Netinfo Security ›› 2019, Vol. 19 ›› Issue (6): 37-44.doi: 10.3969/j.issn.1671-1122.2019.06.005
Previous Articles Next Articles
Received:
2019-03-27
Online:
2019-06-10
Published:
2020-05-11
CLC Number:
Yajun GUO, Bei YE, Wei ZHOU. Security Analysis of User Real Password under Different Password Composition Policies[J]. Netinfo Security, 2019, 19(6): 37-44.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.06.005
网站 | 口令长度要求 | 口令组成结构要求 |
---|---|---|
腾讯 | 8 ~ 16位字符 | 必须包含字母、数字和符号中的至少两种;不允许有空格 |
淘宝 | 6 ~ 20位字符 | 只能包含字母、数字及标点符号(除空格),且至少包含其中两种 |
百度 | 6 ~ 14位字符 | 支持数字、大小写字母和标点符号;不允许有空格 |
新浪微博 | 6 ~ 16位字符 | 支持数字、大小写字母和标点符号;不允许有空格 |
Tianya (天涯社区) | 至少6位数字 | 至少包含数字和字母 |
搜狐 | 8 ~ 16位字符 | 字母数字组合,可含特殊字符 |
网易 | 6 ~ 16位字符 | 区分大小写,无其他要求 |
苏宁易购 | 6 ~ 20 位字符 | 只能由字母、数字及符号组成,且必须包含其中至少两种 |
京东 | 6 ~ 20位字符 | 包含字母、数字和标点符号中的至少两种 |
搜狗 | 6 ~ 16位字符 | 可以使用字母(区分大小写)、数字、符号 |
爱奇艺 | 8 ~ 20位字符 | 使用字母、数字、符号中的至少两种 |
CSDN | 11 ~ 20位字符 | 必须包含字母和数字 |
360 | 8 ~ 20位字符 | 至少包含数字、字母及符号中的两种;不允许有空格 |
12306 | 6 ~ 20位字符 | 必须且只能包含字母、数字、下划线中的至少两种 |
Microsoft | 至少8位字符 | 至少两种字符种类 |
Github | 至少7位字符 | 至少包含数字和字母 |
至少8位字符 | 混合使用字母、数字和符号 | |
至少6位字符 | 无其他要求 |
Yahoo | Tianya | ||
---|---|---|---|
1 | 123456 : 1673 (0.38%) | lau.guillard : 3 (0.00%) | 111222tianya : 48664 (0.63%) |
2 | password : 780 (0.18%) | lilll3@aol.com : 3 (0.00%) | a123456 : 20421 (0.26%) |
3 | welcome : 437 (0.10%) | chienquifume : 3 (0.00%) | abc123 : 14853 (0.19%) |
4 | ninja : 333 (0.08%) | 64binjaipark : 3 (0.00%) | 123456a : 12158 (0.16%) |
5 | abc123 : 250 (0.06%) | Sk@P#nk32 : 3 (0.00%) | 123qwe : 8564 (0.11%) |
6 | 123456789 : 226 (0.05%) | gbcllcnov212001 : 3 (0.00%) | 1qaz2wsx : 7429 (0.10%) |
7 | 12345678 : 208 (0.05%) | F6nt0m6SS : 3 (0.00%) | 123456abc : 5687 (0.07%) |
8 | sunshine : 205 (0.05%) | ornakdie.2 : 3 (0.00%) | qq123456 : 5452 (0.07%) |
9 | princess : 202 (0.05%) | papiCygelo : 3 (0.00%) | 123abc : 5387 (0.07%) |
10 | 0 : 202 (0.05%) | Eels5model : 3 (0.00%) | *123456 : 5156 (0.06%) |
数据集 | 字符频率降序排列 |
---|---|
Yahoo | aeio1rnslt2m0cd3hub9y478gp5k6wfjvzxqASMELNRTBCD!IJPOHG@- YKUW$F_*V#ZXQ.:&+%^Space=?/~,()][`|\}{ |
aei1nrosl02tmd3cuhk947b85g6pyjfvwzxASML!@BRCTENDIPqKJGH OF$.#W*U_V-YZX&Q%+Space?/,)=(;^:’~[“]`<>\|{} | |
Tianya | 12083956a74niylhegwxsozucjqdmbtfrkp.E+vAIHLCNGYJDBFWSZ@XQMUTOKPR_-*V!#/?=$&%~`)^([]\>;:<{}|”,’ |
口令结构 | Yahoo | Tianya | |
---|---|---|---|
只包含数字 | 5.82%(25760) | 3.48%(194568) | 0.00%(0) |
只包含大写字母 | 0.40%(1779) | 0.55%(31063) | 0.00%(0) |
只包含小写字母 | 33.09%(146515) | 20.87%(1167902) | 0.00%(0) |
只包含特殊符号 | 0.00%(16) | 0.00%(198) | 0.00%(0) |
包含大小写字母 | 1.16%(5122) | 2.56%(143540) | 0.00%(0) |
包含大写字母和数字 | 0.77%(3401) | 1.31%(73057) | 3.02%(234179) |
包含大写字母和特殊符号 | 0.01%(64) | 0.04%(2508) | 0.00%(0) |
包含小写字母和数字 | 50.30%(222740) | 43.80%(2451521) | 82.33%(6382063) |
包含小写字母和特殊符号 | 0.49%(2185) | 1.32%(73684) | 0.00%(0) |
包含数字和特殊符号 | 0.04%(183) | 0.08%(4734) | 0.00%(0) |
包含大小写字母和数字 | 5.22%(23134) | 16.09%(900347) | 6.46%(500612) |
包含大小写字母和特殊符号 | 0.11%(492) | 0.66%(37201) | 0.00%(0) |
包含大写字母、数字和 特殊符号 | 0.12%(552) | 0.25%(14261) | 4.07%(315474) |
包含小写字母、数字和 特殊符号 | 1.37%(6074) | 4.43%(247935) | 3.82%(296019) |
包含所有字符类 | 1.09%(4815) | 4.55%(254780) | 0.30%(23578) |
