Home » Archimedes archive » Acorn User » AU 1998-12.adf » PD » RNDpass/!RNDpass/!Tips

RNDpass/!RNDpass/!Tips

This website contains an archive of files for the Acorn Electron, BBC Micro, Acorn Archimedes, Commodore 16 and Commodore 64 computers, which Dominic Ford has rescued from his private collection of floppy disks and cassettes.

Some of these files were originally commercial releases in the 1980s and 1990s, but they are now widely available online. I assume that copyright over them is no longer being asserted. If you own the copyright and would like files to be removed, please contact me.

Tape/disk: Home » Archimedes archive » Acorn User » AU 1998-12.adf » PD
Filename: RNDpass/!RNDpass/!Tips
Read OK:
File size: 1F16 bytes
Load address: 0000
Exec address: 0000
File contents
Choosing a good pass phrase (Contributed by Nat Queen)
******************************************************


Why do we speak of a 'pass phrase' instead of a 'password'?
-----------------------------------------------------------

When many people are asked to choose a password, they select some common
word or name. This can be cracked easily by a 'dictionary attack', i.e. a
computer program that uses a dictionary to try all possibilities. Many such
programs exist. They are sometimes used by people who have forgotten their
own password. But a password that can be recovered in this way is weak. It
can be recovered just as easily by anyone else who may gain access to your
encrypted data.

A somewhat stronger type of 'password' is one which is not a real word, and
perhaps even includes some numbers or other special symbols, if these are
allowed by the software that you are using. Although this is safe from a
classical dictionary attack, it can be cracked by a brute-force attack, i.e.
a program that simply tries all possible sets of characters until it finds
the right combination. Of course, the longer the password, the more
difficult such an attack becomes. Suppose, for example, that 50 different
characters are allowed in the password. Then if you add one extra character
to an existing password, a brute-force search for the correct password would
be expected to take 50 times as long.

Many Unix systems, for example, accept logon passwords of up to eight
characters. Logon passwords for ISPs are usually similar. Unfortunately,
such passwords are rather weak and are easily attacked. You should certainly
use longer passwords if your software allows this.

Documents on PGP and some other encryption software always speak of pass
phrases, rather than passwords, in order to stress that they can be of any
reasonable length, consisting of *many* words or groups of characters,
separated (optionally) by spaces.

How strong should a pass phrase be?
-----------------------------------

The pass phrase is by far the weakest part of many cryptosystems, at least
for many users, who use a weak pass phrase in practice. If an attacker wants
to read a typical user's encrypted messages, it would be far more efficient
to try to crack the pass phrase than to attempt any real cryptanalysis. This
is why it is very important to choose a good pass phrase.

Even for powerful organisations like government agencies with huge computing
resources, it would be most cost-effective to try to crack the pass phrase.
It is often said that the simplest technique for gaining access to encrypted
data is the 'rubber-hose attack' (beating the victim, or using other
methods of torture, until the pass phrase is revealed). Another such
technique is to plant an electronic bug or a hidden program in the user's
computer, to capture all the keystrokes. Alternatively, without even any
physical access to a computer or its user, a serious attacker can monitor,
from a distance, the electronic emissions from the computer and thereby
record the pass phrase. This is known as a 'Tempest attack'. It's not easy
to guard against any of these possible attacks. But you probably do not need
to worry about them, unless you are a serious target of government
investigations, or if you live under an oppressive regime.

It makes sense to choose a pass phrase which is equal in strength to the
cryptosystem being used, since any such system is only as strong as its
weakest link. This document explains some simple tricks which can help to
achieve that goal.

How can I choose a strong pass phrase?
--------------------------------------

In general terms, the aim should be to create a pass phrase that is easy to
remember and to type when needed, but very hard for anyone else to guess,
even for someone who knows you well. It should also be long enough to make
any dictionary attack or brute-force attack impractical.

One well known method is to select, by some random process, a set of words
from a dictionary. This technique is sometimes called 'diceware'. This is
what !RNDpass does.

With a dictionary as large as the one included in !RNDpass, a pass phrase
consisting of 6 or more random words is likely to withstand any conceivable
attack, because of the enormous number of possible combinations, especially
if it's modified in some unpredictable way to prevent a pure dictionary
attack.

Some simple tips for 'distorting' a pass phrase are described below. If they
are applied with a little ingenuity, they will work well even if the user
starts with a 'normal' pass phrase in plain English (instead of random
words, as given by !RNDpass) and distorts it in such a way that it becomes
quite unpredictable.

A few special methods of doing this can be automated in !RNDpass, as an
option. 'Random' (computer-generated) distortions of a pass phrase
consisting of normal words are undoubtedly more secure than distortions
added by hand in an intuitive manner, but it may take more effort to
remember them.

How can a 'normal' pass phrase be distorted to make it stronger?
----------------------------------------------------------------

� First of all, you may start with either a set of random words like those
generated by !RNDpass (more secure, but harder to remember) or a meaningful
sequence of words (less secure, but easier to remember). If you choose the
latter approach, do not use any famous quotations, proverbs or sayings. All
these exist in dictionaries, including some in electronic form, which can be
used for cracking purposes. One possibility would be to select a phrase from
a book at random, preferably avoiding any complete sentence. Try to avoid
phrases with a conventional, predictable grammatical structure. If
necessary, replace some words with silly, unexpected words.

� When 'distorting' a 'normal' pass phrase, it is best to avoid the use of
only dictionary words, in order to foil any possible dictionary attack.

� You can use non-alphabetic characters, such as numbers or any other
symbols on your keyboard. These can be inserted in unexpected places. For
example, you can change the word 'computer' to 'c0mputer', '98%computer', or
'comput#'. The use of additional characters can increase the number of
possible pass phrases enormously, without making them much harder to
remember. It is best to put them in unexpected places. An attacker may
guess, for example, that you replaced 'o' by '0'.

� Pass phrases in many programs, such as PGP, are case-sensitive. This means
that it is a good idea to mix upper and lower case. For example, 'computer',
comPUTer and COMPUTER would all be treated as distinct.

� If you know any words from foreign languages, you can include some in your
pass phrase.

� You can invent your own nonsense words, like the famous word 'jabberwocky'
coined by Lewis Carroll.

� You can create completely meaningless 'words' consisting of apparently
'random' characters, but which are easy to remember. For example, 'ilro'
might stand for 'I love RISC OS'.

� Bear in mind that you can use any printable ASCII characters, not just the
ones that appear on the keyboard. For example, the copyright symbol � can be
obtained by holding down the ALT key, typing 169 on the numeric keypad, and
then releasing the ALT key. Details of how to get all such characters can be
found in your computer's User Guide.

� You can disguise dictionary words by using strange and unexpected
spellings. For example, the word 'computer' can be changed to 'komputta'.

� Dictionary words can also be hidden by using extra spaces, or omitting
spaces, as in 'com puter' or 'Acorncomputer'.

� The techniques suggested above become even more effective when used in
combination. An example might be the 'word' 'MY2c0mputas@home'.

A final word of advice: Whatever you do, don't ever write down your pass
phrase or store it in any computer file. If you do, it's asking for trouble. 
Your pass phrase should exist only in your head!


