How to create secure passwords part 1: Personal Identification Number (PIN)

Google+ Pinterest LinkedIn Tumblr +

Things You’ll Need:
*a piece of paper to figure out your passwords
Step 1>  Find a phrase you like and can easily remember. In order to create our secure passwords we will use a phrase instead of a word. Words are easily found by dictionary attacks. For all of our passwords we will reuse the same phrase but just do things a little differently.  *For this article and all articles in the series I will be using “the earth was a formless void” as my phrase. For your benefit please find your own phrase rather than using this one.
Step 2>  For our Personal Identification Number we will be use our phrase in one of various methods. I will be creating only a four digit PIN for use universally. If some places you deal with allow more numbers by all means make it larger. this makes it more difficult to crack.
1. use the first letter of the first four words (TEWA) then translate them as though on the telephone. T=8, E=3, W=9 A=2 so we end up with 8392
2. use the first letter of our first four words (TEWA) then turn them into numbers by their number in the alphabet. T=20, E=5, W=23, A=1 205231 which we could remove the “31” to make it 4 digits OR
3. use the first letter of our first four words (TEWA) then turn them into numbers by their number in the alphabet. T=20, E=5, W=23, A=1 205231 Now, for best security we should remove the tens position from each letter’s numerical equivalent. This means that T=20 & W=23 but we USE T=0, E=5, W=3, A=1. This would be a slightly more secure method than either of the previous mentioned PIN methods.

Why do we do these things? This is not required reading, but you may find it interesting!
Using birthdays or social security numbers allows people who obtain our information to easily crack our PIN. Using loved ones birthdays and such tends to be nearly as easy to crack.
The first two methods I described give a more random acting number although have more limitations than the third.
Here’s why:
1. The first method uses the telephone method which, although easiest to implement, limits our number usage to 2-9! without the use of 0 or 1 we have only 4,096 possible combinations as opposed to the full spectrum of 10,000 combinations. OUR SECURITY WOULD BE COMPROMISED HALF AS EASILY!
2. The second method although more secure apparently still weakens us by placing much greater odds on the numbers 1 and 2. this is due to the fact that our alphabet only has 26 numbers which means that the numbers 1 and 2 will be used most frequently, the numbers 3,4,5, and 6 would be next. This leaves less emphasis on the numbers 7,8,9 and a neglect on the number 0, which could greatly reduce our security as well.
3. The third method has fewer limitations due to the fact it uses all 10 numbers more equally than the other two methods. Granted this method of security is not perfect, due to our use of letters to begin with, it is much easier to remember for you and much more difficult to crack for them. It’s imperfections are that some letters are more commonly used in english than others (E,A,T,O,N,R,S,L being the most common). That and the slight emphasis on numbers 1-6 and slight neglect of the number 0

Share.

About Author

Leave A Reply