Main » 2011 » Март » 16 » Difficulttoremember password is not needed
11:34
Difficulttoremember password is not needed
All passwords for different resources should be long, complex, personal and do not like.



But how come so many different passwords? Suppose we have found in the vast expanses of the Internet we needed a program that generates the required number of znakosimvolov. But how to remember all this riot of letters, numbers, punctuation, and do not be afraid to utter the phrase, no clear characters as emoticons, arrows, houses and Chinese characters? And how not to confuse what "unreadable" by a web site?

I just can not remember. I even four-digit PIN-code cards forget the next day. Passwords can be written in the right time to lose all that kopilos many years. And if you have paranoia? You still have to put in your shifrobloknot deposit box. But you forget another parolku from another armored doors almost immediately.

And what if there is a way for you not to think, not memorize and not write down the keys of our secrets? I propose a way of inventing such passwords.

We need three things.
1. "Magic" label (it is on) with which we are going to create passwords,
2. Individual keyword phrase,
3. Resource name for which we will create a password.

And nothing more. Intrigued?


Magic table


To get started you will introduce the "magic" table. This is a key element of this method of inventing passwords. Immediately I note that this is not my invention. At school I was using a table to encrypt their confidential records. I modified it just a little bit.



Yes, and it is not such magic. The three left-hand columns (left field) are recurring characters. In a large square field (main field) latin characters and numbers periodically repeated horizontally and vertically. In the upper three lines (top field), any characters, it is from them and will receive passwords.

Well, the table we have. It remains to come up with a key phrase and find the resource to which we shall come up with a password. Let the first word will be password, and the second - mysite. The password will come up out of sixteen characters. Let's go.

Create a password


Take the first letter of the passphrase (p) and find it in left field. Found? Now, in the same row in the main field locate the first letter of the resource (m). Also found? Climb the column up and look for the first character of our password (a number 0). And then repeat the same for each successive pair of characters. The word ended in the letters? It's okay, start with the beginning of the word. You will see the result in Table 1.1.



Not bad. Even numbers in the password is.

What will the result of making a password for Habrahabr seen in Table 1.2. We changed only the name of the resource (habrahabr), and the password is changed.



I know that there are willing to see the password capitalization and punctuation. Let's draw them.

In a word HaBRaHaBR there are consonants. You, too, noticed? Then let us in the same positions replace the password to uppercase letters. The result in Table 1.3.



Now, replace the password characters 4, 8 and 16 at the punctuation marks (Table 1.4), and for this they need a top field of the "magic" tablets.



I note that if the number of characters in the Keyword and the resource name is the same, then the password characters will be repeated. To avoid this possible, for example, to the resource name to add letters. Like this habrahabr + dobivka = habrahabrdobivka (table 1.5).



As a key phrase you can use whatever you like. Even a quadratic equation fit (Table 1.6).



You can use your favorite character from a children's book (table 1.7)



And for a change in password, you can insert Cyrillic characters. Table 1.8 are inserted at the place where the key phrase in the resource name vowels.



While preparing material for the publication came up with another way of using this method. The fact that I was too annoying quizzes in the system password recovery. Who else but you knows your mother's maiden name? I think everything. There you have one weak spot in security. Your mother will not mind if you zashifruete her name? Then you can safely use the principle of table 1.9.



Create your own "magic" table


If everyone would use the same "magic" table, then I think it would not be good. Here's another one.



What is it different? Left field is the same. In the central field, I changed the sequence of characters. A top box set up the Russian and Latin characters are not quite in alphabetical order.

In general, you can create your own table following the four simple rules.
1. You have to remember on what basis you make up a table.
2. In the left margin of the characters should not be repeated.
3. In the main field characters should not be repeated in rows and columns.
4. In the upper field can have any characters in any order.

And now try to create a password with a key phrase and the name of a resource from our first example, but using the second encryption table. So what happened can be seen in Table 2.1. Feel the difference.



And for that you could with less effort to create a private table, where I posted the source code format. Xls.

"Remembering" Password


Suppose you went to your favorite Habrahabr, Vkontakte, or a site where all the details with pictures and describes how to use cabbage in which there are children and trying to remember your password? And remember the password is not necessary. His general can not remember. How is this possible?

1. You made personal spreadsheet on a particular crypt and that you understand the principle. Even if its loss would not be a big problem. Restore it.
2. Do you remember your personal passphrase. But you remember the number? until the fourteenth decimal place.
3. You are of sound mind and good understanding on what site you visited.

This is all you need. Create a password again, it will be exactly the same.

Seryozhenka, and once again I forgot parolku from corporate soap "


you also annoying that phrase? Even enrages? As I understand you. Need to make as much extra body movements. What if ...

Do you in fact have a key phrase. And your "forgetfulness co-workers" have employee code or login. Let's use it for other purposes.



Safety Regulations on your business need to change your password once a month? More often? Then under the same conditions, change the passphrase and re-create passwords.



And of course nobody will forbid you to automate the process.

Instead of an epilogue


I understand that using a piece of paper and even a picture of encryption tables on the computer is not very convenient. Therefore, I have a request. If you liked the idea and you can create an application for the PC, phone, smartphone or communicator, then go for it. Sam I am not a local, hands are not imprisoned by it ...

P. S. I know that the key word in English keyword. Word password I used a specially-that would confuse the intelligence agencies of all countries, times and people.

Completed after the publication


Thanks, iFaTaL1Ty, for the link to Habrahabr with a similar idea.
Thanks, VasyaMobile, for much the same idea from a Yandex.
Many thanks, jursovet. That is not only a similar idea, but a practical way to implement it.

Suffered a themed blog.

Criticisms


Topic on Habrahabr where voiced criticisms to this method of inventing passwords. And this is my response to the criticism.

To quote a comment:
rbJJkjwqmIyLm7er - is the password to the site mojdomen. Recover the passphrase, and I confess that I'm an idiot.
Views: 478 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: