MD5 hash img ca94e1280c66a5336df0851043788ce2 s*****n@gantenbe.in a403555b8843a3838e9b16dcabf61370 o**************n@yahoo.com 07b73a694fbbaee2a7133cd5a2dd6ea2 k************e@hotmail.com 9e38451efa23937301594f273033c5f1 x******r@boubert.fr 69890f79f94fe16d24738a1b47902859 p********w@gmail.com dba5fab99abc85a6ce45e1d0c12fabec m*******a@gmail.com f565f8ababa12cdf3d447f5ed1865afa q********h@gmail.com 7b559e803176942da0c0a5f8ad6eb30b d********l@icloud.com 6870017e0ec7f63adc7a20c99b70e8cf s*******t@gmail.com dea9523832b310933bde56f544f4adc1 n************z@yahoo.com 9f16f1eac01f4a67f16e556a514afc06 n*******5@live.it 6dacba2c37be978499e4eca72a9f54fb a**********h@gmail.com 4a715e962708436068f1c117ff8693eb d*********s@gmail.com ccd1469dfb35f129c4f4e61b3a8ea6b7 x******r@gmail.com 5426db8fdf8dbbec1644b378175a2d9f r*********r@gmail.com a2ad896c2074c0ececae375ee2c21b0d a********8@gmail.com c1fec99572b163fba60f6ad7c22d712d r************0@gmail.com 71a996f5146fa1600ea57eaf6831eebd l*************i@gmail.com 98c5d00b8fb8aaf8c93276fd02ff70ae k*******m@gmail.com d55286c5734d5d8e3f0ead94cc6f5786 r*****************2@gmail.com
Randomly chosen e-mail addresses recovered from Gravatars on the website jakoszczedzacpieniadze.pl / Losowo wybierane adresy e-mail odtworzone z Gravatarów w serwisie jakoszczedzacpieniadze.pl
MD5 hash img 14bf9a82d30ad89dac145c41ec83767e n*********1@wp.pl ef80e354fc558c3b6d54d12a8de1eb63 t************t@interia.pl c61294eb3fdcd269f86839ed8e46788a r*****l@bieleniewicz.com f94db8295f0d5203d135300dd425dc04 m***************g@gmail.com 4ac4c18966229d2fb8e642968f14b815 b********w@gmail.com ac74c11070dc8a1a1c2c4f0b29f33e66 j********h@gmail.com a06eb316734f4ee4523ae23c0130a8dd o*****************l@gmail.com ec51d2757627be799dc1e9f2e971b128 g****r@o2.pl edf9a0c5b29aadf9f95d1a0c57b0f3a2 d*****z@op.pl 4f624f421c852f4784dd8933d30a42e0 j*************k@gmail.com aaf4132ea32f041257c4e56512956f80 2*************o@wp.pl 6469eab357fb7b0cab20af87ac4526cb a******a@onet.eu 1f052d6dfc1698f8e6c4ef82c404e9a8 n*******m@gmail.com c99d9d0b91f756c9e09a12e7a3138001 m********8@gmail.com e0ac55da0269188b8dda56dbdb0f3fd8 s******************k@gmail.com 012b0ba8ad03b884e226e869e6211223 i******l@wp.pl 27490f93ee31f05655381aa8d1e87b07 t****************i@me.com 54958ab23d7d8292e5fd09b29b69382c a****p@o2.pl 17aacfdf1fd14e6fbe09cd095b89af8e e***********a@gmail.com 4675143386ad73aac2859fe851afce81 m*********a@gmail.com
Zabezpieczanie haseł w systemach informatycznych
Celem artykułu jest usystematyzowanie metod zabezpieczania statycznych haseł przechowywanych na potrzeby systemów informatycznych, w szczególności serwisów internetowych, wskazanie słabych stron zaprezentowanych metod oraz wyciągnięcie wniosków w postaci zaleceń dla projektantów systemów informatycznych. Na wstępie przedstawiono pojęcie kryptograficznej funkcji skrótu, a następnie omówiono kolejne metody przechowywania haseł, pokazując ich ewolucję oraz podatności na współczesne ataki. Pokazano wyniki badań nad hasłami maskowanymi w polskich bankach oraz przedstawiono najciekawsze przykłady współczesnych funkcji adaptacyjnych. Następnie dokonano autorskiej systematyzacji metod zabezpieczania haseł oraz wskazano kierunki dalszych badań. Słowa kluczowe: informatyka, hasła, uwierzytelnianie, zabezpieczanie danych, funkcje skrótu.