00000000  43 68 6f 6f 73 69 6e 67  20 61 20 67 6f 6f 64 20  |Choosing a good |
00000010  70 61 73 73 20 70 68 72  61 73 65 20 28 43 6f 6e  |pass phrase (Con|
00000020  74 72 69 62 75 74 65 64  20 62 79 20 4e 61 74 20  |tributed by Nat |
00000030  51 75 65 65 6e 29 0a 2a  2a 2a 2a 2a 2a 2a 2a 2a  |Queen).*********|
00000040  2a 2a 2a 2a 2a 2a 2a 2a  2a 2a 2a 2a 2a 2a 2a 2a  |****************|
*
00000060  2a 2a 2a 2a 2a 2a 2a 2a  2a 2a 2a 2a 2a 0a 0a 0a  |*************...|
00000070  57 68 79 20 64 6f 20 77  65 20 73 70 65 61 6b 20  |Why do we speak |
00000080  6f 66 20 61 20 27 70 61  73 73 20 70 68 72 61 73  |of a 'pass phras|
00000090  65 27 20 69 6e 73 74 65  61 64 20 6f 66 20 61 20  |e' instead of a |
000000a0  27 70 61 73 73 77 6f 72  64 27 3f 0a 2d 2d 2d 2d  |'password'?.----|
000000b0  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |----------------|
*
000000e0  2d 2d 2d 2d 2d 2d 2d 0a  0a 57 68 65 6e 20 6d 61  |-------..When ma|
000000f0  6e 79 20 70 65 6f 70 6c  65 20 61 72 65 20 61 73  |ny people are as|
00000100  6b 65 64 20 74 6f 20 63  68 6f 6f 73 65 20 61 20  |ked to choose a |
00000110  70 61 73 73 77 6f 72 64  2c 20 74 68 65 79 20 73  |password, they s|
00000120  65 6c 65 63 74 20 73 6f  6d 65 20 63 6f 6d 6d 6f  |elect some commo|
00000130  6e 0a 77 6f 72 64 20 6f  72 20 6e 61 6d 65 2e 20  |n.word or name. |
00000140  54 68 69 73 20 63 61 6e  20 62 65 20 63 72 61 63  |This can be crac|
00000150  6b 65 64 20 65 61 73 69  6c 79 20 62 79 20 61 20  |ked easily by a |
00000160  27 64 69 63 74 69 6f 6e  61 72 79 20 61 74 74 61  |'dictionary atta|
00000170  63 6b 27 2c 20 69 2e 65  2e 20 61 0a 63 6f 6d 70  |ck', i.e. a.comp|
00000180  75 74 65 72 20 70 72 6f  67 72 61 6d 20 74 68 61  |uter program tha|
00000190  74 20 75 73 65 73 20 61  20 64 69 63 74 69 6f 6e  |t uses a diction|
000001a0  61 72 79 20 74 6f 20 74  72 79 20 61 6c 6c 20 70  |ary to try all p|
000001b0  6f 73 73 69 62 69 6c 69  74 69 65 73 2e 20 4d 61  |ossibilities. Ma|
000001c0  6e 79 20 73 75 63 68 0a  70 72 6f 67 72 61 6d 73  |ny such.programs|
000001d0  20 65 78 69 73 74 2e 20  54 68 65 79 20 61 72 65  | exist. They are|
000001e0  20 73 6f 6d 65 74 69 6d  65 73 20 75 73 65 64 20  | sometimes used |
000001f0  62 79 20 70 65 6f 70 6c  65 20 77 68 6f 20 68 61  |by people who ha|
00000200  76 65 20 66 6f 72 67 6f  74 74 65 6e 20 74 68 65  |ve forgotten the|
00000210  69 72 0a 6f 77 6e 20 70  61 73 73 77 6f 72 64 2e  |ir.own password.|
00000220  20 42 75 74 20 61 20 70  61 73 73 77 6f 72 64 20  | But a password |
00000230  74 68 61 74 20 63 61 6e  20 62 65 20 72 65 63 6f  |that can be reco|
00000240  76 65 72 65 64 20 69 6e  20 74 68 69 73 20 77 61  |vered in this wa|
00000250  79 20 69 73 20 77 65 61  6b 2e 20 49 74 0a 63 61  |y is weak. It.ca|
00000260  6e 20 62 65 20 72 65 63  6f 76 65 72 65 64 20 6a  |n be recovered j|
00000270  75 73 74 20 61 73 20 65  61 73 69 6c 79 20 62 79  |ust as easily by|
00000280  20 61 6e 79 6f 6e 65 20  65 6c 73 65 20 77 68 6f  | anyone else who|
00000290  20 6d 61 79 20 67 61 69  6e 20 61 63 63 65 73 73  | may gain access|
000002a0  20 74 6f 20 79 6f 75 72  0a 65 6e 63 72 79 70 74  | to your.encrypt|
000002b0  65 64 20 64 61 74 61 2e  0a 0a 41 20 73 6f 6d 65  |ed data...A some|
000002c0  77 68 61 74 20 73 74 72  6f 6e 67 65 72 20 74 79  |what stronger ty|
000002d0  70 65 20 6f 66 20 27 70  61 73 73 77 6f 72 64 27  |pe of 'password'|
000002e0  20 69 73 20 6f 6e 65 20  77 68 69 63 68 20 69 73  | is one which is|
000002f0  20 6e 6f 74 20 61 20 72  65 61 6c 20 77 6f 72 64  | not a real word|
00000300  2c 20 61 6e 64 0a 70 65  72 68 61 70 73 20 65 76  |, and.perhaps ev|
00000310  65 6e 20 69 6e 63 6c 75  64 65 73 20 73 6f 6d 65  |en includes some|
00000320  20 6e 75 6d 62 65 72 73  20 6f 72 20 6f 74 68 65  | numbers or othe|
00000330  72 20 73 70 65 63 69 61  6c 20 73 79 6d 62 6f 6c  |r special symbol|
00000340  73 2c 20 69 66 20 74 68  65 73 65 20 61 72 65 0a  |s, if these are.|
00000350  61 6c 6c 6f 77 65 64 20  62 79 20 74 68 65 20 73  |allowed by the s|
00000360  6f 66 74 77 61 72 65 20  74 68 61 74 20 79 6f 75  |oftware that you|
00000370  20 61 72 65 20 75 73 69  6e 67 2e 20 41 6c 74 68  | are using. Alth|
00000380  6f 75 67 68 20 74 68 69  73 20 69 73 20 73 61 66  |ough this is saf|
00000390  65 20 66 72 6f 6d 20 61  0a 63 6c 61 73 73 69 63  |e from a.classic|
000003a0  61 6c 20 64 69 63 74 69  6f 6e 61 72 79 20 61 74  |al dictionary at|
000003b0  74 61 63 6b 2c 20 69 74  20 63 61 6e 20 62 65 20  |tack, it can be |
000003c0  63 72 61 63 6b 65 64 20  62 79 20 61 20 62 72 75  |cracked by a bru|
000003d0  74 65 2d 66 6f 72 63 65  20 61 74 74 61 63 6b 2c  |te-force attack,|
000003e0  20 69 2e 65 2e 0a 61 20  70 72 6f 67 72 61 6d 20  | i.e..a program |
000003f0  74 68 61 74 20 73 69 6d  70 6c 79 20 74 72 69 65  |that simply trie|
00000400  73 20 61 6c 6c 20 70 6f  73 73 69 62 6c 65 20 73  |s all possible s|
00000410  65 74 73 20 6f 66 20 63  68 61 72 61 63 74 65 72  |ets of character|
00000420  73 20 75 6e 74 69 6c 20  69 74 20 66 69 6e 64 73  |s until it finds|
00000430  0a 74 68 65 20 72 69 67  68 74 20 63 6f 6d 62 69  |.the right combi|
00000440  6e 61 74 69 6f 6e 2e 20  4f 66 20 63 6f 75 72 73  |nation. Of cours|
00000450  65 2c 20 74 68 65 20 6c  6f 6e 67 65 72 20 74 68  |e, the longer th|
00000460  65 20 70 61 73 73 77 6f  72 64 2c 20 74 68 65 20  |e password, the |
00000470  6d 6f 72 65 0a 64 69 66  66 69 63 75 6c 74 20 73  |more.difficult s|
00000480  75 63 68 20 61 6e 20 61  74 74 61 63 6b 20 62 65  |uch an attack be|
00000490  63 6f 6d 65 73 2e 20 53  75 70 70 6f 73 65 2c 20  |comes. Suppose, |
000004a0  66 6f 72 20 65 78 61 6d  70 6c 65 2c 20 74 68 61  |for example, tha|
000004b0  74 20 35 30 20 64 69 66  66 65 72 65 6e 74 0a 63  |t 50 different.c|
000004c0  68 61 72 61 63 74 65 72  73 20 61 72 65 20 61 6c  |haracters are al|
000004d0  6c 6f 77 65 64 20 69 6e  20 74 68 65 20 70 61 73  |lowed in the pas|
000004e0  73 77 6f 72 64 2e 20 54  68 65 6e 20 69 66 20 79  |sword. Then if y|
000004f0  6f 75 20 61 64 64 20 6f  6e 65 20 65 78 74 72 61  |ou add one extra|
00000500  20 63 68 61 72 61 63 74  65 72 0a 74 6f 20 61 6e  | character.to an|
00000510  20 65 78 69 73 74 69 6e  67 20 70 61 73 73 77 6f  | existing passwo|
00000520  72 64 2c 20 61 20 62 72  75 74 65 2d 66 6f 72 63  |rd, a brute-forc|
00000530  65 20 73 65 61 72 63 68  20 66 6f 72 20 74 68 65  |e search for the|
00000540  20 63 6f 72 72 65 63 74  20 70 61 73 73 77 6f 72  | correct passwor|
00000550  64 20 77 6f 75 6c 64 0a  62 65 20 65 78 70 65 63  |d would.be expec|
00000560  74 65 64 20 74 6f 20 74  61 6b 65 20 35 30 20 74  |ted to take 50 t|
00000570  69 6d 65 73 20 61 73 20  6c 6f 6e 67 2e 0a 0a 4d  |imes as long...M|
00000580  61 6e 79 20 55 6e 69 78  20 73 79 73 74 65 6d 73  |any Unix systems|
00000590  2c 20 66 6f 72 20 65 78  61 6d 70 6c 65 2c 20 61  |, for example, a|
000005a0  63 63 65 70 74 20 6c 6f  67 6f 6e 20 70 61 73 73  |ccept logon pass|
000005b0  77 6f 72 64 73 20 6f 66  20 75 70 20 74 6f 20 65  |words of up to e|
000005c0  69 67 68 74 0a 63 68 61  72 61 63 74 65 72 73 2e  |ight.characters.|
000005d0  20 4c 6f 67 6f 6e 20 70  61 73 73 77 6f 72 64 73  | Logon passwords|
000005e0  20 66 6f 72 20 49 53 50  73 20 61 72 65 20 75 73  | for ISPs are us|
000005f0  75 61 6c 6c 79 20 73 69  6d 69 6c 61 72 2e 20 55  |ually similar. U|
00000600  6e 66 6f 72 74 75 6e 61  74 65 6c 79 2c 0a 73 75  |nfortunately,.su|
00000610  63 68 20 70 61 73 73 77  6f 72 64 73 20 61 72 65  |ch passwords are|
00000620  20 72 61 74 68 65 72 20  77 65 61 6b 20 61 6e 64  | rather weak and|
00000630  20 61 72 65 20 65 61 73  69 6c 79 20 61 74 74 61  | are easily atta|
00000640  63 6b 65 64 2e 20 59 6f  75 20 73 68 6f 75 6c 64  |cked. You should|
00000650  20 63 65 72 74 61 69 6e  6c 79 0a 75 73 65 20 6c  | certainly.use l|
00000660  6f 6e 67 65 72 20 70 61  73 73 77 6f 72 64 73 20  |onger passwords |
00000670  69 66 20 79 6f 75 72 20  73 6f 66 74 77 61 72 65  |if your software|
00000680  20 61 6c 6c 6f 77 73 20  74 68 69 73 2e 0a 0a 44  | allows this...D|
00000690  6f 63 75 6d 65 6e 74 73  20 6f 6e 20 50 47 50 20  |ocuments on PGP |
000006a0  61 6e 64 20 73 6f 6d 65  20 6f 74 68 65 72 20 65  |and some other e|
000006b0  6e 63 72 79 70 74 69 6f  6e 20 73 6f 66 74 77 61  |ncryption softwa|
000006c0  72 65 20 61 6c 77 61 79  73 20 73 70 65 61 6b 20  |re always speak |
000006d0  6f 66 20 70 61 73 73 0a  70 68 72 61 73 65 73 2c  |of pass.phrases,|
000006e0  20 72 61 74 68 65 72 20  74 68 61 6e 20 70 61 73  | rather than pas|
000006f0  73 77 6f 72 64 73 2c 20  69 6e 20 6f 72 64 65 72  |swords, in order|
00000700  20 74 6f 20 73 74 72 65  73 73 20 74 68 61 74 20  | to stress that |
00000710  74 68 65 79 20 63 61 6e  20 62 65 20 6f 66 20 61  |they can be of a|
00000720  6e 79 0a 72 65 61 73 6f  6e 61 62 6c 65 20 6c 65  |ny.reasonable le|
00000730  6e 67 74 68 2c 20 63 6f  6e 73 69 73 74 69 6e 67  |ngth, consisting|
00000740  20 6f 66 20 2a 6d 61 6e  79 2a 20 77 6f 72 64 73  | of *many* words|
00000750  20 6f 72 20 67 72 6f 75  70 73 20 6f 66 20 63 68  | or groups of ch|
00000760  61 72 61 63 74 65 72 73  2c 0a 73 65 70 61 72 61  |aracters,.separa|
00000770  74 65 64 20 28 6f 70 74  69 6f 6e 61 6c 6c 79 29  |ted (optionally)|
00000780  20 62 79 20 73 70 61 63  65 73 2e 0a 0a 48 6f 77  | by spaces...How|
00000790  20 73 74 72 6f 6e 67 20  73 68 6f 75 6c 64 20 61  | strong should a|
000007a0  20 70 61 73 73 20 70 68  72 61 73 65 20 62 65 3f  | pass phrase be?|
000007b0  0a 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |.---------------|
000007c0  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |----------------|
000007d0  2d 2d 2d 2d 0a 0a 54 68  65 20 70 61 73 73 20 70  |----..The pass p|
000007e0  68 72 61 73 65 20 69 73  20 62 79 20 66 61 72 20  |hrase is by far |
000007f0  74 68 65 20 77 65 61 6b  65 73 74 20 70 61 72 74  |the weakest part|
00000800  20 6f 66 20 6d 61 6e 79  20 63 72 79 70 74 6f 73  | of many cryptos|
00000810  79 73 74 65 6d 73 2c 20  61 74 20 6c 65 61 73 74  |ystems, at least|
00000820  0a 66 6f 72 20 6d 61 6e  79 20 75 73 65 72 73 2c  |.for many users,|
00000830  20 77 68 6f 20 75 73 65  20 61 20 77 65 61 6b 20  | who use a weak |
00000840  70 61 73 73 20 70 68 72  61 73 65 20 69 6e 20 70  |pass phrase in p|
00000850  72 61 63 74 69 63 65 2e  20 49 66 20 61 6e 20 61  |ractice. If an a|
00000860  74 74 61 63 6b 65 72 20  77 61 6e 74 73 0a 74 6f  |ttacker wants.to|
00000870  20 72 65 61 64 20 61 20  74 79 70 69 63 61 6c 20  | read a typical |
00000880  75 73 65 72 27 73 20 65  6e 63 72 79 70 74 65 64  |user's encrypted|
00000890  20 6d 65 73 73 61 67 65  73 2c 20 69 74 20 77 6f  | messages, it wo|
000008a0  75 6c 64 20 62 65 20 66  61 72 20 6d 6f 72 65 20  |uld be far more |
000008b0  65 66 66 69 63 69 65 6e  74 0a 74 6f 20 74 72 79  |efficient.to try|
000008c0  20 74 6f 20 63 72 61 63  6b 20 74 68 65 20 70 61  | to crack the pa|
000008d0  73 73 20 70 68 72 61 73  65 20 74 68 61 6e 20 74  |ss phrase than t|
000008e0  6f 20 61 74 74 65 6d 70  74 20 61 6e 79 20 72 65  |o attempt any re|
000008f0  61 6c 20 63 72 79 70 74  61 6e 61 6c 79 73 69 73  |al cryptanalysis|
