How secure is it to use a password hash of a common English word as a WPA2 key?
I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.
I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.
For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d
.
Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.
security wireless-networking hashing wpa md5
add a comment |
I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.
I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.
For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d
.
Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.
security wireless-networking hashing wpa md5
1
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09
add a comment |
I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.
I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.
For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d
.
Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.
security wireless-networking hashing wpa md5
I have a wireless router, and I want a difficult password that is still, in a way, easy to remember.
I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the WPA2 key.
For example, let's say that "superuser" was my word of choice. If I chose SHA-1 has my hash, I would then set up my WPA2 key to be8e67bb26b358e2ed20fe552ed6fb832f397a507d
.
Is this a secure practice? Common English words are being used--in a way--in the key, but the key itself is actually a long, complex hexadecimal string.
security wireless-networking hashing wpa md5
security wireless-networking hashing wpa md5
asked Nov 28 '09 at 0:12
James MishraJames Mishra
1285
1285
1
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09
add a comment |
1
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09
1
1
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09
add a comment |
4 Answers
4
active
oldest
votes
Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.
If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
add a comment |
It is as secure as any other key as long as you do not tell anyone.
At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.
Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
add a comment |
It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum
in the log it's not too hard to add the two together.
Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.
The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.
add a comment |
This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.
The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.
That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f76198%2fhow-secure-is-it-to-use-a-password-hash-of-a-common-english-word-as-a-wpa2-key%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
4 Answers
4
active
oldest
votes
4 Answers
4
active
oldest
votes
active
oldest
votes
active
oldest
votes
Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.
If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
add a comment |
Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.
If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
add a comment |
Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.
If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.
Unless you reveal the method of how you generated your "long WPA2" key (which you just did), it's just a complex hexadecimal string which would normally be pretty secure. On the other hand, if someone knew that you were using "a common English word" and used a hash of that word as the key, anyone could quickly regenerate a sequence of hashes from a dictionary and use it as a rainbow table to break your password pretty quickly.
If you are looking for a "difficult password that is still easy to remember" why don't you come up with a longer pass phrase that means something to you but not easily guessed by anybody else. That would render widespread rainbow tables essentially useless. Start with a phrase (i.e. sequence of words, sentence, etc), mix in a sequence of digits that means something to you (avoid birthdays, phone numbers, etc), and generate a long key that is "easy to remember" that way.
edited Jan 25 at 21:54
answered Nov 28 '09 at 0:28
Robert Cartaino♦Robert Cartaino
5,41862847
5,41862847
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
add a comment |
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
I'm with Wil & Robert on this one. A passphrase is generally more secure than a password - just the length makes guessing your phrase that much more difficult.
– DaveParillo
Nov 28 '09 at 1:14
1
1
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
I mostly agree, except for that a hash of an english word is not a random string of text. It is what it is, a hash of an English word. In other words: The proposed method doesn't enlarge key space, but it does render widespread rainbow tables useless. Given the fact that generating a rainbow table is not that easy, this is a good thing. To enlarge key space you might consider encrypting your password with a salt.
– Ludwig Weinzierl
Nov 28 '09 at 9:27
add a comment |
It is as secure as any other key as long as you do not tell anyone.
At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.
Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
add a comment |
It is as secure as any other key as long as you do not tell anyone.
At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.
Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
add a comment |
It is as secure as any other key as long as you do not tell anyone.
At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.
Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.
It is as secure as any other key as long as you do not tell anyone.
At the end of the day, your key will be using 0-9, a-f... which is actually only gives 16 possible characters instead of just a-z which would give 26. Therefore, if you think you are being smart and tell someone "I am using SHA-1", you are actually cutting down their brute force combinations by quite a few.
Personally, I think you would be a lot better off just having a normal long word/s with a mix of case, then throw in some random numbers and symbols.
answered Nov 28 '09 at 0:29
William HilsumWilliam Hilsum
108k16160253
108k16160253
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
add a comment |
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True, but I would say that 'throwing in some random numbers & symbols' don't contribute greatly to making it easier to remember. How about throwing in some non-random numbers ;-)
– DaveParillo
Nov 28 '09 at 1:16
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
True - but then again, since when is a SHA-1 key easy to remember?
– William Hilsum
Nov 28 '09 at 1:26
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
interesting point... maybe a) salt the word, b) hash with sha-256, and c) convert the result from hex (base-16) to base-26 (a..z) or even base-36 (0..9,a..z).
– quack quixote
Nov 28 '09 at 3:00
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
Personally, I think it is just best to use a long unique password such as "this_is!my.password,for2the3week_of30/11/09"... And change it every week to be slightly different... Will give you a fraction of the problems and harder to crack!
– William Hilsum
Nov 28 '09 at 3:48
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
that's not a bad method either... between the two it's somewhat a matter of individual taste. your example would certainly be easier to remember.
– quack quixote
Nov 28 '09 at 9:30
add a comment |
It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum
in the log it's not too hard to add the two together.
Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.
The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.
add a comment |
It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum
in the log it's not too hard to add the two together.
Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.
The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.
add a comment |
It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum
in the log it's not too hard to add the two together.
Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.
The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.
It is safe as long as nobody can possibly figure out the method. This of course includes bragging about it in the office, but also traces of any kind you may leave behind. As an example, if you are to connect a random user to your network, you'll probably use some kind of client-side application to generate the hash. If the random user then notices that there's an echo "superuser" | sha1sum
in the log it's not too hard to add the two together.
Seeing as you'd have to generate the hash externally, much of the convenience disappears. Generally I'd say that hashing a common word might be an acceptable way to quickly generate a semi-random key, but the key must still be copied or remembered when entering to not pose a weakness.
The only other gain I can think of is that the key/phrase/password can be easily reproduced if lost. If above security-measures are taken I see no reason not to use hashed words as keys.
answered Nov 28 '09 at 8:41
ArkenkloArkenklo
29618
29618
add a comment |
add a comment |
This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.
The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.
That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.
add a comment |
This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.
The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.
That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.
add a comment |
This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.
The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.
That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.
This is a real world example of security through obscurity. Where you assume that you are safe, or in your case, that you are safer, than users who just typed their passwords without this process.
The real problem is the false sense of security, if you use a weak password, 12345678 for example, using the SHA1 result as WPA2 password, it will result an almost impossible to crack WPA2 hash. So the users usually don't bother about the possibility of anyone be able to crack it, but soon as anyone knows your hidden secret, you hash will be cracked easily. If you properly choose a strong password, you won't have to worry, even if your secret is compromised, a good password will took much more time to be cracked than it will worth for the attacker to wait.
That will lead us to the question, is security through obscurity that bad ? IMHO yes, it is just because of the false sense of security, the same sense that automated low quality pentest tools bring when they show no vulnerabilities after a scan, or when an antivirus says that an executable is clean.
answered Sep 20 '16 at 15:25
OPSXCQOPSXCQ
1891
1891
add a comment |
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f76198%2fhow-secure-is-it-to-use-a-password-hash-of-a-common-english-word-as-a-wpa2-key%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
Not secure now that you mentioned it :)
– RCIX
Nov 28 '09 at 11:09