{"id":4955,"date":"2014-10-22T07:03:42","date_gmt":"2014-10-22T11:03:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=4955"},"modified":"2020-02-26T15:10:31","modified_gmt":"2020-02-26T15:10:31","slug":"remember-strong-passwords","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/remember-strong-passwords\/4955\/","title":{"rendered":"How to Remember Strong, Unique Passwords"},"content":{"rendered":"<p>It\u2019s 2014, Lockheed Martin recently announced that it is making real progress toward developing a compact nuclear fusion reactor capable of providing unimaginably vast supplies of energy in exchange for a couple handfuls of clean, somewhat easily available fuel. And yet, we\u2019re still stuck memorizing ever-longer <a href=\"https:\/\/www.kaspersky.com\/blog\/21st-century-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">lists of passwords<\/a> like it\u2019s 1999. If we\u2019re going to rely on an ancient authenticator for future technology, then we might as well come up with a solid way to remember our passwords, which is exactly what our friends at <a href=\"https:\/\/www.kaspersky.com\/blog\/video-2-privacy-and-bad-bargains\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Carnegie Mellon<\/a> University\u2019s computer science department have done.<\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000\">\n<\/p><p class=\"zw-paragraph\"><span class=\"zw-portion\">Unfortunately, it turns out that remembering long lists of complicated\u00a0<\/span><a style=\"color: blue\" title=\"\" href=\"https:\/\/www.kaspersky.com\/blog\/heartbeat-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span class=\"zw-portion link\" style=\"color: #000080\">passwords<\/span><\/a><span class=\"zw-portion\">\u00a0requires us to do something that no one likes: study. According to research developed by Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor and Anupam Datta, a system of spaced repetition paired with <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mnemonic\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">mnemonics<\/a> increases the likelihood that users will remember their passwords over long periods of time.<\/span><\/p>\n<p class=\"zw-paragraph\"><span class=\"zw-portion\">The password construction element of this is similar to a certain\u00a0<\/span><a style=\"color: blue\" title=\"\" href=\"http:\/\/xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span class=\"zw-portion link\" style=\"color: #000080\">XKCD comic about password strength<\/span><\/a><span class=\"zw-portion\">, which is to say, think sentences rather than words:<\/span><\/p>\n<p class=\"zw-paragraph\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/10\/05200035\/password_strength.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4959\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/10\/05200035\/password_strength.jpg\" alt=\"password_strength\" width=\"740\" height=\"601\"><\/a><\/p>\n<p>The participants in the Carnegie Mellon study were made to choose a person from a drop down menu\u00a0and\u00a0being assigned\u00a0with\u00a0machine-generated random\u00a0action and object\u00a0pair. This method is\u00a0known as a person-action-object\u00a0(PAO)\u00a0story. So you\u00a0get something like this:\u00a0\u201cMaster Yoda\u00a0dropping\u00a0a\u00a0microphone.\u201d<\/p>\n<p>The mnemonic device at play here is that the participants in the study were also shown a picture of a setting in which to imagine their person-action-object story occurring.\u00a0Let\u2019s say that the picture associated with our story is of an underwater laboratory. In this way we\u00a0end up with sentence like\u00a0\u201cMaster Yoda\u00a0dropping a microphone in an underwater laboratory\u201d.<\/p>\n<p>So you have 6 words and the password you can construct of these words is strong enough\u00a0\u2014\u00a0you can make sure at\u00a0our <a href=\"https:\/\/www.kaspersky.com\/blog\/password-check\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Secure Password Check page<\/a>. The point of mnemonic\u00a0technique\u00a0is that you don\u2019t have to remember all the sentence.<\/p>\n<p>In this study, participants were prompted with scene and person\u00a0pair\u00a0(Master Yoda\u00a0in an underwater laboratory) and made to perform a rehearsal routine to recall\u00a0the action and object\u00a0at a set number of spaced intervals over a period of 100 or so days. The specific intervals for these rehearsal rituals and the number of passwords (either one, two or four) a given user was expected to recall varied from one trial group to the next.<\/p>\n<p>The users with the best results were those that initially rehearsed after 12 hours and then in 12\u00d71.5 hour increasing intervals\u00a0(0.5 days, 1.75 days, 4.15 days, 8.15 days, 14.65 days, 24.65 days, 40.65 days, 64.65 days and 101.65 days). In that group, 77.1 percent of the participants successfully recalled all 4 stories in 9 tests over a period of 102 days.