Password protection in IT systems
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed. At the beginning, the concept of cryptographic hash function is presented, following discussion of methods of storing passwords showing their evolution and susceptibility to modern attacks. Results of research on masked passwords of Polish banks IT systems
are presented, as well as the most interesting examples of adaptive password functions are given. Then, the systematisation of password protection methods was carried out. Finally, the directions for
further research are indicated.
DOI: 10.5604/01.3001.0011.8036
GICID: 01.3001.0011.8036
Biuletyn WAT 2018; 67 (1): 73-92
Link: https://biuletynwat.pl/resources/html/article/details?id=170409
Kryptograficzne funkcje skrótu
Celem artykułu jest przegląd informacji dotyczących funkcji skrótu oraz przedstawienie najnowszych osiągnięć kryptografii w tym zakresie. Wyjaśnione są podstawowe pojęcia dotyczące funkcji skrótu, ich zastosowanie oraz metody ataków. Pokazany jest bieżący stan kryptoanalizy znanych i powszechnie stosowanych funkcji skrótu: MD4, MD5, SHA. Na zakończenie omówiona jest przyszłość funkcji skrótu i zakończony konkurs na nowy standard funkcji SHA-3.
Cryptographic hash functions
The article presents a synthesis of information about the hash function and shows the latest developments in this field of cryptography. Basic concepts of the hash function are explained: definition, properties, classification, usage of the hash function and methods of attacks. The current state of cryptanalysis of known and commonly used hash functions (MD, SHA) is shown as well as consequences coming from this. At the end the attention will be paid to the future of the hash function and the current state of art in the competition for developing the new standard of SHA-3 function.
Zeszyty Naukowe Akademii Marynarki Wojennej, 2 (193), 2013, 91-102
Survey PNA 2018
The results of the password security survey conducted among students at the Polish Naval Academy in 2018.
The survey was conducted at all faculties, both among military and civil students, both among Polish students (460 questionnaires) and foreign (50 questionnaires) as part of the diploma thesis.
1. The first group of questions concerns general issues related to passwords.
Do you use the same password on different websites?
Answer | Number of answers | ||
code | meaning | quantity | percentage |
T | YES | 257 | 55.87 % |
N | NO | 203 | 44.13 % |
How many unique passwords do you have to protect your Internet accounts/profiles?
Answer | Number of answers | ||
code | meaning | quantity | percentage |
=1 | =1 | 29 | 6.30 % |
2-3 | 2-3 | 237 | 51.52 % |
4-5 | 4-5 | 130 | 28.26 % |
6- | 6- | 64 | 13.91 % |
Have you ever thought about the safety of your Internet passwords?
Answer | Number of answers | ||
code | meaning | quantity | percentage |
T | YES | 338 | 73.48 % |
N | NO | 122 | 26.52 % |
2. The second group of questions concerns the level of difficulty for passwords belonging to particular categories.
Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Financial services for example Internet banks
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 2 | 0.43 % |
2 | Weak | 4 | 0.87 % |
3 | Medium | 42 | 9.13 % |
4 | Strong | 135 | 29.35 % |
5 | Very strong | 277 | 60.22 % |
Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Social networks for example Facebook
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 3 | 0.65 % |
2 | Weak | 20 | 4.35 % |
3 | Medium | 118 | 25.65 % |
4 | Strong | 218 | 47.39 % |
5 | Very strong | 101 | 21.96 % |
Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Access to email for example Gmail
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 6 | 1.30 % |
2 | Weak | 23 | 5.00 % |
3 | Medium | 116 | 25.22 % |
4 | Strong | 206 | 44.78 % |
5 | Very strong | 109 | 23.70 % |
Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Entertainment services for example Netflix
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 17 | 3.70 % |
2 | Weak | 48 | 10.43 % |
3 | Medium | 173 | 37.61 % |
4 | Strong | 156 | 33.91 % |
5 | Very strong | 66 | 14.35 % |
Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Electronic commerce services for example Amazon
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 13 | 2.83 % |
2 | Weak | 26 | 5.65 % |
3 | Medium | 140 | 30.43 % |
4 | Strong | 171 | 37.17 % |
5 | Very strong | 110 | 23.91 % |
All above presented results on one figure (from left to right):
