In the 1932 Marx Brothers' film “Horse Feathers,” Wagstaff (Groucho), the new college president, visits a speakeasy. Baravelli (Chico) accidentally reveals that the entry password is “Swordfish.” However, after Wagstaff enters and Baravelli exits, Wagstaff alters the password, promptly forgetting it. This mishap results in both being locked out. This early comedy exemplifies, though exaggerated, the flaws in human nature and behavior when it comes to passwords.
Weak passwords have been a consistent issue for data security. According to various studies and reports over the years, weak passwords or reused passwords are often the primary culprits in many data breaches. This week, we take a look at the differences between passwords, passphrases, and passkeys, and how the power of “length” is the key factor for security regardless of whether you use passwords or passphrases.
The weakest link in securing digital assets is often said to be the “human element.” Despite advanced technology and sophisticated security protocols, human behaviors, mistakes, and oversights can introduce vulnerabilities that malicious actors can exploit. Among the list of vulnerabilities posed by the human element, poor password practices are near the top. Many people still use weak passwords or reuse passwords across multiple sites and services, making it easier for attackers to gain unauthorized access.
For instance, in 2023, 64% of passwords only contain eight to 11 characters. Nearly 40% of users admit to sharing their personal passwords with others, and 61% of those affected by password hacking had passwords that were shorter than eight characters.
Also, according to the Q2 2023 Cyber-threat Report (April 1 - June 30) by ReliaQuest, a significant spike in ransomware activity was noted, marking it as the quarter with the highest number of victims listed on ransomware data-leak sites. The ransomware group ALPHV, affiliated with “DarkSide” and “BlackMatter,” practices triple extortion: ransomware, data theft, and DDoS attacks. ALPHV employs the AES and ChaCha20 encryption algorithms, targeting operating systems like Windows, ESXi, Debian, and more. They infiltrate systems through vulnerabilities, compromised passwords, or initial access brokers (IABs), using tools such as WebBrowserPassView, Cobalt Strike, and Mimikatz for password acquisition, initial access, and privilege escalation.
Lastly, the average global cost of a data breach in 2023 was a record high $4.45 million. Furthermore, a 2019 study by the Ponemon Institute highlighted that companies in the United States, United Kingdom, Germany, and France spend, on average, around $5.2 million annually responding to password-related issues, revealing the economic impact of weak password practices.
User authentication is critical for online security, and despite education and awareness movements, users still practice poor password etiquette and sometimes fall victim to phishing emails, leading to unauthorized access, malware infections, and data breaches. Also, physical security oversights like losing devices—e.g., laptops or USB drives—or leaving them unattended can lead to data breaches. Without proper cybersecurity training, employees might not recognize potential security threats or understand the best practices to mitigate them.
To address all these human elements, continuous education, training, and cyber security awareness campaigns are nonetheless essential. Tools such as multi-factor authentication (MFA) can also mitigate risks associated with human error. Still, cultivating a security-conscious corporate and personal culture is one of the most effective strategies to protect digital assets.
Moving towards a security-conscious culture requires rethinking our approaches to authentication. Authentication of login credentials aims to verify an individual's identity, ensuring system access is granted only to legitimate users. Understanding the best practices for the three primary user authentication methods—passwords, passphrases, and passkeys—is crucial to prevent unauthorized system access and thwart potential attackers.
Passwords are user-created character strings, while passphrases are longer, word-based sequences for enhanced security. Passkeys employ public-key cryptography, stored on devices, and use biometrics or security keys as the second authentication factor instead of codes.
The key factor for security, whether using passwords or passphrases, is length. Increasing a password’s length raises the difficulty of brute forcing exponentially. Passphrases have equivalent or better strength than passwords of the same length. Very long, 20+ character passwords or 5+ word passphrases offer protection that may take longer than a human lifetime to crack through brute force alone (Table 1).
Table 1: Comparing the estimated brute force crack times for passwords vs. passphrases of different lengths with numbers, upper and lowercase letters, and symbols. Note that estimated times are approximate since crack speed depends heavily on the hacking hardware and techniques. (Source: Author)
Password/Passphrase Length
Estimated Crack Time
8-character password
Seconds to minutes
12-character password
Hours to days
16-character password
Years
20-character password
Centuries
4-word passphrase
5-word passphrase
Millennia
6-word passphrase
Millions of years
7-word passphrase
Billions of years
This week's New Tech Tuesday introduces Microchip Technology's EV97M19A and Swissbit's iShield Key Pro. These two cutting-edge solutions are crafted for those who demand uncompromised security in engineering applications.
The Microchip Technology EV97M19A is a compact mikroBUS™ extension board for showcasing Microchip's SHA104 and SHA105 capabilities. While the SHA104 focuses on accessory-side applications like consumables, the SHA105 caters to host-side needs, enabling mutual authentication. Together, they ensure robust mutual symmetric authentication in commercial and industrial settings.
Designed for seamless integration with the CryptoAuth Trust Platform and other Microchip platforms with a MikroElektronica mikroBUS header, the EV97M19A also supports connection to XPRO header boards via the ATMBUSADAPTER-XPRO. It streamlines the authentication system development with its onboard Microchip devices.
Key features:
Swissbit's iShield Key Pro (USB-A/NFC) delivers secure, simple, and versatile authentication. This hardware-based solution elevates online account protection against online attacks, such as phishing, social engineering, and account takeover, aligning with Swissbit's reputation for robust data and device security. Tailored for businesses, IT infrastructures, and online service providers, it offers users superior protection for personal and professional online accounts through advanced asymmetric cryptography. Crafted in Berlin's Swissbit factory, the iShield Key Pro boasts impeccable quality and is customizable. It supports NFC for mobile devices and ensures seamless integration with any FIDO2 and U2F compatible platforms, even allowing password-less sign-ins to Windows 10. With its all-in-one design, it fortifies authentication, replaces traditional passwords, and offers options ranging from single-factor to multi-factor authentication.
Key Features:
Passwords are a prevalent part of our lives, and while the incessant requirements to update them can seem tedious, taking authentication seriously is the first step in protecting our data. Weak passwords are a substantial cybersecurity vulnerability that comes at a significant cost. Secure user authentication is paramount in the digital age. Passwords, passphrases, and passkeys play vital roles in ensuring only authorized users access systems. Each offers advantages, but their efficacy hinges on proper use and understanding. Still, regardless of the chosen authentication method, length is a pivotal security factor. A password's length directly influences its resilience against brute force attacks. While there are numerous best practices for authentication, cybersecurity’s greatest defense is password length.
Sources:
ReliaQuest. “Ransomware Report: Q2 2023.” April 1, 2023. https://www.reliaquest.com/resources/research-reports/ransomware-report-q2-2023/.
Security.org. “America’s Password Habits 2021.” August 25, 2023. https://www.security.org/resources/online-password-strategies/.
Statista. “Average Cost per Data Breach in the United States from 2006 to 2023.” September 4, 2023. https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/#:~:text=As%20of%202023%2C%20the%20average,million%20U.S.%20dollars%20in%202023.
Rudy Ramos brings 35+ years of expertise in advanced electromechanical systems, robotics, pneumatics, vacuum systems, high voltage, semiconductor manufacturing, military hardware, and project management. Rudy has authored technical articles appearing in engineering websites and holds a BS in Technical Management and an MBA with a concentration in Project Management. Prior to Mouser, Rudy worked for National Semiconductor and Texas Instruments..