Tagged: password generator

Create lengthy password using cryptographics hash software

If you can remember only easy to remember password then this method can help creating a strong password

For this you will require VSCryptoHash  software. Download and install it.

VSCryptoHash Download link  :  http://www.softpedia.com/get/Security/Encrypting/Calculator-of-Cryptographic-Hash.shtml

 

What you need to remember

  1. An easy password that you can remember
  2. The type of hash used : SHA-3 (512-bit)

 

DEMO

Here i have used easy to remember password : tomahawkmissile

Hash type :  SHA-3 (512-bit)

  • Select SHA-3 (512-bit) as hash type.
  • Enter the easy password in Input data as text
  • Click “calculate hash”
  • As you can see below a lengthy  “HEX Hash value (SHA3 (512)) ” has been calculated

 

CREATE A STRONG PASWORD USING CRYPTOHASH_02-05-2015_00-36-38

Now you can use this lengthy hash value as password instead of easy password “tomahawkmissle”

Lengthy password   6BC4D708E041136BE68766FDA7A8272193BBA11394AD70693A06C7CB9D327E6BD495EEE6E6B166BAF30F1EAF5C046FBB5053B26CD4FF54EA2807A22D8C020C87

this 128 character long password. So anyone trying to crash this lengthy password will fail.

 

2)  Use other hash algorithm

Instead of SHA 3 (512-bit)  you can use other hash algorithm also.

 

CREATE A STRONG PASWORD USING CRYPTOHASH MORE ALGO_04-05-2015_19-02-41

 

  • Depending on the hash algorithm you use, the output HEX hash value size will change.

 

CREATE A STRONG PASWORD USING CRYPTOHASH MORE ALGO_04-05-2015_19-02-53

 

CREATE A STRONG PASWORD USING CRYPTOHASH MORE ALGO_04-05-2015_19-03-03

 

CREATE A STRONG PASWORD USING CRYPTOHASH MORE ALGO_04-05-2015_19-03-12

 

CREATE A STRONG PASWORD USING CRYPTOHASH MORE ALGO_04-05-2015_19-03-21

 

3)  Creating lengthy password using iterating the hash

What you need to remember

  • An easy password that you can remember
  • The type of hash used : SHA-3 (512-bit)
  • The number of times you iterated

 

Demo

  • Easy to remember password : tomahawkmissle
  • Hash type :  SHA-3 (512-bit)
  • The number of times to iterate  :  4

 

Iteration number 1

  • Set Input data as text : tomahawkmissle
  • Set hash type : SHA-3 (512-bit)
  • Click “calculate hash” to create a hash value
  • Click “copy hash value” next to the HEX hash value to copy the password in clipboard

Lenghty password generated  :  6BC4D708E041136BE68766FDA7A8272193BBA11394AD70693A06C7CB9D327E6BD495EEE6E6B166BAF30F1EAF5C046FBB5053B26CD4FF54EA2807A22D8C020C87

CREATE A STRONG PASWORD USING CRYPTOHASH_02-05-2015_00-36-38

 

Iteration no. 2

  • Use the previously generated HEX hash value as “input data as text”
  • Click “Clear entered data” to clear all the data
  • Paste the copied previous HEX value in the “input data as text”
  • Click “calculate hash” to generate fourth Hex Hash Value
  • Click “copy hash value” next to the HEX hash value to copy the password in clipboard

Lenghty password generated  :  646A3BC18DA8A73B8461F52138AFC01C3F8F7300F14AC0A9273C1648113AF5807143EDA8E42C9FE870090F6B2964D6C0BEF1F9D3A56082B6DA5BC06473BC5A5D

CREATE A STRONG PASWORD USING CRYPTOHASH_02-05-2015_00-36-47

 

Iteration no. 3

  • Use the previously generated HEX hash value as “input data as text”
  • Click “Clear entered data” to clear all the data
  • Paste the copied previous HEX value in the “input data as text”
  • Click “calculate hash” to generate fourth Hex Hash Value
  • Click “copy hash value” next to the HEX hash value to copy the password in clipboard

Lenghty password generated  :    C8D0733DB68928E7EC22B2AD5298CAE27ED3FF924A4B4D4FD78554BEDE8B70CCC1392E2224408AFC4D5B5AF935584CE875F95E5B0D1A5990803C2A82A5AE54F2

CREATE A STRONG PASWORD USING CRYPTOHASH_02-05-2015_00-41-02

 

Iteration no. 4

  • Use the previously generated HEX hash value as “input data as text”
  • Click “Clear entered data” to clear all the data
  • Paste the copied previous HEX value in the “input data as text”
  • Click “calculate hash” to generate fourth Hex Hash Value
  • Click “copy hash value” next to the HEX hash value to copy the password in clipboard

Lenghty password generated  :  571AEE3F20C70360FB3CDB2A226D78ED9EC02E314187EC5E733CD15E77C92B947BF53E46E38B200589D2C941705A5FFF573EFFC53A9258A91B2B8A625CA4FFC9

CREATE A STRONG PASWORD USING CRYPTOHASH_02-05-2015_00-37-02

Now that four iterations are over, you can use the fourth HEX hash value as lengthy generated password which is 571AEE3F20C70360FB3CDB2A226D78ED9EC02E314187EC5E733CD15E77C92B947BF53E46E38B200589D2C941705A5FFF573EFFC53A9258A91B2B8A625CA4FFC9

 

 4) You can use tricks to make it even more difficult to for someone to guess the password

You may use various tricks. But just don’t forget what trick you have used or else you won’t be able to recover the lengthy password.

Use may use only part of the lengthy password

  • Example : You may use only “AE6AD23F446310D777C25300EF14BF2C7939F2505B63A4E46ED98CF498F513E274EA99E48632DB” as password instead of whole HEX hash value by cutting out “CAFA0CE29D7E5DDACAB1ED2A6A732778EED71C14CE4CD9E301” from it.

CREATE A STRONG PASWORD USING CRYPTOHASH TRICKS_04-05-2015_19-14-36

You may combine two or more algorithm

You may two or more hash algorithm to create a final lengthy password.

Do not forget the order in which you used the has algorithm

Example :  I am using two hash algorithm

  1. WHIRLPOOL
  2. SHA 3(512-bit)
  • First WHIRLPOOL (512-bit) has been used

CREATE A STRONG PASWORD USING CRYPTOHASH TRICKS_04-05-2015_19-21-27

  • Second SHA-3 (512-bit) is used
  • use the previously calculated HEX hash value as “input data as text”
  • Finally calculated HEX hash value to be used a lengthy password :    4AA94A7927B24A6D0EA0A96903E0FF8C4190A6FBE3B51965A213CEE1FC92333CD696AB3D0BF97B974F1BC17CA18170AE12EF08E6AA90D92BD8E8720A1A46F713

CREATE A STRONG PASWORD USING CRYPTOHASH TRICKS_04-05-2015_19-28-22

 

 

 

Create strong password using easy to remember phrases

http://ultrapasswordcreator.com/index.php

Ultra Password Creator Software

1. How To Make Great Passwords

UPC is for people that want to use far stronger passwords than they could ordinarily use by memory alone. UPC passwords are made by transforming memorable information a person knows to highly complex pseudo-random character strings. With a single Secret Input Phrase memorable to the user they can use exceptionally strong passwords for multiple accounts and because passwords are produced on-demand there is no need to hide, store or protect a plaintext password from an adversary.

2. SIP & The Two-Part Key

At the heart of the UPC design is a two-part key. The Secret Input Phrase (SIP) is the first part and the Password Identifier (PI) is the second part. Both parts are required to produce, or reproduce a password. The SIP can be a simple phrase or longer text up to thousands of characters in length. The most effective SIPs are those that are memorable and distinctive. The inspiration for a SIP can be from something you know or text you can refer to. The examples below suggest how creative one can be:

1. “Frozen yogurt with pecan sprinkles”

2. “5:30pm is a great time for tea”

3.”A smile :) and a wink ;-)”

4. “To be, or not to be: that is the question:
Whether ’tis nobler in the mind to suffer
The slings and arrows of outrageous fortune”

While the SIP is never stored by the application, the user has the option to save a PI associated with a particular password.

Additional SIP Rules:

SIPs must be entered the same way each time they are used. SIPs are case sensitive, punctuation sensitive and font sensitive. Manually typed SIPs will automatically have the correct font.

If text is borrowed from any public literature or popular media such as a movie or a song, it is recommended the text be modified in some way. The modification does not have to be large, perhaps adding or subtracting a comma, a period, or changing the capitalization or simply adding new text following your phrase. The objective is for your SIP not to be identical to the publicly available version. The avalanche property of the UPC engine will make the output significantly different than the original text even if the modification is small. This increases resiliance to attack by adversaries drawing on publicly available media to accelerate an attack.

