RMD7AF7PGJ7G A password and passphrase are used to uniquely identify and authenticate. To this end, information is used, which serves as proof of identity and confirmed its identity as distinctive. The authenticity of the card so ends remains at most only maintained as long as the password is kept secret, that is, it is not known to third parties. The relationship between the user and password must be prepared separately and checked (for example, by the bank on the most protected from tampering by mail).
One slogan was originally a military that serves as a distinguishing word, to distinguish in the dark or with unknown friend and enemy combatants. Today is provided by soldiers at the police station or maneuvers on the question of parole. In the Middle Ages, some castle siege, it was decided by the betrayal of the solution word. <–more–> Frequent use of passwords found in the computer world held in conjunction with a user name, such as Wikipedia. Here is the password anywhere, user selected alphanumeric string.
Passwords are also used in the field of child protection (such as parental control) in order to deny children access to TV, receiver, or inappropriate program content.
Modern encryption methods are technically advanced so far that in practice except by testing all possible keys – the so-called brute-force method – can usually be broken only by a dictionary attack. The vulnerability is in both attacks, the user-selected password. This password is not less secure than the actual encryption (112 to 128-bit key with current methods), this is theoretically required for a sequence of 20 random characters. If the password does not consist of random characters, even much longer strings are required to achieve the same security.
Since the length of passwords that can be used for encryption, is limited by software often (for example, passwords bring more than 32 characters with AES no gain in security), you should always select character combinations of rare words and word order, fancy words or foreign words , first letter of a sentence, numbers and / or special characters, or combinations thereof are even better. Their constituents should be a good person and their interests on the uninformed attacker be predictable. An alternative is to use a password generator and password either is good to memorize or record at a secret location.