00000900  2e 20 54 68 69 73 0a 69  73 20 77 68 79 20 69 74  |. This.is why it|
00000910  20 69 73 20 76 65 72 79  20 69 6d 70 6f 72 74 61  | is very importa|
00000920  6e 74 20 74 6f 20 63 68  6f 6f 73 65 20 61 20 67  |nt to choose a g|
00000930  6f 6f 64 20 70 61 73 73  20 70 68 72 61 73 65 2e  |ood pass phrase.|
00000940  0a 0a 45 76 65 6e 20 66  6f 72 20 70 6f 77 65 72  |..Even for power|
00000950  66 75 6c 20 6f 72 67 61  6e 69 73 61 74 69 6f 6e  |ful organisation|
00000960  73 20 6c 69 6b 65 20 67  6f 76 65 72 6e 6d 65 6e  |s like governmen|
00000970  74 20 61 67 65 6e 63 69  65 73 20 77 69 74 68 20  |t agencies with |
00000980  68 75 67 65 20 63 6f 6d  70 75 74 69 6e 67 0a 72  |huge computing.r|
00000990  65 73 6f 75 72 63 65 73  2c 20 69 74 20 77 6f 75  |esources, it wou|
000009a0  6c 64 20 62 65 20 6d 6f  73 74 20 63 6f 73 74 2d  |ld be most cost-|
000009b0  65 66 66 65 63 74 69 76  65 20 74 6f 20 74 72 79  |effective to try|
000009c0  20 74 6f 20 63 72 61 63  6b 20 74 68 65 20 70 61  | to crack the pa|
000009d0  73 73 20 70 68 72 61 73  65 2e 0a 49 74 20 69 73  |ss phrase..It is|
000009e0  20 6f 66 74 65 6e 20 73  61 69 64 20 74 68 61 74  | often said that|
000009f0  20 74 68 65 20 73 69 6d  70 6c 65 73 74 20 74 65  | the simplest te|
00000a00  63 68 6e 69 71 75 65 20  66 6f 72 20 67 61 69 6e  |chnique for gain|
00000a10  69 6e 67 20 61 63 63 65  73 73 20 74 6f 20 65 6e  |ing access to en|
00000a20  63 72 79 70 74 65 64 0a  64 61 74 61 20 69 73 20  |crypted.data is |
00000a30  74 68 65 20 27 72 75 62  62 65 72 2d 68 6f 73 65  |the 'rubber-hose|
00000a40  20 61 74 74 61 63 6b 27  20 28 62 65 61 74 69 6e  | attack' (beatin|
00000a50  67 20 74 68 65 20 76 69  63 74 69 6d 2c 20 6f 72  |g the victim, or|
00000a60  20 75 73 69 6e 67 20 6f  74 68 65 72 0a 6d 65 74  | using other.met|
00000a70  68 6f 64 73 20 6f 66 20  74 6f 72 74 75 72 65 2c  |hods of torture,|
00000a80  20 75 6e 74 69 6c 20 74  68 65 20 70 61 73 73 20  | until the pass |
00000a90  70 68 72 61 73 65 20 69  73 20 72 65 76 65 61 6c  |phrase is reveal|
00000aa0  65 64 29 2e 20 41 6e 6f  74 68 65 72 20 73 75 63  |ed). Another suc|
00000ab0  68 0a 74 65 63 68 6e 69  71 75 65 20 69 73 20 74  |h.technique is t|
00000ac0  6f 20 70 6c 61 6e 74 20  61 6e 20 65 6c 65 63 74  |o plant an elect|
00000ad0  72 6f 6e 69 63 20 62 75  67 20 6f 72 20 61 20 68  |ronic bug or a h|
00000ae0  69 64 64 65 6e 20 70 72  6f 67 72 61 6d 20 69 6e  |idden program in|
00000af0  20 74 68 65 20 75 73 65  72 27 73 0a 63 6f 6d 70  | the user's.comp|
00000b00  75 74 65 72 2c 20 74 6f  20 63 61 70 74 75 72 65  |uter, to capture|
00000b10  20 61 6c 6c 20 74 68 65  20 6b 65 79 73 74 72 6f  | all the keystro|
00000b20  6b 65 73 2e 20 41 6c 74  65 72 6e 61 74 69 76 65  |kes. Alternative|
00000b30  6c 79 2c 20 77 69 74 68  6f 75 74 20 65 76 65 6e  |ly, without even|
00000b40  20 61 6e 79 0a 70 68 79  73 69 63 61 6c 20 61 63  | any.physical ac|
00000b50  63 65 73 73 20 74 6f 20  61 20 63 6f 6d 70 75 74  |cess to a comput|
00000b60  65 72 20 6f 72 20 69 74  73 20 75 73 65 72 2c 20  |er or its user, |
00000b70  61 20 73 65 72 69 6f 75  73 20 61 74 74 61 63 6b  |a serious attack|
00000b80  65 72 20 63 61 6e 20 6d  6f 6e 69 74 6f 72 2c 0a  |er can monitor,.|
00000b90  66 72 6f 6d 20 61 20 64  69 73 74 61 6e 63 65 2c  |from a distance,|
00000ba0  20 74 68 65 20 65 6c 65  63 74 72 6f 6e 69 63 20  | the electronic |
00000bb0  65 6d 69 73 73 69 6f 6e  73 20 66 72 6f 6d 20 74  |emissions from t|
00000bc0  68 65 20 63 6f 6d 70 75  74 65 72 20 61 6e 64 20  |he computer and |
00000bd0  74 68 65 72 65 62 79 0a  72 65 63 6f 72 64 20 74  |thereby.record t|
00000be0  68 65 20 70 61 73 73 20  70 68 72 61 73 65 2e 20  |he pass phrase. |
00000bf0  54 68 69 73 20 69 73 20  6b 6e 6f 77 6e 20 61 73  |This is known as|
00000c00  20 61 20 27 54 65 6d 70  65 73 74 20 61 74 74 61  | a 'Tempest atta|
00000c10  63 6b 27 2e 20 49 74 27  73 20 6e 6f 74 20 65 61  |ck'. It's not ea|
00000c20  73 79 0a 74 6f 20 67 75  61 72 64 20 61 67 61 69  |sy.to guard agai|
00000c30  6e 73 74 20 61 6e 79 20  6f 66 20 74 68 65 73 65  |nst any of these|
00000c40  20 70 6f 73 73 69 62 6c  65 20 61 74 74 61 63 6b  | possible attack|
00000c50  73 2e 20 42 75 74 20 79  6f 75 20 70 72 6f 62 61  |s. But you proba|
00000c60  62 6c 79 20 64 6f 20 6e  6f 74 20 6e 65 65 64 0a  |bly do not need.|
00000c70  74 6f 20 77 6f 72 72 79  20 61 62 6f 75 74 20 74  |to worry about t|
00000c80  68 65 6d 2c 20 75 6e 6c  65 73 73 20 79 6f 75 20  |hem, unless you |
00000c90  61 72 65 20 61 20 73 65  72 69 6f 75 73 20 74 61  |are a serious ta|
00000ca0  72 67 65 74 20 6f 66 20  67 6f 76 65 72 6e 6d 65  |rget of governme|
00000cb0  6e 74 0a 69 6e 76 65 73  74 69 67 61 74 69 6f 6e  |nt.investigation|
00000cc0  73 2c 20 6f 72 20 69 66  20 79 6f 75 20 6c 69 76  |s, or if you liv|
00000cd0  65 20 75 6e 64 65 72 20  61 6e 20 6f 70 70 72 65  |e under an oppre|
00000ce0  73 73 69 76 65 20 72 65  67 69 6d 65 2e 0a 0a 49  |ssive regime...I|
00000cf0  74 20 6d 61 6b 65 73 20  73 65 6e 73 65 20 74 6f  |t makes sense to|
00000d00  20 63 68 6f 6f 73 65 20  61 20 70 61 73 73 20 70  | choose a pass p|
00000d10  68 72 61 73 65 20 77 68  69 63 68 20 69 73 20 65  |hrase which is e|
00000d20  71 75 61 6c 20 69 6e 20  73 74 72 65 6e 67 74 68  |qual in strength|
00000d30  20 74 6f 20 74 68 65 0a  63 72 79 70 74 6f 73 79  | to the.cryptosy|
00000d40  73 74 65 6d 20 62 65 69  6e 67 20 75 73 65 64 2c  |stem being used,|
00000d50  20 73 69 6e 63 65 20 61  6e 79 20 73 75 63 68 20  | since any such |