To illustrate the point, below are two hypothetical 20 character passwords of two nearly identical SIPs. The only difference in the second example is the period instead of the colon as the last character. Comparing the two shows dramatically different passwords despite their SIPs being almost identical.

– “To be, or not to be: that is the question:” —> Hukqpel9HsysTfqKYYhf
– “To be, or not to be: that is the question.” —> MO7j8aamtn49QAK08AnA

Whatever modifications one makes to text drawn from published literature should be memorable.

Overall, the best SIPs are those that are unique and private and should not be information one might find by reading one’s social media profile. See below, Saving and Retrieving Parameters.

3. Making Password Identifiers

The Password Identifier (PI) is the second part of the two-part key. It is intended to be a label for each password made. Although it is not required, the UPC application provides the ability to save the PI and password length associated with each password. When this information is retrieved one only need enter their SIP to reproduce their password. Password Identifiers cannot have blank spaces nor use the character “|”. Those characters are reserved for the application.

Password Identifiers might contain dates or version numbers to identify multiple passwords used for the same account. Examples of this are:

“my_yahoo_080114”

“my_wellsfargo_v1”

If one makes PIs in this manner they can quickly identify when those passwords were made using the Retrieve function. This can be useful for those changing passwords at regular intervals or managing multiple versions of passwords for the same account.

4. Setting Password Length

One of the most effective strategies one can use to make a strong password is to increase its length. With UPC one selects password length using the rotating password length selector that ranges from 4 to 32 characters. A UPC password of length 32 has 192 bits of entropy and could take modern supercomputers up to 1.9 x 1029 years attempting to recover the password.

5. Producing Passwords

Once the inputs have been entered generating the password is done simply by pressing the Generate Password button.

Passwords produced by UPC can have upper & lower case Latin letters, numerals 0-9 and the special characters “/” and “+”. Passwords produced by UPC are deterministic. This means that UPC will always produce the same password provided the identical inputs are used. This enables one to reproduce a complex password at any time and on any device the UPC application is installed, and to do this entirely from memory.

6. Pasting Passwords Into Applications

Pressing the Generate Password button UPC automatically copies the password to the clipboard so that one can immediately paste the password into the desired application. ** As soon as the password is no longer needed one should clear all UPC parameters & the Windows clipboard by pressing the Clear Parameters button. See “Clearing The Parameter” section below. **

7. Saving & Retrieving Parameters

UPC provides the capability to save parameters used to produce a password. This feature can be convenient when one wants to quickly reproduce that password later. The parameters that can be saved are the Password Identifier and passord length. To save these parameters after a password has been generated select the File/Save Profile drop down selection. A confirmation message will be shown to confirm the save action.

To retrieve the parameters select the File/Retrieve drop down selection and the parameters will automatically be inserted into the appropriate fields. Then enter your Secret Input Phrase and press Generate Password to generate the password.

8. Clearing The Parameters **

Pressing UPC’s Clear Parameters button will reset UPC’s parameters to their default values and clear the Windows Clipboard which contains the most recent password produced. This step should be performed as soon as the password is no longer needed.

9. Password Strength (Entropy)

A useful way to view password entropy is to imagine one is looking for a needle in a haystack and to find the needle they must remove one piece of hay at a time. The entropy value represents the number of individual pieces of hay the haystack contains before the search begins. Clearly, the larger the haystack the more guesses must be made before the needle is found. The actual Password Entropy value is the number of binary digits needed to represent the number of “guesses” in base 2 format.

10. Estimating Password Survivability

Like most designs, passwords are made for a particular purpose. It can be useful to understand how the selections one makes for password length impacts password survivability. The main menu Password Strength dropdown links to an interactive website [passwordstrengthcalculator.org] that explains how the choices one makes for password length and cardinality impact survivability given the computer power adversaries can apply at this time.

UPC users can estimate survivability of a password for a brute force attack at the site. Most importantly and for your safety, no password is required to perform the calculation. UPC users calculating survivability should enter the length of a hypothetical password and select the top four checkboxes in Step 2.

11. Making Master Passwords For Password Managers

Password managers can be useful tools to store and transmit passwords to applications that support the appropriate technology. However, because password managers stores its passwords in an encrypted file, the password manager itself needs its own Master Password to administer the stored passwords. The strength of this one Master Password is critical because it is the gatekeeper to all the passwords managed by the password manager.

