How secure is it to use a password hash of a common English word as a WPA2 key?












5















I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.



I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.



For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d.



Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.










share|improve this question


















  • 1





    Not secure now that you mentioned it :)

    – RCIX
    Nov 28 '09 at 11:09
















5















I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.



I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.



For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d.



Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.










share|improve this question


















  • 1





    Not secure now that you mentioned it :)

    – RCIX
    Nov 28 '09 at 11:09














5












5








5


1






I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.



I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.



For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d.



Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.










share|improve this question














I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.



I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.



For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d.



Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.







security wireless-networking hashing wpa md5






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 28 '09 at 0:12









James MishraJames Mishra

1285




1285








  • 1





    Not secure now that you mentioned it :)

    – RCIX
    Nov 28 '09 at 11:09














  • 1





    Not secure now that you mentioned it :)

    – RCIX
    Nov 28 '09 at 11:09








1




1





Not secure now that you mentioned it :)

– RCIX
Nov 28 '09 at 11:09





Not secure now that you mentioned it :)

– RCIX
Nov 28 '09 at 11:09










4 Answers
4






active

oldest

votes


















4














Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.



If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.






share|improve this answer


























  • I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

    – DaveParillo
    Nov 28 '09 at 1:14






  • 1





    I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

    – Ludwig Weinzierl
    Nov 28 '09 at 9:27



















2














It is as secure as any other key as long as you do not tell anyone.



At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.



Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.






share|improve this answer
























  • True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

    – DaveParillo
    Nov 28 '09 at 1:16











  • True - but then again, since when is a SHA-1 key easy to remember?

    – William Hilsum
    Nov 28 '09 at 1:26











  • interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

    – quack quixote
    Nov 28 '09 at 3:00











  • Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

    – William Hilsum
    Nov 28 '09 at 3:48











  • that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

    – quack quixote
    Nov 28 '09 at 9:30



















1














It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum in the log it's not too hard to add the two together.



Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.



The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.






share|improve this answer































    0














    This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.



    The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.



    That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.






    share|improve this answer























      Your Answer








      StackExchange.ready(function() {
      var channelOptions = {
      tags: "".split(" "),
      id: "3"
      };
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function() {
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled) {
      StackExchange.using("snippets", function() {
      createEditor();
      });
      }
      else {
      createEditor();
      }
      });

      function createEditor() {
      StackExchange.prepareEditor({
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: true,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: 10,
      bindNavPrevention: true,
      postfix: "",
      imageUploader: {
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      },
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      });


      }
      });














      draft saved

      draft discarded


















      StackExchange.ready(
      function () {
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f76198%2fhow-secure-is-it-to-use-a-password-hash-of-a-common-english-word-as-a-wpa2-key%23new-answer', 'question_page');
      }
      );

      Post as a guest















      Required, but never shown

























      4 Answers
      4






      active

      oldest

      votes








      4 Answers
      4






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      4














      Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.



      If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.






      share|improve this answer


























      • I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

        – DaveParillo
        Nov 28 '09 at 1:14






      • 1





        I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

        – Ludwig Weinzierl
        Nov 28 '09 at 9:27
















      4














      Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.



      If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.






      share|improve this answer


























      • I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

        – DaveParillo
        Nov 28 '09 at 1:14






      • 1





        I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

        – Ludwig Weinzierl
        Nov 28 '09 at 9:27














      4












      4








      4







      Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.



      If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.






      share|improve this answer















      Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.



      If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.







      share|improve this answer














      share|improve this answer



      share|improve this answer








      edited Jan 25 at 21:54

























      answered Nov 28 '09 at 0:28









      Robert CartainoRobert Cartaino

      5,41862847




      5,41862847













      • I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

        – DaveParillo
        Nov 28 '09 at 1:14






      • 1





        I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

        – Ludwig Weinzierl
        Nov 28 '09 at 9:27



















      • I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

        – DaveParillo
        Nov 28 '09 at 1:14






      • 1





        I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

        – Ludwig Weinzierl
        Nov 28 '09 at 9:27

















      I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

      – DaveParillo
      Nov 28 '09 at 1:14





      I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.

      – DaveParillo
      Nov 28 '09 at 1:14




      1




      1





      I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

      – Ludwig Weinzierl
      Nov 28 '09 at 9:27





      I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.

      – Ludwig Weinzierl
      Nov 28 '09 at 9:27













      2














      It is as secure as any other key as long as you do not tell anyone.



