sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Mathematical Foundations for Estimating Cracking Time in Password Creation Methodology

Mathematical Foundations for Estimating Cracking Time in Password Creation Methodology

‣

Table of Contents:

Unlocking the Unbreakable: Turn Your Name and Birthdate into a Password Fortress!

Hello everyone, in today's article our 8th technical article I will be exploring how you can create a password from your name and birthdate that would take 300 quadrillion years to be broken using great computing power. Sit down, relax, and let's dive into this article.

Flip the Script: Mastering the Art of Remembering Criteria, Not Passwords!

In this article, I'll shift the mindset from remembering the password to remembering the criteria or methodology used to create it. We'll come up with a draft name not just your name and a date not just your birthday. It can be something like your pet's name combined with the date you first visited Paris. Using this criteria, we will create a strong password.

image

Unlocking the Secrets of Password Cracking: Brace Yourself for the Cyberstorm!

📢

Password strength checkers often consider the likelihood of cracking or brute-forcing a password. They simulate various attack methods, such as brute force attacks, which attempt all possible combinations of characters until the correct one is found. They also employ dictionary attacks, which use a predefined list of words and common variations to guess passwords. Additionally, they compare the password against a database of commonly used passwords to determine its strength. By assessing these factors, password strength checkers can provide an accurate evaluation of how secure a password is.

Crafting a Vault-Worthy Password: It's an Art and Science!

In crafting a secure password, I utilized a mix of characters, symbols, and numbers for each component. Based on the recommendations from this website

Security.org How Secure Is My Password? | Password Strength CheckerSecurity.org How Secure Is My Password? | Password Strength Checker
, I selected the optimal placement for each type of component. Check the table below to see the breakdown:

Password Complexity

Name
1st
2st
3st
4st
5st
6st
7st
8st
Numbers

2 hundred picoseconds

32 nanoseconds

3 microseconds

1 hundred microseconds

67 milliseconds

5 seconds

6 minutes

8 hours

Symbols

3 hundred picoseconds

42 nanoseconds

1 microsecond

1 hundred microseconds

67 milliseconds

5 seconds

6 minutes

8 hours

Characters

6 hundred picoseconds (small letter)

16 nanoseconds

1 microsecond

8 hundred microseconds (capital letter)

67 milliseconds

5 seconds

6 minutes

8 hours

As we see in the table above, the selection of Numbers, Symbols, and Characters was based on the most complex time to break.

In the first component, I selected the character because it takes more time to be cracked. Then, in the second section, I combined the first section character with three combinations: character-character, character-symbol, or character-number. I then selected the character-symbol combination based on the highest complexity, and so on.

Prime Time Passwords: The Ideal Moment Based on Compatibility!

By following this approach, we ensure that each position in the password is chosen to maximize its strength and complexity, making it more secure against potential attacks, checking the underline table will show us each character length and the maximum time to crack based on the upper combination, with transformation to milliseconds.

Time Conversions

Position
Time
Time in ms
1

600 picoseconds

0.0000006 ms

2

42 nanoseconds

0.000042 ms

3

3 microseconds

0.003 ms

4

800 microseconds

0.8 ms

5

67 milliseconds

67 ms

6

5 seconds

5000 ms

7

6 minutes

360000 ms

8

8 hours

28,800,000 ms

image

Top Picks: The Most Impressive 8-Character Password Ever!

We can create a password using the following pattern: character, symbol, number, character, symbol, number, and then character, symbol, check the underline password that is based on this rule:

Password Stages

Name
1st
2st
3st
4st
5st
6st
7st
8st
Password Stage 1

a

@

3

A

&

7

g

)

I asked ChatGPT to create a highly complex 8-character password, and the result was: G$3p!X8@ and 9f$Yj^2W. Both of them would take 8 hours to crack.

But what if I just duplicated the second part, making the passwords G$3p!X8@G$3p!X8@ or 9f$Yj^2W9f$Yj^2W?

