{"id":287465,"date":"2013-12-05T09:00:53","date_gmt":"2013-12-05T17:00:53","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=287465"},"modified":"2016-09-11T16:14:44","modified_gmt":"2016-09-11T23:14:44","slug":"avoiding-vulnerable-passwords-rules","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/avoiding-vulnerable-passwords-rules\/","title":{"rendered":"Avoiding Vulnerable Passwords\u2014and Rules, Too"},"content":{"rendered":"<p>You could think of it as a brainteaser: Create a sequence of eight or more characters that includes at least one uppercase letter, one lowercase letter, a digit, and a symbol, that doesn\u2019t contain any words in English, and that is memorable enough that you can recall it.<\/p>\n<p>For most of us, unfortunately, the challenge posed by these rules isn\u2019t fun\u2014it\u2019s a painful chore forced upon us when choosing a password to access an email account, a company network, or a website.<\/p>\n<p>Passwords that contain symbols and uppercase letters to meet these rules also tend to be difficult to type, especially on mobile devices.<\/p>\n<p>Even worse, adhering to the rules doesn\u2019t guarantee that your account or your password-protected data will remain secure. A surprising number of passwords that follow these rules are easily guessed by malicious hackers: \u201cP@$$w0rd1,\u201d for example, or \u201cQwerty123!\u201d. If you specify one of these passwords, most login systems won\u2019t raise any objections.<\/p>\n<p>For ordinary users, as well as entire organizations, this state of affairs has potentially serious implications. For <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/stus\/\" target=\"_blank\">Stuart Schechter<\/a> of Microsoft Research and several of his colleagues, it presented a compelling challenge: finding a way to help users avoid \u201cweak\u201d passwords\u2014those that might be too easy for attackers to guess\u2014that were allowed under the old rules, while simultaneously enabling users to choose passwords that are easy to type.<\/p>\n<p>Schechter, who studies the intersection of human behavior and computer security, is no stranger to debunking conventional wisdom about identity authentication. Several years ago, he and two collaborators wrote a paper revealing the risks of using \u201csecret questions\u201d as a secondary authentication measure when users need to reset a password.<\/p>\n<p>This time, with access to a huge store of publicly available data on password use and password-setting habits, Schechter and his colleagues\u2014<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cormac\/\" target=\"_blank\">Cormac Herley<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/paulhsu\/\" target=\"_blank\">Bo-June (Paul) Hsu<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/riloynd\/\" target=\"_blank\">Ricky Loynd<\/a>, and former Microsoft Research intern and Carnegie Mellon University Ph.D. candidate <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.salsite.com\/cv\/\" target=\"_blank\">Saranga Komanduri<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u2014have created a tool that detects password vulnerability while forsaking password-strength rules that have been in force for more than 30 years.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-287468\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Telepathwords.jpg\" alt=\"Telepathwords\" width=\"300\" height=\"169\" \/>The free online research tool, launched December 5, is called <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/telepathwords.research.microsoft.com\/\" target=\"_blank\">Telepathwords<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Users can visit the project website and test the strength of their passwords\u2014current ones, past ones, or ones they\u2019re considering using.<\/p>\n<p>\u201cThe system doesn\u2019t ask the user to learn anything up-front or follow any specific rules,\u201d Schechter says. \u201cRather, as you type each key of your intended password, it displays the characters it thinks you\u2019re most likely to type next. If it succeeds in predicting one or more characters of the rest of your password, the evidence that these characters are predictable will be right in front of your eyes.\u201d<\/p>\n<div id=\"attachment_287471\" style=\"width: 891px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-287471\" class=\"size-full wp-image-287471\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Telepathwords-user-interface.jpg\" alt=\"Telepathwords user interface\" width=\"881\" height=\"542\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Telepathwords-user-interface.jpg 881w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Telepathwords-user-interface-300x185.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Telepathwords-user-interface-768x472.jpg 768w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><p id=\"caption-attachment-287471\" class=\"wp-caption-text\">The user interface for Telepathwords makes it easy to assess the security of the password you&#8217;re considering.<\/p><\/div>\n<p>Using Telepathwords feels similar to the autocomplete feature in search engines, except that it discourages you from following its predictions. Predictable characters don\u2019t do much to increase the security of your password against those who might try to guess it, so if you type one of the three characters predicted by Telepathwords, a red X will appear above it. If you choose a character that is not among those predicted by Telepathwords, a green checkmark will appear above it.<\/p>\n<p>While not truly telepathic, Telepathwords is endowed with great deal of knowledge about how users choose passwords. It knows all the usual substitutions, such as substituting the dollar sign ($) for an S. Telepathwords also looks for passwords constructed by moving a finger around the keyboard, regardless of direction. It has an extensive list of known-popular passwords, as well as a dictionary of English words and a list of common phrases obtained from Microsoft\u2019s <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.bing.com\/\" target=\"_blank\">Bing<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> search engine. And it\u2019s wise to all sorts of tricks that users have devised\u2014and attackers have long recognized\u2014such as putting an asterisk between the letters of a familiar word.<\/p>\n<p>Telepathwords also responds\u2014with a diplomatically worded pop-up message\u2014to passwords that rely on common substitutions or contain profanity, both of which attackers also are keenly aware.<\/p>\n<p>The team tested Telepathwords with several hundred Microsoft employees who shared some of their favorite password-creation tactics to see if Telepathwords would detect them.<\/p>\n<p>\u201cWe saw firsthand the tricks people use to construct passwords and then figured out which ones we should assume attackers also know,\u201d Schechter says. \u201cWe then refined the system to detect these ill-advised password-creation behaviors.\u201d<\/p>\n<h2>Managing Passwords\u2019 Flaws<\/h2>\n<p>Even if Telepathwords succeeds in helping users choose passwords they can remember and are hard for others to guess, some users will still forget their passwords, and passwords too complex to guess can be stolen in other ways. Schechter, who joined Microsoft Research in 2007 after getting his Ph.D. from Harvard University and spending three years at the Lincoln Laboratory at the Massachusetts Institute of Technology, started working on the problem of what to do when passwords are lost or compromised shortly after joining Microsoft.<\/p>\n<p>It used to be that if websites didn\u2019t have an email address at which a user could obtain a password-reset code, the gold standard for verifying a user\u2019s identity was to ask a so-called \u201csecret\u201d question\u2014such as \u201cwho\u2019s your favorite historical figure?\u201d or \u201cwhat\u2019s your favorite sports team?\u201d\u2014that the users answer when they first establish an account.<\/p>\n<div id=\"attachment_287474\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-287474\" class=\"size-full wp-image-287474\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Stuart-Schechter.jpg\" alt=\"Stuart Schechter\" width=\"300\" height=\"468\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Stuart-Schechter.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/09\/Stuart-Schechter-192x300.jpg 192w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-287474\" class=\"wp-caption-text\">Stuart Schechter<\/p><\/div>\n<p>Schechter, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ajbrush\/\" target=\"_blank\">A.J. Brush<\/a>, and Microsoft Research intern <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.guanotronic.com\/~serge\/\" target=\"_blank\">Serge Egelman<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, now a researcher at the University of California, Berkeley and the International Computer Science Institute, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/its-no-secret-measuring-the-security-and-reliability-of-authentication-via-secret-questions\/\" target=\"_blank\">studied about two dozen of these questions<\/a>. They found that the answers to most were remarkably easy to predict.<\/p>\n<p>It turns out that a lot of Americans admire the presidents they learned about in elementary school and root for their local sports teams. The few questions that didn\u2019t have predictable answers were forgotten too often.<\/p>\n<p>The timing of that research project was impeccable. The week in 2008 that the researchers submitted their paper about secret questions, news outlets around the world reported that vice presidential candidate Sarah Palin\u2019s email account had been hacked. The weakness that enabled access to her account? The secret question about where Palin had met her husband, which was widely known to have been in high school in Wasilla, Alaska.<\/p>\n<p>Schechter and his colleagues take the same intuitively simple approach to those common answers that they do with common passwords: Choose a different question if your answer is popular enough that an attacker is likely to guess it.<\/p>\n<p>Their paper on secret questions led major providers of webmail and other high-value Internet services to start shifting away from the use of secret questions. Many augmented email-based verification with text messages sent to mobile phone numbers. Facebook adopted another approach pioneered by Schechter and colleagues: relying on users\u2019 <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/its-not-what-you-know-but-who-you-know-a-social-approach-to-last-resort-authentication\/\" target=\"_blank\">trusted friends<\/a> and family members to verify their identity.<\/p>\n<h2>The End of Passwords?<\/h2>\n<p>As for the question of whether password authentication soon will become obsolete, Schechter notes that such predictions have been around as long as passwords have been used online. He points to <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/the-quest-to-replace-passwords-a-framework-for-comparative-evaluation-of-web-authentication-schemes\/\" target=\"_blank\">work by Herley and others<\/a> that documents the reasons why other technologies have failed to replace passwords and why they are unlikely to do so in the future. For example, credentials that you carry with you are easy to forget and, like passwords, can be stolen.<\/p>\n<p>Schechter explains that as people start to log on to websites using email or social-media accounts, or to use a master password to keep their other passwords safe, they are increasing the importance of the passwords, which suddenly control even more resources.<\/p>\n<p>\u201cYou can move all your eggs to one basket,\u201d he says, \u201cbut in the end, there\u2019s usually a password protecting that basket.\u201d<\/p>\n<p>Seeing is believing: Check the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/telepathwords.research.microsoft.com\/\" target=\"_blank\">Telepathwords<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> site, and learn how your passwords fare. You might be surprised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You could think of it as a brainteaser: Create a sequence of eight or more characters that includes at least one uppercase letter, one lowercase letter, a digit, and a symbol, that doesn\u2019t contain any words in English, and that is memorable enough that you can recall it. For most of us, unfortunately, the challenge [&hellip;]<\/p>\n","protected":false},"author":39507,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194489],"tags":[201057,212168,212171,212186,212177,212174,186803,212183,212180],"research-area":[13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-287465","post","type-post","status-publish","format-standard","hentry","category-security","tag-computer-security","tag-human-behavior","tag-identity-authentication","tag-password-authentication","tag-password-vulnerability","tag-password-setting-habits","tag-passwords","tag-secret-questions","tag-telepathwords","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","byline":"","formattedDate":"December 5, 2013","formattedExcerpt":"You could think of it as a brainteaser: Create a sequence of eight or more characters that includes at least one uppercase letter, one lowercase letter, a digit, and a symbol, that doesn\u2019t contain any words in English, and that is memorable enough that you&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/287465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/39507"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=287465"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/287465\/revisions"}],"predecessor-version":[{"id":291125,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/287465\/revisions\/291125"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=287465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=287465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=287465"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=287465"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=287465"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=287465"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=287465"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=287465"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=287465"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=287465"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=287465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}