[1] | GUAN Zhensheng.Concerning the Electronic Payment Identity Authentication Technology[J]. Netinfo Security, 2011, 11(3): 9-11. |
关振胜. 论电子支付中的身份认证技术[J].信息网络安全,2011,11(3):9-11. | |
[2] | DARWISH A A, ZAKI W M, SAAD O M, et al.Human Authenti- cation Using Face and Fingerprint Biometrics[C]//IEEE. The 2nd International Conference on Computational Intelligence, Communication Systems and Networks, July 28-30, 2010, Liverpool, UK.NJ: IEEE, 2010: 274-278. |
[3] | WANG C J.The Solution Design Using USB Key for Network Security Authentication[C]//IEEE. Fourth International Conference on Computational Intelligence and Communication Networks, November 3-5, 2012, Mathura, India.NJ: IEEE, 2012: 766-769. |
[4] | BONNEAU J, HERLEY C, VAN OORSCHOT P C, et al. Passwords and the Evolution of Imperfect Authentication[J]. Communications of the ACM, 2015, 58(7): 78-87. |
[5] | BONNEAU J, HERLEY C, VAN OORSCHOT P C, et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes[C]//IEEE. 2012 IEEE Symposium on Security and Privacy, May 20-23, 2012, San Francisco, CA, USA.NJ: IEEE, 2012: 553-567. |
[6] | UR B, NOMA F, BEES J, et al.I Added "!"at the End to Make It Secure: Observing Password Creation in the Lab[C]// USENIX. Symposium on Usable Privacy and Security, July 22-24, 2015, Ottawa, Canada. Berkeley: USENIX Association, 2015: 123-135. |
[7] | WASH R, RADER E, BERMAN R, et al.Understanding Password Choices: How Frequently Entered Passwords Are Reused Across Websites[C]//USENIX. The Twelfth Symposium on Usable Privacy and Security, June 22-24, 2016, Denver, CO, USA. Berkeley: USENIX Association, 2016: 175-188. |
[8] | KASSIM M M, SUJITHA A.ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack[C]//IEEE. 2013 International Symposium on Computational and Business Intelligence, August 24-26, 2013, New Delhi, India. NJ: IEEE, 2013: 31-34. |
[9] | DAS A, BONNEAU J, CAESAR M, et al.The Tangled Web of Password Reuse[C]//NDSS. NDSS’14, February 23-26, 2014, San Diego, CA, USA. Copyright 2014 Internet Society, 2014: 23-26. |
[10] | KOMANDURI S, SHAY R, KELLEY P G, et al.Of Passwords and People: Measuring the Effect of Password-composition Policies[C]//ACM. The SIGCHI Conference on Human Factors in Computing Systems, May 7-12, 2011, Vancouver, BC, Canada. New York: ACM, 2011: 2595-2604. |
[11] | WANG Ding, WANG Ping.The Emperor’s New Password Creation Policies[M]// Springer. Computer Security-ESORICS 2015. Cham: Springer, Cham, 2015: 456-477. |
[12] | GUO Yimin, ZHANG Zhenfeng.LPSE: Lightweight Password-strength Estimation for Password Meters[J]. Computers & Security, 2018, 77(3): 507-518. |
[13] | WHEELER D L. zxcvbn: Low-Budget Password Strength Estimation[C]//USENIX. The 25th USENIX Security Symposium, August 10-12, 2016, Austin, TX, USA. Berkeley: USENIX Association, 2016: 157-173. |
[14] | SHAY R, KOMANDURI S, KELLEY P G, et al.Encountering Stronger Password Requirements: User Attitudes and Behaviors[C]//ACM. The Sixth Symposium on Usable Privacy and Security, July 14-16, 2010, Redmond, Washington, USA . New York: ACM, 2010: 2. |
[15] | WEIR M, AGGARWAL S, COLLINS M, et al.Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords[C]//ACM. The 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA. New York: ACM, 2010: 162-175. |
[16] | PROCTOR R W, LIEN M C, VU K P L, et al. Improving Computer Security for Authentication of Users: Influence of Proactive Password Restrictions[J]. Behavior Research Methods, Instruments, & Computers, 2002, 34(2): 163-169. |
[17] | FLORÊNCIO D, HERLEY C, VAN OORSCHOT P C. An Administrator’s Guide to Internet Password `Research[C]///USENIX. The 28th USENIX Conference on Large Installation System Administration, November 9-14, 2014, Seattle, WA, USA. Berkeley: USENIX Association, 2014: 35-52. |
[18] | BURR W E, DODSON D F, NEWTON E M, et al. Electronic Authentication Guideline[EB/OL]. , 2019-2-14. |
[19] | SHAY R, KOM S, DURITY A L, et al.Can Long Passwords Be Secure and Usable?[C]//ACM. The 32nd Annual ACM Conference on Human Factors in Computing Systems, April 26-May 1, 2014, Toronto, Ontario, Canada. New York: ACM, 2014: 2927-2936. |
[20] | VU K P L, TAI B L, BHARGAV A, et al. Promoting Memorability and Security of Passwords Through Sentence Generation[J]. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2004, 48(13): 1478-1482. |
[21] | YANG Weining, LI Ninghui, CHOWDHURY O, et al.An Empirical Study of Mnemonic Sentence-based Password Generation Strategies[C]//ACM. The 2016 ACM SIGSAC Conference on Computer and Communications Security, October 24-28, 2016, Vienna, Austria . New York: ACM, 2016: 1216-1229. |
[22] | KUO C, ROMANOSKY S, CRANOR L F.Human Selection of Mnemonic Phrase-based Passwords[C]//ACM. The Second Symposium on Usable Privacy and Security, July 12-14, 2006, Pittsburgh, Pennsylvania, USA. New York: ACM, 2006: 67-78. |
[23] | YAN J, BLACKWELL A, ANDERSON R, et al.Password Memorability and Security: Empirical Results[J]. IEEE Security & Privacy, 2004, 2(5): 25-31. |
[24] | FORGET A, CHIASSON S, BIDDLE R.Helping Users Create Better Passwords: Is This the Right Approach?[C]//ACM. The 3rd Symposium on Usable Privacy and Security, July 18-20, 2007, Pittsburgh, Pennsylvania, USA. New York: ACM, 2007: 151-152. |
[25] | FORGET A, CHIASSON S, VAN OORSCHOT P C, et al. Improving Text Passwords Through Persuasion[C]//ACM. The 4th Symposium on Usable Privacy and Security, July 23-25, 2008, Pittsburgh, Pennsylvania, USA. New York: ACM, 2008: 1-12. |
[26] | HUH J H, OH S, KIM H, et al.Surpass: System-initiated User-replaceable Passwords[C]//ACM. The 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, Denver, Colorado, USA . New York: ACM, 2015: 170-181. |
[27] | SEGRETI S M, MELICHER W, KOMANDURI S, et al.Diversify to Survive: Making Passwords Stronger with Adaptive Policies[C]// USENIX. The Thirteenth Symposium on Usable Privacy and Security, July 12-14, 2017, Santa Clara, California, USA. Berkeley: USENIX Association, 2017: 1-12. |
[28] | YANG S, JI Shouling, BEYAH R.DPPG: A Dynamic Password Policy Generation System[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(3): 545-558. |
[29] | SCHECHTER S, HERLEY C, MITZENMACHER M. Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-guessing Attacks[EB/OL]. , 2019-2-14. |