- Financial services
- Social networks
- Access to email
- Entertainment services
- Electronic commerce
3. The third group of questions concerns a subjective opinion on the strength of passwords.
Password strenght 1467234690
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 44 | 9.57 % |
2 | Weak | 93 | 20.22 % |
3 | Medium | 162 | 35.22 % |
4 | Strong | 120 | 26.09 % |
5 | Very strong | 41 | 8.91 % |
Password strenght 19860425
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 55 | 11.96 % |
2 | Weak | 140 | 30.43 % |
3 | Medium | 168 | 36.52 % |
4 | Strong | 76 | 16.52 % |
5 | Very strong | 21 | 4.57 % |
Password strenght zxcvbn12
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 16 | 3.48 % |
2 | Weak | 77 | 16.74 % |
3 | Medium | 155 | 33.70 % |
4 | Strong | 152 | 33.04 % |
5 | Very strong | 60 | 13.04 % |
Password strenght Q2W3E4R5
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 18 | 3.91 % |
2 | Weak | 87 | 18.91 % |
3 | Medium | 160 | 34.78 % |
4 | Strong | 142 | 30.87 % |
5 | Very strong | 53 | 11.52 % |
Password strenght qazwsxed
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 39 | 8.48 % |
2 | Weak | 126 | 27.39 % |
3 | Medium | 190 | 41.30 % |
4 | Strong | 86 | 18.70 % |
5 | Very strong | 19 | 4.13 % |
Password strenght KasiaNowak
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 348 | 75.65 % |
2 | Weak | 75 | 16.30 % |
3 | Medium | 24 | 5.22 % |
4 | Strong | 5 | 1.09 % |
5 | Very strong | 8 | 1.74 % |
Password strenght K@$i@N0w@k
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 35 | 7.61 % |
2 | Weak | 94 | 20.43 % |
3 | Medium | 107 | 23.26 % |
4 | Strong | 141 | 30.65 % |
5 | Very strong | 83 | 18.04 % |
Password strenght KawonAisak
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 65 | 14.13 % |
2 | Weak | 173 | 37.61 % |
3 | Medium | 171 | 37.17 % |
4 | Strong | 44 | 9.57 % |
5 | Very strong | 7 | 1.52 % |
Password strenght iwonka21
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 196 | 42.61 % |
2 | Weak | 186 | 40.43 % |
3 | Medium | 61 | 13.26 % |
4 | Strong | 10 | 2.17 % |
5 | Very strong | 7 | 1.52 % |
Password strenght KarOlcia9
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 119 | 25.87 % |
2 | Weak | 188 | 40.87 % |
3 | Medium | 119 | 25.87 % |
4 | Strong | 23 | 5.00 % |
5 | Very strong | 11 | 2.39 % |
Password strenght Aizuz1996!
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 47 | 10.22 % |
2 | Weak | 154 | 33.48 % |
3 | Medium | 158 | 34.35 % |
4 | Strong | 76 | 16.52 % |
5 | Very strong | 25 | 5.43 % |
Password strenght RDE1095Ja
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 8 | 1.74 % |
2 | Weak | 45 | 9.78 % |
3 | Medium | 152 | 33.04 % |
4 | Strong | 180 | 39.13 % |
5 | Very strong | 75 | 16.30 % |
Password strenght passw0rd
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 167 | 36.30 % |
2 | Weak | 174 | 37.83 % |
3 | Medium | 87 | 18.91 % |
4 | Strong | 22 | 4.78 % |
5 | Very strong | 10 | 2.17 % |
Password strenght Q5!gH$?aWd
Answer | Number of answers | ||
code | meaning | quantity | percentage |
1 | Very weak | 6 | 1.30 % |
2 | Weak | 9 | 1.96 % |
3 | Medium | 29 | 6.30 % |
4 | Strong | 123 | 26.74 % |
5 | Very strong | 293 | 63.70 % |
Comparison of strength of passwords which belongs to particular group.
In the real survey, passwords belonging to the same group were not
one next to the other.
Group 1
The first group of passwords consists of numbers only: 19860425 (8-digits) and 1467234690 (10-digits).
Group 2
The second group of passwords consists of a combination of keys located close to each other on the keyboard : zxcvbn12, Q2W3E4R5, qazwsxed.
Group 3
The third group of passwords consists of string made only from first and last names in three different forms: KasiaNowak (name and surname), K@$i@N0w@k (name and surname enriched with LeetSpeek – exchange of selected letters for special characters), KawonAisak (name and last name is a reverse).
Grupa 4
The fourth group of passwords consists of name only, enriched with: digits iwonka21; uppercase letters and digitKarOlcia9; reverse, digits and special sign Aizuz1996!.