00000d60  73 79 73 74 65 6d 20 69  73 20 6f 6e 6c 79 20 61  |system is only a|
00000d70  73 20 73 74 72 6f 6e 67  20 61 73 20 69 74 73 0a  |s strong as its.|
00000d80  77 65 61 6b 65 73 74 20  6c 69 6e 6b 2e 20 54 68  |weakest link. Th|
00000d90  69 73 20 64 6f 63 75 6d  65 6e 74 20 65 78 70 6c  |is document expl|
00000da0  61 69 6e 73 20 73 6f 6d  65 20 73 69 6d 70 6c 65  |ains some simple|
00000db0  20 74 72 69 63 6b 73 20  77 68 69 63 68 20 63 61  | tricks which ca|
00000dc0  6e 20 68 65 6c 70 20 74  6f 0a 61 63 68 69 65 76  |n help to.achiev|
00000dd0  65 20 74 68 61 74 20 67  6f 61 6c 2e 0a 0a 48 6f  |e that goal...Ho|
00000de0  77 20 63 61 6e 20 49 20  63 68 6f 6f 73 65 20 61  |w can I choose a|
00000df0  20 73 74 72 6f 6e 67 20  70 61 73 73 20 70 68 72  | strong pass phr|
00000e00  61 73 65 3f 0a 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |ase?.-----------|
00000e10  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |----------------|
00000e20  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 0a 0a 49 6e 20  |-----------..In |
00000e30  67 65 6e 65 72 61 6c 20  74 65 72 6d 73 2c 20 74  |general terms, t|
00000e40  68 65 20 61 69 6d 20 73  68 6f 75 6c 64 20 62 65  |he aim should be|
00000e50  20 74 6f 20 63 72 65 61  74 65 20 61 20 70 61 73  | to create a pas|
00000e60  73 20 70 68 72 61 73 65  20 74 68 61 74 20 69 73  |s phrase that is|
00000e70  20 65 61 73 79 20 74 6f  0a 72 65 6d 65 6d 62 65  | easy to.remembe|
00000e80  72 20 61 6e 64 20 74 6f  20 74 79 70 65 20 77 68  |r and to type wh|
00000e90  65 6e 20 6e 65 65 64 65  64 2c 20 62 75 74 20 76  |en needed, but v|
00000ea0  65 72 79 20 68 61 72 64  20 66 6f 72 20 61 6e 79  |ery hard for any|
00000eb0  6f 6e 65 20 65 6c 73 65  20 74 6f 20 67 75 65 73  |one else to gues|
00000ec0  73 2c 0a 65 76 65 6e 20  66 6f 72 20 73 6f 6d 65  |s,.even for some|
00000ed0  6f 6e 65 20 77 68 6f 20  6b 6e 6f 77 73 20 79 6f  |one who knows yo|
00000ee0  75 20 77 65 6c 6c 2e 20  49 74 20 73 68 6f 75 6c  |u well. It shoul|
00000ef0  64 20 61 6c 73 6f 20 62  65 20 6c 6f 6e 67 20 65  |d also be long e|
00000f00  6e 6f 75 67 68 20 74 6f  20 6d 61 6b 65 0a 61 6e  |nough to make.an|
00000f10  79 20 64 69 63 74 69 6f  6e 61 72 79 20 61 74 74  |y dictionary att|
00000f20  61 63 6b 20 6f 72 20 62  72 75 74 65 2d 66 6f 72  |ack or brute-for|
00000f30  63 65 20 61 74 74 61 63  6b 20 69 6d 70 72 61 63  |ce attack imprac|
00000f40  74 69 63 61 6c 2e 0a 0a  4f 6e 65 20 77 65 6c 6c  |tical...One well|
00000f50  20 6b 6e 6f 77 6e 20 6d  65 74 68 6f 64 20 69 73  | known method is|
00000f60  20 74 6f 20 73 65 6c 65  63 74 2c 20 62 79 20 73  | to select, by s|
00000f70  6f 6d 65 20 72 61 6e 64  6f 6d 20 70 72 6f 63 65  |ome random proce|
00000f80  73 73 2c 20 61 20 73 65  74 20 6f 66 20 77 6f 72  |ss, a set of wor|
00000f90  64 73 0a 66 72 6f 6d 20  61 20 64 69 63 74 69 6f  |ds.from a dictio|
00000fa0  6e 61 72 79 2e 20 54 68  69 73 20 74 65 63 68 6e  |nary. This techn|
00000fb0  69 71 75 65 20 69 73 20  73 6f 6d 65 74 69 6d 65  |ique is sometime|
00000fc0  73 20 63 61 6c 6c 65 64  20 27 64 69 63 65 77 61  |s called 'dicewa|
00000fd0  72 65 27 2e 20 54 68 69  73 20 69 73 0a 77 68 61  |re'. This is.wha|
00000fe0  74 20 21 52 4e 44 70 61  73 73 20 64 6f 65 73 2e  |t !RNDpass does.|
00000ff0  0a 0a 57 69 74 68 20 61  20 64 69 63 74 69 6f 6e  |..With a diction|
00001000  61 72 79 20 61 73 20 6c  61 72 67 65 20 61 73 20  |ary as large as |
00001010  74 68 65 20 6f 6e 65 20  69 6e 63 6c 75 64 65 64  |the one included|
00001020  20 69 6e 20 21 52 4e 44  70 61 73 73 2c 20 61 20  | in !RNDpass, a |
00001030  70 61 73 73 20 70 68 72  61 73 65 0a 63 6f 6e 73  |pass phrase.cons|
00001040  69 73 74 69 6e 67 20 6f  66 20 36 20 6f 72 20 6d  |isting of 6 or m|
00001050  6f 72 65 20 72 61 6e 64  6f 6d 20 77 6f 72 64 73  |ore random words|
00001060  20 69 73 20 6c 69 6b 65  6c 79 20 74 6f 20 77 69  | is likely to wi|
00001070  74 68 73 74 61 6e 64 20  61 6e 79 20 63 6f 6e 63  |thstand any conc|
00001080  65 69 76 61 62 6c 65 0a  61 74 74 61 63 6b 2c 20  |eivable.attack, |
00001090  62 65 63 61 75 73 65 20  6f 66 20 74 68 65 20 65  |because of the e|
000010a0  6e 6f 72 6d 6f 75 73 20  6e 75 6d 62 65 72 20 6f  |normous number o|
000010b0  66 20 70 6f 73 73 69 62  6c 65 20 63 6f 6d 62 69  |f possible combi|
000010c0  6e 61 74 69 6f 6e 73 2c  20 65 73 70 65 63 69 61  |nations, especia|
000010d0  6c 6c 79 0a 69 66 20 69  74 27 73 20 6d 6f 64 69  |lly.if it's modi|
000010e0  66 69 65 64 20 69 6e 20  73 6f 6d 65 20 75 6e 70  |fied in some unp|
000010f0  72 65 64 69 63 74 61 62  6c 65 20 77 61 79 20 74  |redictable way t|
00001100  6f 20 70 72 65 76 65 6e  74 20 61 20 70 75 72 65  |o prevent a pure|
00001110  20 64 69 63 74 69 6f 6e  61 72 79 0a 61 74 74 61  | dictionary.atta|
00001120  63 6b 2e 0a 0a 53 6f 6d  65 20 73 69 6d 70 6c 65  |ck...Some simple|
00001130  20 74 69 70 73 20 66 6f  72 20 27 64 69 73 74 6f  | tips for 'disto|
00001140  72 74 69 6e 67 27 20 61  20 70 61 73 73 20 70 68  |rting' a pass ph|
00001150  72 61 73 65 20 61 72 65  20 64 65 73 63 72 69 62  |rase are describ|
00001160  65 64 20 62 65 6c 6f 77  2e 20 49 66 20 74 68 65  |ed below. If the|
00001170  79 0a 61 72 65 20 61 70  70 6c 69 65 64 20 77 69  |y.are applied wi|
00001180  74 68 20 61 20 6c 69 74  74 6c 65 20 69 6e 67 65  |th a little inge|
00001190  6e 75 69 74 79 2c 20 74  68 65 79 20 77 69 6c 6c  |nuity, they will|
000011a0  20 77 6f 72 6b 20 77 65  6c 6c 20 65 76 65 6e 20  | work well even |
000011b0  69 66 20 74 68 65 20 75  73 65 72 0a 73 74 61 72  |if the user.star|
000011c0  74 73 20 77 69 74 68 20  61 20 27 6e 6f 72 6d 61  |ts with a 'norma|
000011d0  6c 27 20 70 61 73 73 20  70 68 72 61 73 65 20 69  |l' pass phrase i|
000011e0  6e 20 70 6c 61 69 6e 20  45 6e 67 6c 69 73 68 20  |n plain English |
000011f0  28 69 6e 73 74 65 61 64  20 6f 66 20 72 61 6e 64  |(instead of rand|
00001200  6f 6d 0a 77 6f 72 64 73  2c 20 61 73 20 67 69 76  |om.words, as giv|
00001210  65 6e 20 62 79 20 21 52  4e 44 70 61 73 73 29 20  |en by !RNDpass) |
00001220  61 6e 64 20 64 69 73 74  6f 72 74 73 20 69 74 20  |and distorts it |
00001230  69 6e 20 73 75 63 68 20  61 20 77 61 79 20 74 68  |in such a way th|
00001240  61 74 20 69 74 20 62 65  63 6f 6d 65 73 0a 71 75  |at it becomes.qu|
00001250  69 74 65 20 75 6e 70 72  65 64 69 63 74 61 62 6c  |ite unpredictabl|
00001260  65 2e 0a 0a 41 20 66 65  77 20 73 70 65 63 69 61  |e...A few specia|
00001270  6c 20 6d 65 74 68 6f 64  73 20 6f 66 20 64 6f 69  |l methods of doi|
00001280  6e 67 20 74 68 69 73 20  63 61 6e 20 62 65 20 61  |ng this can be a|
00001290  75 74 6f 6d 61 74 65 64  20 69 6e 20 21 52 4e 44  |utomated in !RND|
000012a0  70 61 73 73 2c 20 61 73  20 61 6e 0a 6f 70 74 69  |pass, as an.opti|
000012b0  6f 6e 2e 20 27 52 61 6e  64 6f 6d 27 20 28 63 6f  |on. 'Random' (co|
000012c0  6d 70 75 74 65 72 2d 67  65 6e 65 72 61 74 65 64  |mputer-generated|
000012d0  29 20 64 69 73 74 6f 72  74 69 6f 6e 73 20 6f 66  |) distortions of|
000012e0  20 61 20 70 61 73 73 20  70 68 72 61 73 65 0a 63  | a pass phrase.c|
000012f0  6f 6e 73 69 73 74 69 6e  67 20 6f 66 20 6e 6f 72  |onsisting of nor|
00001300  6d 61 6c 20 77 6f 72 64  73 20 61 72 65 20 75 6e  |mal words are un|
00001310  64 6f 75 62 74 65 64 6c  79 20 6d 6f 72 65 20 73  |doubtedly more s|
00001320  65 63 75 72 65 20 74 68  61 6e 20 64 69 73 74 6f  |ecure than disto|
00001330  72 74 69 6f 6e 73 0a 61  64 64 65 64 20 62 79 20  |rtions.added by |
00001340  68 61 6e 64 20 69 6e 20  61 6e 20 69 6e 74 75 69  |hand in an intui|
00001350  74 69 76 65 20 6d 61 6e  6e 65 72 2c 20 62 75 74  |tive manner, but|
00001360  20 69 74 20 6d 61 79 20  74 61 6b 65 20 6d 6f 72  | it may take mor|
00001370  65 20 65 66 66 6f 72 74  20 74 6f 0a 72 65 6d 65  |e effort to.reme|
00001380  6d 62 65 72 20 74 68 65  6d 2e 0a 0a 48 6f 77 20  |mber them...How |
00001390  63 61 6e 20 61 20 27 6e  6f 72 6d 61 6c 27 20 70  |can a 'normal' p|
000013a0  61 73 73 20 70 68 72 61  73 65 20 62 65 20 64 69  |ass phrase be di|
000013b0  73 74 6f 72 74 65 64 20  74 6f 20 6d 61 6b 65 20  |storted to make |
000013c0  69 74 20 73 74 72 6f 6e  67 65 72 3f 0a 2d 2d 2d  |it stronger?.---|
000013d0  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 2d 2d 2d  |----------------|
*
00001400  2d 2d 2d 2d 2d 2d 2d 2d  2d 2d 2d 2d 2d 0a 0a 8f  |-------------...|
00001410  20 46 69 72 73 74 20 6f  66 20 61 6c 6c 2c 20 79  | First of all, y|
00001420  6f 75 20 6d 61 79 20 73  74 61 72 74 20 77 69 74  |ou may start wit|
00001430  68 20 65 69 74 68 65 72  20 61 20 73 65 74 20 6f  |h either a set o|
00001440  66 20 72 61 6e 64 6f 6d  20 77 6f 72 64 73 20 6c  |f random words l|
00001450  69 6b 65 20 74 68 6f 73  65 0a 67 65 6e 65 72 61  |ike those.genera|
00001460  74 65 64 20 62 79 20 21  52 4e 44 70 61 73 73 20  |ted by !RNDpass |
00001470  28 6d 6f 72 65 20 73 65  63 75 72 65 2c 20 62 75  |(more secure, bu|
00001480  74 20 68 61 72 64 65 72  20 74 6f 20 72 65 6d 65  |t harder to reme|
00001490  6d 62 65 72 29 20 6f 72  20 61 20 6d 65 61 6e 69  |mber) or a meani|
000014a0  6e 67 66 75 6c 0a 73 65  71 75 65 6e 63 65 20 6f  |ngful.sequence o|
000014b0  66 20 77 6f 72 64 73 20  28 6c 65 73 73 20 73 65  |f words (less se|
000014c0  63 75 72 65 2c 20 62 75  74 20 65 61 73 69 65 72  |cure, but easier|
000014d0  20 74 6f 20 72 65 6d 65  6d 62 65 72 29 2e 20 49  | to remember). I|
000014e0  66 20 79 6f 75 20 63 68  6f 6f 73 65 20 74 68 65  |f you choose the|
000014f0  0a 6c 61 74 74 65 72 20  61 70 70 72 6f 61 63 68  |.latter approach|
00001500  2c 20 64 6f 20 6e 6f 74  20 75 73 65 20 61 6e 79  |, do not use any|
00001510  20 66 61 6d 6f 75 73 20  71 75 6f 74 61 74 69 6f  | famous quotatio|
00001520  6e 73 2c 20 70 72 6f 76  65 72 62 73 20 6f 72 20  |ns, proverbs or |
00001530  73 61 79 69 6e 67 73 2e  20 41 6c 6c 0a 74 68 65  |sayings. All.the|
00001540  73 65 20 65 78 69 73 74  20 69 6e 20 64 69 63 74  |se exist in dict|
00001550  69 6f 6e 61 72 69 65 73  2c 20 69 6e 63 6c 75 64  |ionaries, includ|
00001560  69 6e 67 20 73 6f 6d 65  20 69 6e 20 65 6c 65 63  |ing some in elec|
00001570  74 72 6f 6e 69 63 20 66  6f 72 6d 2c 20 77 68 69  |tronic form, whi|
00001580  63 68 20 63 61 6e 20 62  65 0a 75 73 65 64 20 66  |ch can be.used f|
00001590  6f 72 20 63 72 61 63 6b  69 6e 67 20 70 75 72 70  |or cracking purp|
000015a0  6f 73 65 73 2e 20 4f 6e  65 20 70 6f 73 73 69 62  |oses. One possib|
000015b0  69 6c 69 74 79 20 77 6f  75 6c 64 20 62 65 20 74  |ility would be t|
000015c0  6f 20 73 65 6c 65 63 74  20 61 20 70 68 72 61 73  |o select a phras|
000015d0  65 20 66 72 6f 6d 0a 61  20 62 6f 6f 6b 20 61 74  |e from.a book at|
000015e0  20 72 61 6e 64 6f 6d 2c  20 70 72 65 66 65 72 61  | random, prefera|
000015f0  62 6c 79 20 61 76 6f 69  64 69 6e 67 20 61 6e 79  |bly avoiding any|
00001600  20 63 6f 6d 70 6c 65 74  65 20 73 65 6e 74 65 6e  | complete senten|
00001610  63 65 2e 20 54 72 79 20  74 6f 20 61 76 6f 69 64  |ce. Try to avoid|
00001620  0a 70 68 72 61 73 65 73  20 77 69 74 68 20 61 20  |.phrases with a |
00001630  63 6f 6e 76 65 6e 74 69  6f 6e 61 6c 2c 20 70 72  |conventional, pr|
00001640  65 64 69 63 74 61 62 6c  65 20 67 72 61 6d 6d 61  |edictable gramma|