[30] | LI Xiaodong, JIA Huibin.Dynamic Password Authentication System Based on Time Synchronization[J]. Netinfo Security, 2010, 10(5): 69-75. |
李晓东,贾慧斌.基于时间同步的动态口令认证系统[J].信息网络安全,2010,10(5):69-75. | |
[31] | WEIR M, AGGARWAL S, DE MEDEIROS B, et al.Password Cracking Using Probabilistic Context-free Grammars[C]//IEEE. The 30th IEEE Symposium on Security and Privacy, May 17-20, 2009, Berkeley, CA, USA. NJ: IEEE, 2009: 391-405. |
[32] | NARAYANAN A, SHMATIKOV V.Fast Dictionary Attacks on Passwords Using Time-space Tradeoff[C]//ACM. The 12th ACM conference on Computer and Communications Security, November 7-11, 2005, Alexandria, VA, USA. New York: ACM, 2005: 364-372. |
[33] | DELL’AMICO M, FILIPPONE M. Monte Carlo Strength Evaluation: Fast and Reliable Password Checking[C]//ACM. The 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, Denver, Colorado, USA. New York: ACM, 2015: 158-169. |
[34] | HABIB H, COLNAGO J, MELICHER W, et al.Password Creation in the Presence of Blacklists[C]//USEC. USEC’17, February 26, 2017, San Diego, CA, USA. Copyright 2017 Internet Society, 2017: 50-61. |
[1] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[3] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[4] | Ning LI, Bochao LI. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[5] | Xinglong ZHANG, Yuting LI, Qingfeng CHENG, Lulu GUO. A Browser Security Model for Preventing TLS Protocol Downgrade Attacks [J]. Netinfo Security, 2020, 20(3): 65-74. |
[6] | Shuilin LI, Guobang ZHU, Chunling FAN, Guangyong CHEN. Research on a New Scoring Algorithm of Testing and Evaluation for Classified Cybersecurity Protection [J]. Netinfo Security, 2020, 20(2): 1-6. |
[7] | Xiao WANG, Jun ZHAO, Jianbiao ZHANG. Research on Dynamic Monitoring Mechanism for Virtual Machine Based on Trusted Software Base [J]. Netinfo Security, 2020, 20(2): 7-13. |
[8] | Weimin LANG, Han ZHANG, Yifeng ZHAO, Jinfang YAO. A Blockchain-based Behavior Regulation and Activities Management Scheme for Internet of Things [J]. Netinfo Security, 2020, 20(2): 22-29. |
[9] | Mengmeng YAO, Li TANG, Yongxing LING, Weidong XIAO. Formal Analysis of Security Protocol Based on Strand Space [J]. Netinfo Security, 2020, 20(2): 30-36. |
[10] | Lu YU, Senlin LUO. A Method of Internal Intrusion Detection of Database in RBAC Mode [J]. Netinfo Security, 2020, 20(2): 83-90. |
[11] | Tao JING, Wei WAN. Research on a P2P Network Communication Behavior Analytical Method for Status Migration Attribute-oriented [J]. Netinfo Security, 2020, 20(1): 16-25. |
[12] | Die HU, Dongtang MA, Ming GONG, Zhao MA. A Physical Layer Security Authentication Method Based on PUF [J]. Netinfo Security, 2020, 20(1): 61-66. |
[13] | WANG Chonghua, LI Jun, CHEN Xuehong. Research on Industrial Internet Platform Security Protection [J]. Netinfo Security, 2019, 19(9): 6-10. |
[14] | ZHENG Guogang. Implementation Methods and Technical Measures for Security Inspection of Important Information Systems [J]. Netinfo Security, 2019, 19(9): 16-20. |
[15] | LI Meng. Mobile Application Security Construction of the National Medical Products Administration [J]. Netinfo Security, 2019, 19(9): 46-50. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||