Git Product home page Git Product logo

passwd's Introduction

passwd

This is a learning module about passwords. It is intended to be used as a part of a security course. Its parts were developed over the years of 2012--2014 for some courses on security in Mid Sweden University.

File structure

The file structure is as follows:

pwdguess is a lab for reflection on password complexity. The students will get password hashes for which they should find the corresponding passwords. It covers different types of hashes: unsalted LM-hashes and salted bcrypt hashes.

pwdpolicies is a seminar for reflection on password composition policies. It is based on research papers investigating the usability and security aspects of different common password composition policies. As such it gives insights into the results but also the research methodologies.

passwd's People

Contributors

dbosk avatar lenfra avatar

Watchers

 avatar  avatar  avatar

Forkers

lenfra

passwd's Issues

[pwdguess] Review policy on group work

Currently the instruction reads that students are allowed to work in groups of two.

Working in groups is definitely better for learning, but it's less good for examination. What is the purpose of the lab: for the students to learn the most or be examined on having fulfilled the lab?

[pwdeval] Merge pwdguess and pwdpolicies

Password guessing in its own right is not particularly interesting. The interesting ILOs come from the pwdpolicies seminar right now. However, the pwdguess lab is an interesting tool, thus it can be included in the seminar instead: something along the lines of using it to evaluate policies.

The seminar should also be steered more towards exploring, applying and evaluating research related to passwords security.

Example of entropy for compromised passwords with password reuse and password systems

Alice has chosen a password $p\in P$ in the password space $P$. Let's assume that $\Pr_P(p) = 1/|P|$. If Alice employs a password system due to regular password changes, she chooses the new password $p'$.

While $\Pr_P(p) = \Pr_P(p')$ might hold true, $\Pr_P(p'|p)$ will be close to zero.

This isn't at all worked through right now, it's just the sketch of an idea. It's probably better to reason informally on this one.

[pwdpolicies] Improve activity

Lennart's suggestion for improvement after running it this year:

Förslag till förbättring av seminariet är följande:

  • Ett 45 minuters-pass med diskussion kring paper och policyer,
  • Rast
  • Gruppuppgift i grupper om 3-4, där varje grupp får i uppdrag att
    utforma sin egen lösenordspolicy utifrån de diskussioner vi haft under
    förmiddagen. Varje grupp ges därefter 5 min att presentera deras
    resultat och ett par minuter avsätts till att analysera deras policy.

Other suggestions for the last activity might be #3 and #4.

[pwdguess] Clarify what must be part of the hand-in

In \subsection{Introductory reflection} students miss the part
"Start by comparing how long a password consisting of lower- and upper-case letters, numbers and special characters must be to have the same strength as a password consisting of three and four randomly chooses words, respectively."

Possible need to reformulate the question?

[pwdguess] Use the password hashes of leaked databases

From @dbosk on September 11, 2015 12:7

Instead of giving a few password hashes to crack, would it be feasible to let the students work with the hashes of leaked password databases? Maybe a class-joint effort to crack all passwords in a database, or a first-to-crack-most competition?

Copied from original issue: dbosk/passwd#1

pwdeval: Change order of seminars

Now the first part focuses on password policies, the second part focuses on alternatives to passwords.

A better order would be to first consider alternatives and when passwords should be used. Then as a second step focus on password policies for those cases.

[pwdpolicies] Estimate how much a policy lowers the entropy

Extend pwdguess to estimate how much easier a password is to guess knowing the policy. This should be possible by computing the reduction in entropy that the policy yields.

This shows the importance of studying every password-composition policy before using it. It connects well with the usable passwords papers they should read in pwdpolicies.

Rebase on better research

  • Bonneau, "The science of guessing: analysing an anonymized corpus of 70 million passwords", S&P 2012.
  • Zhang et al., "The security of modern password expiration: An algorithmic framework and empirical analysis", CCS 2010.
  • Weir et al., "Testing metrics for password creation policies by attacking large sets of revealed passwords", CCS 2010.

Particularly, revise the entropy parts.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.