<\/p>\n<blockquote>\n<p class=\"zw-paragraph\">I suppose you could say that I was a little bit surprised. If you had forced me to guess which condition would yield the best results before the study I probably would have guessed that the 30minX2, though I would not have been entirely confident<\/p>\n<\/blockquote>\n<p>I reached out to Blocki and asked is he was surprised by the results.<\/p>\n<p>\u201cI suppose you could say that I was a little bit surprised,\u201d he said. \u201cIf you had forced me to guess which condition would yield the best results before the study I probably would have guessed that the 30minX2, though I would not have been entirely confident. Yes, the 12hrX1.5 group had a longer initial rehearsal interval. However, the intervals between successive rehearsals did not increase quite as quickly as they did in the 30minX2 condition. The results indicate that the spacing of rehearsals is significant (not just the total number of prior rehearsals).\u201d<\/p>\n<p>Incidentally, most of the forgetting happened in that first 12 hour period. Some 94.9 percent of participants who remembered stories in the early rounds continued to remember them in subsequent rounds. Not surprisingly, the recall rate for participants asked to remember one or two stories was substantially better than those that were asked to remember four stories.<\/p>\n<p class=\"spacer-para\"><\/p><blockquote class=\"twitter-pullquote\"><p>Remembering long lists of #passwords requires us to do something we all hate: study<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fa4f5&amp;text=Remembering+long+lists+of+%23passwords+requires+us+to+do+something+we+all+hate%3A+study\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There is a lot going on in this study, titled \u201c<a href=\"http:\/\/arxiv.org\/pdf\/1410.1490v1.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords<\/a>,\u201d [PDF]. Feel free to wade through it on your own, but there\u2019s a lot of spooky math problems going on in there.<\/p>\n<p>So what did we learn today? First of all we learned it\u2019s easier to remember fewer passwords. Which is probably why nearly everyone uses the same password across multiple accounts \u2013 despite knowing that password sharing is a bad idea.<\/p>\n<p class=\"spacer-para\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/10\/05200033\/1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4967 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/10\/05200033\/1-1024x768.png\" alt=\"1\" width=\"1024\" height=\"768\"><\/a><\/p>\n<p>But there is\u00a0good news: you can improve your passwords using relatively easy mnemonic techniques:<\/p>\n<ul>\n<li>Create story passwords that you can associate with a picture.<\/li>\n<li>Avoid password sharing where possible.<\/li>\n<li>Study your passwords early and often.<\/li>\n<\/ul>\n<p>And may the <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">force be with you.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s 2014, Lockheed Martin recently announced that it is making real progress toward developing a compact nuclear fusion reactor capable of providing unimaginably vast supplies of energy in exchange for<\/p>\n","protected":false},"author":42,"featured_media":4956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[359,187,709,97],"class_list":{"0":"post-4955","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-authentication","10":"tag-passwords","11":"tag-research","12":"tag-security-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/remember-strong-passwords\/4955\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/remember-strong-passwords\/4267\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/remember-strong-passwords\/4184\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/remember-strong-passwords\/4703\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/remember-strong-passwords\/6386\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/remember-strong-passwords\/5165\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/remember-strong-passwords\/6386\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/remember-strong-passwords\/6386\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/authentication\/","name":"Authentication"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4955"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4955\/revisions"}],"predecessor-version":[{"id":19144,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4955\/revisions\/19144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/4956"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}