00001650  74 69 63 61 6c 20 73 74  72 75 63 74 75 72 65 2e  |tical structure.|
00001660  20 49 66 0a 6e 65 63 65  73 73 61 72 79 2c 20 72  | If.necessary, r|
00001670  65 70 6c 61 63 65 20 73  6f 6d 65 20 77 6f 72 64  |eplace some word|
00001680  73 20 77 69 74 68 20 73  69 6c 6c 79 2c 20 75 6e  |s with silly, un|
00001690  65 78 70 65 63 74 65 64  20 77 6f 72 64 73 2e 0a  |expected words..|
000016a0  0a 8f 20 57 68 65 6e 20  27 64 69 73 74 6f 72 74  |.. When 'distort|
000016b0  69 6e 67 27 20 61 20 27  6e 6f 72 6d 61 6c 27 20  |ing' a 'normal' |
000016c0  70 61 73 73 20 70 68 72  61 73 65 2c 20 69 74 20  |pass phrase, it |
000016d0  69 73 20 62 65 73 74 20  74 6f 20 61 76 6f 69 64  |is best to avoid|
000016e0  20 74 68 65 20 75 73 65  20 6f 66 0a 6f 6e 6c 79  | the use of.only|
000016f0  20 64 69 63 74 69 6f 6e  61 72 79 20 77 6f 72 64  | dictionary word|
00001700  73 2c 20 69 6e 20 6f 72  64 65 72 20 74 6f 20 66  |s, in order to f|
00001710  6f 69 6c 20 61 6e 79 20  70 6f 73 73 69 62 6c 65  |oil any possible|
00001720  20 64 69 63 74 69 6f 6e  61 72 79 20 61 74 74 61  | dictionary atta|
00001730  63 6b 2e 0a 0a 8f 20 59  6f 75 20 63 61 6e 20 75  |ck.... You can u|
00001740  73 65 20 6e 6f 6e 2d 61  6c 70 68 61 62 65 74 69  |se non-alphabeti|
00001750  63 20 63 68 61 72 61 63  74 65 72 73 2c 20 73 75  |c characters, su|
00001760  63 68 20 61 73 20 6e 75  6d 62 65 72 73 20 6f 72  |ch as numbers or|
00001770  20 61 6e 79 20 6f 74 68  65 72 0a 73 79 6d 62 6f  | any other.symbo|
00001780  6c 73 20 6f 6e 20 79 6f  75 72 20 6b 65 79 62 6f  |ls on your keybo|
00001790  61 72 64 2e 20 54 68 65  73 65 20 63 61 6e 20 62  |ard. These can b|
000017a0  65 20 69 6e 73 65 72 74  65 64 20 69 6e 20 75 6e  |e inserted in un|
000017b0  65 78 70 65 63 74 65 64  20 70 6c 61 63 65 73 2e  |expected places.|
000017c0  20 46 6f 72 0a 65 78 61  6d 70 6c 65 2c 20 79 6f  | For.example, yo|
000017d0  75 20 63 61 6e 20 63 68  61 6e 67 65 20 74 68 65  |u can change the|
000017e0  20 77 6f 72 64 20 27 63  6f 6d 70 75 74 65 72 27  | word 'computer'|
000017f0  20 74 6f 20 27 63 30 6d  70 75 74 65 72 27 2c 20  | to 'c0mputer', |
00001800  27 39 38 25 63 6f 6d 70  75 74 65 72 27 2c 20 6f  |'98%computer', o|
00001810  72 0a 27 63 6f 6d 70 75  74 23 27 2e 20 54 68 65  |r.'comput#'. The|
00001820  20 75 73 65 20 6f 66 20  61 64 64 69 74 69 6f 6e  | use of addition|
00001830  61 6c 20 63 68 61 72 61  63 74 65 72 73 20 63 61  |al characters ca|
00001840  6e 20 69 6e 63 72 65 61  73 65 20 74 68 65 20 6e  |n increase the n|
00001850  75 6d 62 65 72 20 6f 66  0a 70 6f 73 73 69 62 6c  |umber of.possibl|
00001860  65 20 70 61 73 73 20 70  68 72 61 73 65 73 20 65  |e pass phrases e|
00001870  6e 6f 72 6d 6f 75 73 6c  79 2c 20 77 69 74 68 6f  |normously, witho|
00001880  75 74 20 6d 61 6b 69 6e  67 20 74 68 65 6d 20 6d  |ut making them m|
00001890  75 63 68 20 68 61 72 64  65 72 20 74 6f 0a 72 65  |uch harder to.re|
000018a0  6d 65 6d 62 65 72 2e 20  49 74 20 69 73 20 62 65  |member. It is be|
000018b0  73 74 20 74 6f 20 70 75  74 20 74 68 65 6d 20 69  |st to put them i|
000018c0  6e 20 75 6e 65 78 70 65  63 74 65 64 20 70 6c 61  |n unexpected pla|
000018d0  63 65 73 2e 20 41 6e 20  61 74 74 61 63 6b 65 72  |ces. An attacker|
000018e0  20 6d 61 79 0a 67 75 65  73 73 2c 20 66 6f 72 20  | may.guess, for |
000018f0  65 78 61 6d 70 6c 65 2c  20 74 68 61 74 20 79 6f  |example, that yo|
00001900  75 20 72 65 70 6c 61 63  65 64 20 27 6f 27 20 62  |u replaced 'o' b|
00001910  79 20 27 30 27 2e 0a 0a  8f 20 50 61 73 73 20 70  |y '0'.... Pass p|
00001920  68 72 61 73 65 73 20 69  6e 20 6d 61 6e 79 20 70  |hrases in many p|
00001930  72 6f 67 72 61 6d 73 2c  20 73 75 63 68 20 61 73  |rograms, such as|
00001940  20 50 47 50 2c 20 61 72  65 20 63 61 73 65 2d 73  | PGP, are case-s|
00001950  65 6e 73 69 74 69 76 65  2e 20 54 68 69 73 20 6d  |ensitive. This m|
00001960  65 61 6e 73 0a 74 68 61  74 20 69 74 20 69 73 20  |eans.that it is |
00001970  61 20 67 6f 6f 64 20 69  64 65 61 20 74 6f 20 6d  |a good idea to m|
00001980  69 78 20 75 70 70 65 72  20 61 6e 64 20 6c 6f 77  |ix upper and low|
00001990  65 72 20 63 61 73 65 2e  20 46 6f 72 20 65 78 61  |er case. For exa|
000019a0  6d 70 6c 65 2c 20 27 63  6f 6d 70 75 74 65 72 27  |mple, 'computer'|
000019b0  2c 0a 63 6f 6d 50 55 54  65 72 20 61 6e 64 20 43  |,.comPUTer and C|
000019c0  4f 4d 50 55 54 45 52 20  77 6f 75 6c 64 20 61 6c  |OMPUTER would al|
000019d0  6c 20 62 65 20 74 72 65  61 74 65 64 20 61 73 20  |l be treated as |
000019e0  64 69 73 74 69 6e 63 74  2e 0a 0a 8f 20 49 66 20  |distinct.... If |
000019f0  79 6f 75 20 6b 6e 6f 77  20 61 6e 79 20 77 6f 72  |you know any wor|
00001a00  64 73 20 66 72 6f 6d 20  66 6f 72 65 69 67 6e 20  |ds from foreign |
00001a10  6c 61 6e 67 75 61 67 65  73 2c 20 79 6f 75 20 63  |languages, you c|
00001a20  61 6e 20 69 6e 63 6c 75  64 65 20 73 6f 6d 65 20  |an include some |
00001a30  69 6e 20 79 6f 75 72 0a  70 61 73 73 20 70 68 72  |in your.pass phr|
00001a40  61 73 65 2e 0a 0a 8f 20  59 6f 75 20 63 61 6e 20  |ase.... You can |
00001a50  69 6e 76 65 6e 74 20 79  6f 75 72 20 6f 77 6e 20  |invent your own |
00001a60  6e 6f 6e 73 65 6e 73 65  20 77 6f 72 64 73 2c 20  |nonsense words, |
00001a70  6c 69 6b 65 20 74 68 65  20 66 61 6d 6f 75 73 20  |like the famous |
00001a80  77 6f 72 64 20 27 6a 61  62 62 65 72 77 6f 63 6b  |word 'jabberwock|
00001a90  79 27 0a 63 6f 69 6e 65  64 20 62 79 20 4c 65 77  |y'.coined by Lew|
00001aa0  69 73 20 43 61 72 72 6f  6c 6c 2e 0a 0a 8f 20 59  |is Carroll.... Y|
