000 (UTC), Spiros Bousbouras wrote:
On Fri, 29 Jul 2022 08:36:57 +0200
Marco Moock <mo01@posteo.de> wrote:
I depends on the length. Longer passwords are better. The process of
cracking passwords when a hash table is available, even if salted, is
decreasing because GPUs become faster and this process can easily be
split on many machines.
There are some steps that can increase the time:
Longer passwords (The amount of time needed increases exponential with >>>> the length of the pw)
Assume that an attacker can test 10**12 passwords per second.
What internet-facing firewall would entertain 10**12 password attemps
per second?!?!
The threat model is an attacker who has acquired a collection of hashed passwords; they then attack them on their own equipment via exhaustive search.
Measuring the attacker in terms of attempts per second isn’t always very useful though, since the attack scales extremely well. 10^18 SHA256
hashes per second is within human civilization’s capacity for example.
A common approach is to estimate the money cost of recovering a password
of a given complexity, for instance based on the cost of renting GPU
capacity from a cloud service provider.
Surprised during speed calculation discussion no one has mention rainbow tables.
https://en.wikipedia.org/wiki/Rainbow_table
Also is what type of attack? If guessing in during login there would be
the authorization failure delay to add to the crack duration time.
The threat model is an attacker who has acquired a collection of hashed passwords; they then attack them on their own equipment via exhaustive search.
Measuring the attacker in terms of attempts per second isn’t always very useful though, since the attack scales extremely well.
10^18 SHA256
hashes per second is within human civilization’s capacity for example.
A common approach is to estimate the money cost of recovering a password
of a given complexity, for instance based on the cost of renting GPU
capacity from a cloud service provider.
Richard Kettlewell <invalid@invalid.invalid> wrote:
The threat model is an attacker who has acquired a collection of
hashed passwords; they then attack them on their own equipment via
exhaustive search.
Measuring the attacker in terms of attempts per second isn’t always
very useful though, since the attack scales extremely well.
The defence also scales extremely well , you just add a few more
characters to the password. So how many more characters does one need
per GPU an attacker can throw at the problem ?
10^18 SHA256
hashes per second is within human civilization’s capacity for example.
64**16 / (10**18 * 3600 * 24 * 366) = 2505 years
Seems pretty safe to me.
A common approach is to estimate the money cost of recovering a password
of a given complexity, for instance based on the cost of renting GPU
capacity from a cloud service provider.
A more "objective" criterion is electricity consumption. So how many
watts of electricity would it take to do 10^18 SHA256 hashes per second ?
Spiros Bousbouras <spibou@gmail.com> writes:
A more "objective" criterion is electricity consumption. So how many
watts of electricity would it take to do 10^18 SHA256 hashes per second ?
Money seems more objective to me, given that’s the resource someone has
to actually spend to recover a password, and to measure against the
value of the password. There is zero point spending $1M (whether
directly on power, or indirecly as cloud GPU rental) to recover a
password that you can only exploit for $1000 of value.
Sysop: | DaiTengu |
---|---|
Location: | Appleton, WI |
Users: | 991 |
Nodes: | 10 (1 / 9) |
Uptime: | 133:07:56 |
Calls: | 12,960 |
Calls today: | 2 |
Files: | 186,574 |
Messages: | 3,266,161 |