How long does it take to crack a password in 2024?

Discussion in 'other security issues & news' started by JRViejo, May 9, 2024.

  1. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    106,590
    Location:
    U.S.A.
     
  2. Raza0007

    Raza0007 Registered Member

    Joined:
    Mar 30, 2009
    Posts:
    1,847
    Location:
    USA
    The so called researchers at Hive systems are at it again! Using scare tactics to gain cheap publicity and revenue!

    Last year they published something similar and gained widespread publicity (and no doubt revenue). They used MD5, an obsolete hashing algorithm that has been completely broken since 2008, to hash the passwords. No wonder the passwords were quickly cracked by modern everyday hardware.

    After taking a backlash, this year they upped the hashing algorithm to bcrypt, which is secure and has not yet been broken. But since they needed publicity using scare tactics, they implemented bcrypt in a very weak manner, using just 32 iterations/rounds, a work factor of just 5, which is laughable for today standards, and no one in their right mind will implement it like that. The default work factor of bcrypt is 10, i.e. 1024 iterations/rounds. However, most sensible people will implement a work factor of at least 12 (4096 rounds) or higher.

    Here are some quotes from their research
    https://www.hivesystems.com/blog/are-your-passwords-in-the-green

    There is a deliberate/accidental typo in the above paragraph. The work factor used is just 5, the number of rounds/iterations are 32. The correct number of iterations are mentioned under the graphics of the cracked passwords.


    Here is another titbit under "limitation of their work"
    Again dumbing-down a hash algorithm to make it easier to crack the passwords, and then saying that this is not how this algorithm is actually used in real life!

    .

    So what does all this mean?

    While I will certainly do not recommend using an 8 character password nowadays, but if you do have a randomly generated 8 character password, using a combination of alpha-numeric uppercase/lowercase letters and symbols, it will take a lot longer for such a password to be cracked then this research suggests, provided you use a good secure hashing algorithm with recommended settings.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.