Ultra Password Creator is an ideal companion to password managers because it can help the PC owner create a very strong password Master Password from memory while eliminating the risk of having to save the plaintext copy in physical or digital form.

12. Using UPC Across Multiple Windows Devices

UPC’s license allows the application to be installed on as many Windows devices as one likes. To transfer saved password profile information copy the upcdata.txt file within the \My Documents\Ultra Password Creator directory of the account the application is installed to the same directory path on other PCs UPC is installed.

Create a strong password

  • Enter the “Secret input phrase”. This is easy to remember phrase and must be remembered.
  • Select Password Length. Max is 32
  • Enter password Identifier. This must be remembered
  • Click “Generate”

ULTRA PASSWORD CREATOR SCREENSHOT_23-04-2015_02-31-39

  • Password created of length 32 character

ULTRA PASSWORD CREATOR SCREENSHOT_23-04-2015_02-31-46

  • Using same “Secret Input Phrase” to create another password for yahoo.com

ULTRA PASSWORD CREATOR SCREENSHOT_23-04-2015_02-39-07

  • You may attach your username to “Password Identifier” along with the website name for which you are creating password.
  • A different password generated for yahoo.com with user name “viktik”. Thus you can generate separate password for each username of same website. All this with remembering only one “Secret Input phrase”.

ULTRA PASSWORD CREATOR SCREENSHOT_23-04-2015_02-39-26

  • Better use “Ultra Password Creator” to just create a strong master password for “password managers” like “lastpass”. Then the password manager will manage a number of strong login passwords for various websites and vaults. With this method the master password for password managers will be very strong and won’t be easy to crack. All this by just remembering easy Secret input phrase (SIP).

ULTRA PASSWORD CREATOR SCREENSHOT_23-04-2015_02-47-27

 

Create even more lengthy passwords

With simple trick you can create even more lengthy password

What you need to remember

  1. The secret phrase
  2. Password identifier

Demo

  1. The secret phrase : (CrazY*LunatiC*MooN)
  2. Password identifier : google.com

Generate a 32 character password

Password output 1 : 5IWRU5ossqx2qcN97qdnC1czAaA3suB7

[​IMG]

Use the password output no. 1 as phrase to create new password output

Password Output No. 2 : 6CdQDGA68n4M+EYjs5wxDUrUTV3kPdGY

[​IMG]

Similarly you can keep creating password outputs.

Finally concatenate all the password outputs to make a lengthy password

Final lengthy password using two password outputs : 5IWRU5ossqx2qcN97qdnC1czAaA3suB76CdQDGA68n4M+EYjs5wxDUrUTV3kPdGY

If we proceed two more times

password output no. 3 : oNWKKj6aNljXYAjzhpj8BaRaGteu10c+

[​IMG]

Password output no. 4 : IiqHOKdchU/rdlwN/Y92bbZcWKa3YQcZ

[​IMG]

Final lengthy password using all four password output : 5IWRU5ossqx2qcN97qdnC1czAaA3suB76CdQDGA68n4M+EYjs5wxDUrUTV3kPdGYoNWKKj6aNljXYAjzhpj8BaRaGteu10c+IiqHOKdchU/rdlwN/Y92bbZcWKa3YQcZ

With this method you can create lengthy password

 

Lastpass – free and secure online password manager

In today’s internet connected world we are required to use strong password as login authentication for many websites. These websites may be email, online shopping, forum or some other form of online service. These passwords must be strong which means it must be lengthy and very difficult to guess easily. At the same time people are expected to remember it and  not keep it in written anywhere. having username and password for many websites can be very difficult to remember.

So many times what people do is use same password for all websites which is not a good practice. Also difficulty to remember long and complicated password leads to a simple password. Practices like these are not good in terms of security. If you keep online shopping or online banking password simple or same as use for other website, then it can lead to severe consequences. You may lose huge sum of money if someone finds out your password.

Lastpass software is a free service that you can use to secure yourself from such misery. With Lastpass you need to create one strong master password to login to Lastpass account. For all other websites you can generate and save strong passwords in Lastpass account.

Lastpass is available as a plugin for Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and Safari.

DOWNLOAD LASTPASS

 

You should go through helpful online guide for lastpass.

https://lastpass.com/features_free.php