Using entropy for user-friendly strong passwords(planetscale.com) |
Using entropy for user-friendly strong passwords(planetscale.com) |
It was understandable at the time to come up with some system to evaluate password strength and the original scheme made what I guess could be sensible assumptions about the distribution of human generated passwords, but an actual empirical analysis of their scheme conducted on 32 million passwords demonstrated that it was basically worthless and consequently NIST has dropped their entropy calculating guidelines [2].
[1] https://cubicspot.blogspot.com/2011/11/how-to-calculate-pass...
[2] https://834e27ae-a-62cb3a1a-s-sites.googlegroups.com/site/re...
> This password has similar entropy to the above password but would fail most common password requirements.
Citation needed. I suspect that repeating the password 2-5 times is fairly common and would expect password crackers to try passwords like this.
This is the problem of entropy for passwords, it depends on your distribution in complex ways. For passwords "buxeisee" has way more entropy than "pineapple" even though they appear to draw from the same symbol set and latter is longer. "pineapplepineapple" is much better than just "pineapple" but much worse than the random 8 letters and probably still worse than "pineapplepear".