The logic behind three random words, UK National Cyber Security Centre


Okay, let’s break down the UK National Cyber Security Centre (NCSC) blog post “The Logic Behind Three Random Words” and its implications, aiming for clarity and accessibility. This post, likely published on or around March 13, 2025, would be revisiting and reinforcing a strategy that has been around for some time: using a passphrase composed of several random words instead of a traditional password.

The Core Idea: Passphrases > Passwords

The central argument is that passphrases, made up of multiple random words, are significantly more secure than traditional passwords while also being easier for humans to remember. This isn’t a new concept, but the NCSC’s continued promotion of it underscores its importance.

Why Passphrases are Better (According to NCSC and general cybersecurity principles):

  1. Increased Entropy (Complexity):

  2. What it is: Entropy is a measure of the randomness and unpredictability of a password or passphrase. The higher the entropy, the harder it is for a computer to guess.

  3. Why it matters: Traditional passwords often suffer from low entropy. People tend to use easily guessable words, names, dates, or common substitutions (like replacing “a” with “@”). These are quickly cracked by automated password-cracking tools.
  4. Passphrases advantage: By stringing together several truly random words, you drastically increase the number of possible combinations. Each additional word multiplies the possible combinations exponentially. For example: * Let’s say there are 10,000 words in a list used to create passphrases (this is a simplification, the real numbers are much higher). * A 3-word passphrase has 10,000 * 10,000 * 10,000 = 1,000,000,000,000 (1 trillion) possible combinations. * A 4-word passphrase would have 10,000 * 10,000 * 10,000 * 10,000 = 10,000,000,000,000 (10 trillion) combinations.

  5. Resistance to Dictionary Attacks & Brute-Force Attacks:

  6. Dictionary Attacks: These attacks use lists of common words and phrases (dictionaries) to try and guess passwords.

  7. Brute-Force Attacks: These attacks systematically try every possible combination of characters until they find the right password.
  8. Passphrases advantage: The sheer number of combinations in a multi-word passphrase makes dictionary attacks ineffective. Brute-force attacks become computationally infeasible, even with powerful computers. A password of a similar length to a phrase might be broken quicker because the character set is much smaller.

  9. Memorability:

  10. The Problem with Complex Passwords: Many people struggle to remember complex passwords with special characters, uppercase letters, and numbers. They often resort to writing them down (a security risk) or using variations of the same password across multiple accounts (a huge risk).

  11. Passphrases advantage: While long, passphrases made of random words are often surprisingly easier to remember than a shorter, randomly generated string of characters. This is because our brains are wired to remember words and associate them. You can even create a mental image or a short story to link the words together, further improving memorability.

  12. Human-Friendly:

  13. Easier to type: While longer, they’re often easier to type accurately than a jumble of random characters, which reduces typos and frustration.

Key Recommendations (based on likely NCSC advice):

  • Number of Words: The NCSC generally recommends using at least three random words, but more is better. Four or five words provides even stronger security.
  • Word Source: The words must be truly random. Don’t pick words that are related to you, your interests, or common phrases.
  • Word Lists:
    • Ideally, use a large, publicly available word list specifically designed for passphrase generation. The EFF (Electronic Frontier Foundation) has a good one.
    • Avoid using words that are easily found in dictionaries or are common slang.
  • Random Number Generator: Use a good-quality random number generator (RNG) to select the words from the list. There are many online tools or offline programs that can do this for you.
  • Avoid Patterns: Don’t pick words that form an obvious sentence or phrase. The point is randomness, not grammatical correctness.

Example Passphrases (Good & Bad):

  • Good: “purple elephant bicycle umbrella” (random, unrelated words)
  • Good: “ostrich trombone gasoline fireplace” (random, unrelated words)
  • Bad: “My dog’s name is Spot” (easily guessable phrase)
  • Bad: “password123!” (common password pattern – avoid!)
  • Bad: “blue green yellow red” (pattern, too easily guessed)

Tools and Resources (Likely Mentioned or Implied):

  • Password Managers: Reputable password managers can generate strong, random passphrases and store them securely, so you don’t have to remember them all. This is the best option for most people.
  • Online Passphrase Generators: Many websites offer passphrase generation tools. However, be cautious about using these, especially if you don’t know the site well. Some may log the generated passphrases. Opt for offline tools whenever possible.
  • Dice: Yes, you can use physical dice and a word list to generate passphrases. This can be a fun and secure method!

Why the NCSC Keeps Promoting This:

  • Password Reuse: People still reuse passwords across multiple accounts, making them vulnerable to breaches on one site compromising other accounts. Passphrases, being easier to remember, can encourage the use of unique credentials for each service.
  • Phishing: Even with strong passwords, people can fall victim to phishing attacks. However, strong credentials at least make it harder for attackers to directly access accounts after they obtain credentials.
  • Changing Landscape: As computers get faster and password-cracking techniques become more sophisticated, it’s essential to stay ahead of the curve. Passphrases provide a robust defense against modern threats.

In Conclusion:

The NCSC’s “The Logic Behind Three Random Words” blog post, likely published around March 13, 2025, is a reminder that strong passwords are more important than ever. By embracing the simplicity and security of multi-word passphrases, individuals and organizations can significantly improve their online security posture. The key takeaway is to prioritize randomness, length, and memorability, ideally using a password manager to generate and store unique passphrases for each of your accounts.


The logic behind three random words

The AI has delivered the news.

The following question was used to generate the response from Google Gemini:

At 2025-03-13 11:50, ‘The logic behind three random words’ was published according to UK National Cyber Security Centre. Please write a detailed article with related information in an easy-to-understand manner.


35

Leave a Comment