Skip to main content

Does your password pass muster?

Not all strength meters are created equal, a Concordia study shows
March 25, 2015
|
By Cléa Desjardins


New research from Assistant Professor Mohammad Mannan and his colleagues has exposed the weakness of password strength meters. | Photo by Christian Fleury New research from Assistant Professor Mohammad Mannan and his colleagues has exposed the weakness of password strength meters. | Photo by Christian Fleury

“Create a password” is a prompt familiar to anyone who has tried to buy a book from Amazon or register for a Google account. Equally familiar is that red / yellow / green bar that rates the new password’s strength. But when those meters give the go-ahead to passwords like Password1+, their effectiveness is called into question.

New research from Concordia exposes the weakness of password strength meters and shows consumers should remain skeptical when the bar turns green.

For the study, forthcoming in the journal ACM Transactions on Information and System Security (TISSEC), researchers Mohammad Mannan and Xavier de Carné de Carnavalet sent millions of not-so-good passwords through meters used by several high-traffic web service providers including Google, Yahoo!, Dropbox, Twitter and Skype. They also tested some of the meters found in password managers, allegedly designed with the relevant expertise.

“We found the outcomes to be highly inconsistent. What was strong on one site would be weak on another,” says Mannan, who is an assistant professor with Concordia’s Institute for Information Systems Engineering.

“These weaknesses and inconsistencies may confuse users in choosing a stronger password and thus may weaken the purpose of these meters. But on the other hand, our findings may help design better meters and possibly make them an effective tool in the long run,” adds PhD student de Carnavalet.

So what can companies do? Start by emulating Dropbox, the researchers recommend. The popular file-sharing site had the most robust password strength meter — and the software is open-source.

“Dropbox’s rather simple checker is quite effective in analyzing passwords and is possibly a step towards the right direction. Any word commonly found in the dictionary will automatically be caught by the Dropbox meter and highlighted as weak,” explains Mannan. “That automatically prompts users to think beyond familiar phrases when creating passwords.”

“Some checkers are very strict and assign scores only when a given password contains at least three character sets — that is, a letter, a number and a symbol; other checkers are ok with the use of letter-only passphrases. Such a discrepancy is not explained to the user and is hardly justifiable,” says de Carnavalet.

“We’ve contacted most of the companies we examined in our study but so far our results are falling on deaf ears,” Mannan says.  One company dropped their meter while another fixed a simple bug — no other changes were observed even after a year.

For now, it’s up to individuals to ensure their passwords are strong by using full character set random passwords. Of course, remembering those passwords is easier said than done.

As an alternative, Mannan created an add-on to generate object-based passwords from private images, SelfiePass/ObPwd for Android and Firefox. But using such tools may not solve the password problem for all use cases, he cautions.

Partners in research: This study was supported in part by an NSERC Discovery Grant and FRQNT Programme établissement de nouveaux chercheurs.

Read the full study here.

 



Back to top

© Concordia University