00001ab0  6f 75 20 63 61 6e 20 63  72 65 61 74 65 20 63 6f  |ou can create co|
00001ac0  6d 70 6c 65 74 65 6c 79  20 6d 65 61 6e 69 6e 67  |mpletely meaning|
00001ad0  6c 65 73 73 20 27 77 6f  72 64 73 27 20 63 6f 6e  |less 'words' con|
00001ae0  73 69 73 74 69 6e 67 20  6f 66 20 61 70 70 61 72  |sisting of appar|
00001af0  65 6e 74 6c 79 0a 27 72  61 6e 64 6f 6d 27 20 63  |ently.'random' c|
00001b00  68 61 72 61 63 74 65 72  73 2c 20 62 75 74 20 77  |haracters, but w|
00001b10  68 69 63 68 20 61 72 65  20 65 61 73 79 20 74 6f  |hich are easy to|
00001b20  20 72 65 6d 65 6d 62 65  72 2e 20 46 6f 72 20 65  | remember. For e|
00001b30  78 61 6d 70 6c 65 2c 20  27 69 6c 72 6f 27 0a 6d  |xample, 'ilro'.m|
00001b40  69 67 68 74 20 73 74 61  6e 64 20 66 6f 72 20 27  |ight stand for '|
00001b50  49 20 6c 6f 76 65 20 52  49 53 43 20 4f 53 27 2e  |I love RISC OS'.|
00001b60  0a 0a 8f 20 42 65 61 72  20 69 6e 20 6d 69 6e 64  |... Bear in mind|
00001b70  20 74 68 61 74 20 79 6f  75 20 63 61 6e 20 75 73  | that you can us|
00001b80  65 20 61 6e 79 20 70 72  69 6e 74 61 62 6c 65 20  |e any printable |
00001b90  41 53 43 49 49 20 63 68  61 72 61 63 74 65 72 73  |ASCII characters|
00001ba0  2c 20 6e 6f 74 20 6a 75  73 74 20 74 68 65 0a 6f  |, not just the.o|
00001bb0  6e 65 73 20 74 68 61 74  20 61 70 70 65 61 72 20  |nes that appear |
00001bc0  6f 6e 20 74 68 65 20 6b  65 79 62 6f 61 72 64 2e  |on the keyboard.|
00001bd0  20 46 6f 72 20 65 78 61  6d 70 6c 65 2c 20 74 68  | For example, th|
00001be0  65 20 63 6f 70 79 72 69  67 68 74 20 73 79 6d 62  |e copyright symb|
00001bf0  6f 6c 20 a9 20 63 61 6e  20 62 65 0a 6f 62 74 61  |ol . can be.obta|
00001c00  69 6e 65 64 20 62 79 20  68 6f 6c 64 69 6e 67 20  |ined by holding |
00001c10  64 6f 77 6e 20 74 68 65  20 41 4c 54 20 6b 65 79  |down the ALT key|
00001c20  2c 20 74 79 70 69 6e 67  20 31 36 39 20 6f 6e 20  |, typing 169 on |
00001c30  74 68 65 20 6e 75 6d 65  72 69 63 20 6b 65 79 70  |the numeric keyp|
00001c40  61 64 2c 20 61 6e 64 0a  74 68 65 6e 20 72 65 6c  |ad, and.then rel|
00001c50  65 61 73 69 6e 67 20 74  68 65 20 41 4c 54 20 6b  |easing the ALT k|
00001c60  65 79 2e 20 44 65 74 61  69 6c 73 20 6f 66 20 68  |ey. Details of h|
00001c70  6f 77 20 74 6f 20 67 65  74 20 61 6c 6c 20 73 75  |ow to get all su|
00001c80  63 68 20 63 68 61 72 61  63 74 65 72 73 20 63 61  |ch characters ca|
00001c90  6e 20 62 65 0a 66 6f 75  6e 64 20 69 6e 20 79 6f  |n be.found in yo|
00001ca0  75 72 20 63 6f 6d 70 75  74 65 72 27 73 20 55 73  |ur computer's Us|
00001cb0  65 72 20 47 75 69 64 65  2e 0a 0a 8f 20 59 6f 75  |er Guide.... You|
00001cc0  20 63 61 6e 20 64 69 73  67 75 69 73 65 20 64 69  | can disguise di|
00001cd0  63 74 69 6f 6e 61 72 79  20 77 6f 72 64 73 20 62  |ctionary words b|
00001ce0  79 20 75 73 69 6e 67 20  73 74 72 61 6e 67 65 20  |y using strange |
00001cf0  61 6e 64 20 75 6e 65 78  70 65 63 74 65 64 0a 73  |and unexpected.s|
00001d00  70 65 6c 6c 69 6e 67 73  2e 20 46 6f 72 20 65 78  |pellings. For ex|
00001d10  61 6d 70 6c 65 2c 20 74  68 65 20 77 6f 72 64 20  |ample, the word |
00001d20  27 63 6f 6d 70 75 74 65  72 27 20 63 61 6e 20 62  |'computer' can b|
00001d30  65 20 63 68 61 6e 67 65  64 20 74 6f 20 27 6b 6f  |e changed to 'ko|
00001d40  6d 70 75 74 74 61 27 2e  0a 0a 8f 20 44 69 63 74  |mputta'.... Dict|
00001d50  69 6f 6e 61 72 79 20 77  6f 72 64 73 20 63 61 6e  |ionary words can|
00001d60  20 61 6c 73 6f 20 62 65  20 68 69 64 64 65 6e 20  | also be hidden |
00001d70  62 79 20 75 73 69 6e 67  20 65 78 74 72 61 20 73  |by using extra s|
00001d80  70 61 63 65 73 2c 20 6f  72 20 6f 6d 69 74 74 69  |paces, or omitti|
00001d90  6e 67 0a 73 70 61 63 65  73 2c 20 61 73 20 69 6e  |ng.spaces, as in|
00001da0  20 27 63 6f 6d 20 70 75  74 65 72 27 20 6f 72 20  | 'com puter' or |
00001db0  27 41 63 6f 72 6e 63 6f  6d 70 75 74 65 72 27 2e  |'Acorncomputer'.|
00001dc0  0a 0a 8f 20 54 68 65 20  74 65 63 68 6e 69 71 75  |... The techniqu|
00001dd0  65 73 20 73 75 67 67 65  73 74 65 64 20 61 62 6f  |es suggested abo|
00001de0  76 65 20 62 65 63 6f 6d  65 20 65 76 65 6e 20 6d  |ve become even m|
00001df0  6f 72 65 20 65 66 66 65  63 74 69 76 65 20 77 68  |ore effective wh|
00001e00  65 6e 20 75 73 65 64 20  69 6e 0a 63 6f 6d 62 69  |en used in.combi|
00001e10  6e 61 74 69 6f 6e 2e 20  41 6e 20 65 78 61 6d 70  |nation. An examp|
00001e20  6c 65 20 6d 69 67 68 74  20 62 65 20 74 68 65 20  |le might be the |
00001e30  27 77 6f 72 64 27 20 27  4d 59 32 63 30 6d 70 75  |'word' 'MY2c0mpu|
00001e40  74 61 73 40 68 6f 6d 65  27 2e 0a 0a 41 20 66 69  |tas@home'...A fi|
00001e50  6e 61 6c 20 77 6f 72 64  20 6f 66 20 61 64 76 69  |nal word of advi|
00001e60  63 65 3a 20 57 68 61 74  65 76 65 72 20 79 6f 75  |ce: Whatever you|
00001e70  20 64 6f 2c 20 64 6f 6e  27 74 20 65 76 65 72 20  | do, don't ever |
00001e80  77 72 69 74 65 20 64 6f  77 6e 20 79 6f 75 72 20  |write down your |
00001e90  70 61 73 73 0a 70 68 72  61 73 65 20 6f 72 20 73  |pass.phrase or s|
00001ea0  74 6f 72 65 20 69 74 20  69 6e 20 61 6e 79 20 63  |tore it in any c|
00001eb0  6f 6d 70 75 74 65 72 20  66 69 6c 65 2e 20 49 66  |omputer file. If|
00001ec0  20 79 6f 75 20 64 6f 2c  20 69 74 27 73 20 61 73  | you do, it's as|
00001ed0  6b 69 6e 67 20 66 6f 72  20 74 72 6f 75 62 6c 65  |king for trouble|
00001ee0  2e 20 0a 59 6f 75 72 20  70 61 73 73 20 70 68 72  |. .Your pass phr|
00001ef0  61 73 65 20 73 68 6f 75  6c 64 20 65 78 69 73 74  |ase should exist|
00001f00  20 6f 6e 6c 79 20 69 6e  20 79 6f 75 72 20 68 65  | only in your he|
00001f10  61 64 21 0a 0a 0a                                 |ad!...|
00001f16