Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
3. What makes a cryptographic protocol strong?
  


Passphrase, password, and key, part 2 page 2 of 10


Passwords (as opposed to passphrases) are typically rather weak and prone to a range of attacks. In the very worst of designs (which, unfortunately, are quite common), a password is simply used directly as a key. For example, an algorithm might allow for a 64-bit key, and the application designer might decide to get this 64 bits by having a user type in eight characters (using the concatenated ASCII values as the key). Much of the strength of the algorithm is likely to depend on an attacker not knowing which of the 2^64 possible keys are in use. However, the set of passphrases a person is likely to type (and remember) in eight characters is a tiny subset of all the 2^64 allowable keys. A lot of ASCII values are hard to get at through keyboard entry, and people tend to favor common words and letters in predictable patterns. This protocol is likely to be orders-of-magnitude weaker than the algorithm itself might suggest. Even if using a "seed", "whitening", or other transformation to compute the final key, people tend to use a range of passwords that will inherently limit its strength.


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact