All articles

Show me your entropy and I’ll break your password

11 min. read

Stephane

Stephane

29 July, 2024

PART 2: Insights from Entropy

What information does the entropy give?

  • the resulting entropy itself
  • the size of the character set
  • the length of the password
Mask size v length >12345678
31.5849625013.1699250014.7548875026.3398500037.9248125049.50977500411.0947375112.67970001
4246810121416
62.5849625015.1699250017.75488750210.3398512.924812515.50977518.0947375120.67970001
72.8073549225.6147098448.42206476611.2294196914.0367746116.8441295319.6514844522.45883938
83691215182124
93.1699250016.3398500039.50977500412.6797000115.8496250119.0195500122.1894750125.35940001
103.3219280956.643856199.96578428513.2877123816.6096404719.9315685723.2534966626.57542476
113.4594316196.91886323710.3782948613.8377264717.2971580920.7565897124.2160213327.67545295
133.7004397187.40087943611.1013191514.8017588718.5021985922.2026383125.9030780329.60351775
143.8073549227.61470984411.4220647715.2294196919.0367746122.8441295326.6514844530.45883938
153.9068905967.81378119111.7206717915.6275623819.5344529823.4413435727.3482341731.25512476
1648121620242832

How sensitive is the password length and the character set?

We said, "Show me your entropy and I'll break your password!"

Fig. 1: The evolution of entropy of the password 123abcDEF
Fig. 1: The evolution of entropy of the password 123abcDEF
  • The 3 first characters follow the first curve
  • The second set of 3 characters are following the second curve
  • The 3 last characters are following the last curve.
  • The final entropy of the password confirms it's a 9 character long password and that it uses 62 different characters
  • There are jumps on the curve for the characters 4 and 7.
  • 3 digits
  • 3 small letters
  • 3 capital letters
  • characters 4 and 7 are characters from a new set

What could be done as an attacker if entropy is leaked?

  • abcdefgh1: the change happens on the very last character
  • abcdefg1h: the change happens on the before last character
  • 1abcdefgh: the change happens on the second character
  • a1bcdefgh: the change happens on the second character but it starts with a higher entropy
  • abcd1efgh: the change happens in the middle of the password
  • abcdefgh1: 8 x log2(26) + 1 x log2(10) = 40.93
  • abcdefg1h: 7 x log2(26) + 1 x log2(10) + 1 x log2(36) = 41.39
  • 1abcdefgh: 1 x log2(10) + 1 x log2(26) + 7 x log2(36) = 44.21
  • a1bcdefgh: 1 x log2(26) + 1 x log2(10) + 7 x log2(36) = 44.21
  • abcd1efgh: 4 x log2(26) + 1 x log2(10) + 4 x log2(36) = 42.80
  • abcdefgh1: 46.53 - 40.93 = 5.60
  • abcdefg1h:  46.53 - 41.39 = 5.14
  • 1abcdefgh and a1bcdefgh:  46.53 - 44.21 = 2.32
  • abcd1efgh:  46.53 - 42.80 = 3.73

A more realistic scenario

  • `q`: 26 new chars in the set
  • `!`: 6 new chars in the set
  • `@`: 7 new chars in the set
  • `8`: 10 new chars in the set
  • `/`: 4 new chars in the set
  • `F`: 26 new chars in the set
  • `.`: 4 new chars in the set
  • `P: 0 new char in the set  

Is it sensitive?

  1. Only the structure is known, not the password
  2. The final entropy is sky high
  3. His passbolt instance is maybe not reachable for a user to test
  4. The password is not the password to access passbolt directly but a password to decrypt an openPGP private key. You need an access to the key in order to test which password is the right one
  1. Only the structure is known, not the password
  2. The final entropy is the minimum recommended by NIST and OWASP
  3. The service is reachable
  4. The account email or username is known
  5. The "effective" entropy after knowing the structure is way under NIST and OWASP recommendation (28.49 bits against about 50 bits)

Conclusion

TL;DR;

What to do if it happened?

Some recommendations

Continue reading

New Developer Documentation is Now Available

4 min. read

New Developer Documentation is Now Available

Good news everyone! The developer documentation for the Passbolt API was updated, and it’s now better, faster, stronger.

Vivien Muller

Vivien Muller

18 October, 2024

Passbolt Partners with SUSE to Enhance Open Source Security Solutions

2 min. read

Passbolt Partners with SUSE to Enhance Open Source Security Solutions

We are pleased to announce that Passbolt is partnering with SUSE to bring enhanced security solutions to organisations that value open source software.

Passbolt team

Passbolt team

4 June, 2024

Flag of European UnionMade in Europe. Privacy by default.