Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Effect of Grammar on Security of Long Passwords
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
(01-11-2013, 02:07 PM)atom Wrote: [ -> ]This topic seems to be really important for you.

Respectfully, it is pretty important for WPA work. Things like Diceware have been around for a long time but people are starting to realize that there is a certain measure of security to be gained simply by bigger-is-better. And with WPA/WPA2 already forcing you to use at least eight, even the most security-blind users are already past the half way point on password length limitations.

A paper from Carnegie Mellon was released recently on the trend towards long passwords. Hashcat gets mention in the paper:
Effect of Grammar on Security of Long Passwords

Although they don't mention (unless I missed it) that Hashcat has a length limitation, a number of their tests start at 16 character-length passwords and go up. The paper is not focused on WPA but they've done some interesting research into how people choose passphrases and reinforces the idea that password length is important. Worth a read.
They tested Hashcat CPU and does not have that limit?
why are you cross-posting? this is the same comment you left on another thread.
I removed it from there and split it to here because it didnt fit in the other thread
oh, ok.
Thank you atom. I wasn't trying to bump that old thread back up, it's just that it laid fallow for a couple days before I read it. I thought this paper might be appropriate to the discussion but I'm happy to have it posted wherever you like. Thank you for not deleting it!

I don't know which of your tools Ashwini tested with. I believe when she was referring to "Hashcat" she was probably talking about the entire suite of tools. It's not clear from the paper what results they got with anything other than JTR. No mention of a length limitation was made and I didn't even see any mention of the hash type so they may have simply done simple MD5 tests to come to their research conclusions. They may also have just stuck with CPU tests rather than GPU because they didn't actually need to break the passphrases, they just needed to understand how one MIGHT go about trying.

As I said, the paper certainly wasn't just about length (in one spot they point out that longer is NOT always better) it was more about the structure of long passwords. Kind of drawing the correlation to words that Markov chains have to characters.

Anyway, food for thought....

Thanks.
In the abstract they write:
"We show that using a better dictionary e.g. Google Web Corpus, we can crack more long passwords than previously shown (20.5% vs. 6%)."

The discuss methods using corpus linguistic tools, much like I wrote about when I first joined the Hashcat forums.