      At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.



      Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.






      share|improve this answer
























      • True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

        – DaveParillo
        Nov 28 '09 at 1:16











      • True - but then again, since when is a SHA-1 key easy to remember?

        – William Hilsum
        Nov 28 '09 at 1:26











      • interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

        – quack quixote
        Nov 28 '09 at 3:00











      • Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

        – William Hilsum
        Nov 28 '09 at 3:48











      • that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

        – quack quixote
        Nov 28 '09 at 9:30
















      2














      It is as secure as any other key as long as you do not tell anyone.



      At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.



      Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.






      share|improve this answer
























      • True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

        – DaveParillo
        Nov 28 '09 at 1:16











      • True - but then again, since when is a SHA-1 key easy to remember?

        – William Hilsum
        Nov 28 '09 at 1:26











      • interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

        – quack quixote
        Nov 28 '09 at 3:00











      • Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

        – William Hilsum
        Nov 28 '09 at 3:48











      • that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

        – quack quixote
        Nov 28 '09 at 9:30














      2












      2








      2







      It is as secure as any other key as long as you do not tell anyone.



      At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.



      Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.






      share|improve this answer













      It is as secure as any other key as long as you do not tell anyone.



      At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.



      Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.







      share|improve this answer












      share|improve this answer



      share|improve this answer










      answered Nov 28 '09 at 0:29









      William HilsumWilliam Hilsum

      108k16160253




      108k16160253













      • True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

        – DaveParillo
        Nov 28 '09 at 1:16











      • True - but then again, since when is a SHA-1 key easy to remember?

        – William Hilsum
        Nov 28 '09 at 1:26











      • interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

        – quack quixote
        Nov 28 '09 at 3:00











      • Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

        – William Hilsum
        Nov 28 '09 at 3:48











      • that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

        – quack quixote
        Nov 28 '09 at 9:30



















      • True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

        – DaveParillo
        Nov 28 '09 at 1:16











      • True - but then again, since when is a SHA-1 key easy to remember?

        – William Hilsum
        Nov 28 '09 at 1:26











      • interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

        – quack quixote
        Nov 28 '09 at 3:00











      • Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

        – William Hilsum
        Nov 28 '09 at 3:48











      • that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

        – quack quixote
        Nov 28 '09 at 9:30

















      True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

      – DaveParillo
      Nov 28 '09 at 1:16





      True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)

      – DaveParillo
      Nov 28 '09 at 1:16













      True - but then again, since when is a SHA-1 key easy to remember?

      – William Hilsum
      Nov 28 '09 at 1:26





      True - but then again, since when is a SHA-1 key easy to remember?

      – William Hilsum
      Nov 28 '09 at 1:26













      interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

      – quack quixote
      Nov 28 '09 at 3:00





      interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).

      – quack quixote
      Nov 28 '09 at 3:00













      Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

      – William Hilsum
      Nov 28 '09 at 3:48





      Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!

      – William Hilsum
      Nov 28 '09 at 3:48













      that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

      – quack quixote
      Nov 28 '09 at 9:30





      that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.

      – quack quixote
      Nov 28 '09 at 9:30











      1














      It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum in the log it's not too hard to add the two together.



      Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.



      The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.






      share|improve this answer




























        1














        It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum in the log it's not too hard to add the two together.



        Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.



        The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.






        share|improve this answer


























          1












          1








          1







          It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum in the log it's not too hard to add the two together.



          Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.



          The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.






          share|improve this answer













          It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum in the log it's not too hard to add the two together.



          Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.



          The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Nov 28 '09 at 8:41









          ArkenkloArkenklo

          29618




          29618























              0














              This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.



              The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.



              That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.






              share|improve this answer




























                0














                This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.



                The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.



                That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.






                share|improve this answer


























                  0












                  0








                  0







                  This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.



                  The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.



                  That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.






                  share|improve this answer













                  This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.



                  The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.



                  That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Sep 20 '16 at 15:25









                  OPSXCQOPSXCQ

                  1891




                  1891






























                      draft saved

                      draft discarded




















































                      Thanks for contributing an answer to Super User!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid



                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.


                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function () {
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f76198%2fhow-secure-is-it-to-use-a-password-hash-of-a-common-english-word-as-a-wpa2-key%23new-answer', 'question_page');
                      }
                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown







                      Popular posts from this blog

                      How to make a Squid Proxy server?

                      Is this a new Fibonacci Identity?

                      19世紀