That would extend the time to crack the passwords to one trillion years, as shown in the table below. This is because I followed the same approach as the previous rule, but increased the length from 8 characters to 16 characters.

Double Trouble: The Quest for the Ultimate 16-Character Password!

Password Complexity continuing on a@3A&7g)

Name
9st
10st
11st
12st
13st
14st
15st
16st
Numbers → Symbols → Characters

3 weeks

5 years

4 hundred years

34 thousand years

2 million years

2 hundred million years

15 billion years

1 trillion years

Now, let's fill in all 16 characters in a table and get an overview of the relationship between numbers, characters, and their crack time.

Password Cracker Time Complexity

Password Length
Time to Crack
1
0.0000006
2
0.000042
3
0.003
4
0.8
5
67
6
5000
7
360000
8
28,800,000
9
1814400000
10
157,788,000,000
11
12,631,040,000,000
12
1,072,954,400,000,000
13
63,115,200,000,000,000
14
6,311,520,000,000,000,000
15
473,364,000,000,000,000,000
16
31,557,600,000,000,000,000,000

Space Adventures: Supercharging Your Password with Spaces!

  • If we add a space character at the end or between the two words of the upper password a@3A&7g) a@3A&7g) or as a@3A&7g)a@3A&7g), the strength increases dramatically to 3 quadrillion years.
  • Adding 2 spaces extends the strength to 3 hundred quadrillion years.
  • Adding 3 spaces further boosts the strength to 36 quintillion years.
image

The Perfect Balance: Memorable Yet Impenetrable Passwords!

  • The key is to create a password that is easy to remember but hard to crack.
  • Use this order: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols then Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols then space.

Password Alchemy: Transforming Marlon into a Master Key!

  • Let’s start with the first part and duplicate it for the second part.
  • For example, use the number of his birth, 17.
  • A normal user might create Marlon17, which takes about 1 hour to crack.
  • Instead, we can use the same character to make a stronger password by following this order: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Space.
  • Steps to Create the Password:
    • Start with the character M from Marlon.
    • Use the symbol @ from a.
    • Use the number 1 from 17.
    • Repeat and use the character r as R.
    • Use the symbol ! from 1.
    • Use the number 7 from 17.
    • So far, we have m@1R!7.
    • Add o from Marlon.
    • Add a special character # as the last part of the first password section.
    • The final first part is m@1R!7o#.
    • The final password will be: m@1R!7o#m@1R!7o# .

Memory Magic: Effortlessly Retaining Your Password Strategy!

  • To remember the password, just recall the criteria: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols, space (CSN CSN CS)*2 + Space or we can have (CSN CSN CS) + Space + (CSN CSN CS)
image

The Ultimate OSINT Password Heist: Outsmarting Hackers with Your Unique Methodology

📢

Consider if all readers of this article create their passwords based on the guidelines provided. An attacker could examine my LinkedIn posts, check comments from people willing to try it, and gather information through OSINT (Open-Source Intelligence) about their pets, parents' names, and significant dates like certifications, work experience, and graduations. Using this information, the attacker could create a dictionary of passwords and attempt to access accounts like Gmail and LinkedIn, especially if Multi-Factor Authentication (MFA) is not enabled.

My response is that you should develop your own unique methodology for creating passwords that only you know. For instance, while writing this at 2:40 PM, I thought of a method: take the first three letters of the website you're registering on, then add @, followed by your name in reverse, then #, and any given number like 78. So, for Snapchat, the password would be sna@emos#78. Adding a space at the end would make it even more secure, potentially taking 10,000 years to crack. Creating a personal rule or methodology for password creation is a great idea, rather than trying to remember each one individually

image

DM Me !

  • Heyyy! If you have any questions or updates to change this article, please send me a DM on LinkedIn. Peace!
    linkedin.com

©sameer fakhoury

GitHubLinkedIn