home *** CD-ROM | disk | FTP | other *** search
- PINMONEY
-
- (A program to remind us about our PINs in a secure way)
-
- by L. P. Levine
-
- May 7, 1989 Version 1.00
-
- This program generates a table filled with random characters designed
- to hide up to ten passwords or PIN numbers so they can be easily found. The
- basic idea for this scheme was taken from an email posting on a security
- board, however I have lost the document and cannot credit its author. (If
- you are s/he please let me know, and I will put your name on subsequent
- postings.)
-
- Basically the program generates a listing such as the following:
-
- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z label
-
- 0 7 1 4 8 6 0 9 9 2 4 3 9 1 6 1 3 6 0 5 2 6 3 5 8 4 9 foggy
- 1 6 9 7 0 2 8 9 3 9 3 4 6 0 8 8 0 3 2 8 5 1 5 5 8 1 1 x-ray
- 2 0 7 6 3 7 2 2 3 5 6 2 5 4 7 6 0 9 1 3 6 7 6 5 7 6 9 box3
- 3 2 0 1 6 9 4 0 4 6 2 0 5 7 8 3 1 8 2 4 9 8 9 9 1 5 7 office
- 4 3 0 6 5 1 6 5 6 8 4 1 3 8 4 8 1 4 9 8 8 5 7 8 5 1 3 box4
- 5 1 0 6 7 4 1 1 1 0 6 8 7 1 1 0 6 3 9 9 3 2 2 1 1 5 5 check
- 6 0 2 9 4 5 1 4 2 9 0 1 5 9 0 7 4 5 9 1 0 9 9 3 6 1 6 bus
- 7 6 4 4 7 3 9 0 9 7 3 6 0 6 9 4 2 2 8 1 7 6 9 3 9 8 4 car
- 8 4 0 8 4 2 8 6 4 1 9 4 5 7 7 7 0 7 8 7 5 6 6 0 2 1 1 sport
- 9 8 5 9 6 0 0 4 6 8 4 6 8 8 4 0 0 2 2 1 5 8 6 0 5 3 9 key2
-
- with 260 randomly chosen digits in ten lines numbered 0 through 9 and with
- each line labeled with a randomly chosen label such as line 0 which is
- labeled "foggy". The time of day is used as a seed so your initial listing
- will be different from the above. The user is asked for a secret word con-
- sisting of more than 4 letters with no repeated letters such as the word
- "DEFAULTING". It then permits the user to change any of the ten lines by
- entering its one-digit number, change the label, and enter a password or PIN
- (Personal Identification Number) using a variety of character sets. When
- that has been done a few times the following may appear:
-
- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z label
-
- 0 2 8 7 6 5 9 6 9 2 7 1 1 2 6 1 0 8 5 3 6 5 9 4 4 4 0 pin1
- 1 9 1 4 2 9 6 4 9 3 7 3 9 6 1 4 9 8 6 7 0 1 3 5 7 9 6 pin2
- 2 N A H Z K M O K N X V W U C U F K A Q P R O Z K S M FAXkey
- 3 + m 8 4 V s q ) s t g t r * r b o o z X p M : m g l VAX
- 4 1 1 m w 3 j Z y o m j w b a t I m z v k m E n o { x unix
- 5 8 4 7 0 2 5 3 2 9 6 5 7 7 2 7 5 2 7 9 5 5 3 4 7 4 6 check
- 6 0 2 9 4 5 1 4 2 9 0 1 5 9 0 7 4 5 9 1 0 9 9 3 6 1 6 bus
- 7 6 4 4 7 3 9 0 9 7 3 6 0 6 9 4 2 2 8 1 7 6 9 3 9 8 4 car
- 8 4 0 8 4 2 8 6 4 1 9 4 5 7 7 7 0 7 8 7 5 6 6 0 2 1 1 sport
- 9 8 5 9 6 0 0 4 6 8 4 6 8 8 4 0 0 2 2 1 5 8 6 0 5 3 9 key2
-
- In this listing I have chosen to change lines 0 - 4 with lines 0 and 1 (pin1
- and pin2) randomized against just numbers [0..9], line 2 (FAXkey) against
- the set [A..Z] and lines 3 and 4 (VAX and unix) against the set
- [a..z,A..Z,0..9,(+ specials)]. If the secret word had been "DEFAULTING",
- the 4 digit code for pin1 would have been 6592 and that for pin2 2969. The
- 6 character unix password, would have been w3j1mw. (pin1 might have been
- used to store a bank vault combination for number 65 92 51 62 26.)
-
- The tabulated list can be printed and cut along suitably printed marks
- to make a wallet sheet about the size of a dollar bill. The tabulated list
- can be saved and then reloaded. (Note that only the LIST is saved, not the
- secret word so that no security is violated by that machine readable list-
- ing.) When the list has been saved, two files are actually made, one with
- a .pin extension and one with a .txt extension. The .pin file permits a
- load operation to be done, the .txt file permits word processing or emailing
- of a list.
-
- SECURITY
-
- Of course any system like this lowers the security of a password or
- PIN. However for PINs the decrease is small. For example in selected lines
- from the listing above:
-
- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z label
-
- 0 2 8 7 6 5 9 6 9 2 7 1 1 2 6 1 0 8 5 3 6 5 9 4 4 4 0 pin1
- 1 9 1 4 2 9 6 4 9 3 7 3 9 6 1 4 9 8 6 7 0 1 3 5 7 9 6 pin2
-
- no clue whatsoever can be gleaned from the raw listing. Even the knowledge
- that pin1 was 6592 would only give the clue that the first digit of pin2 was
- either a 2, 4, 1 or 0 and that the second digit was either a 9, 6 or 1, and
- so on. With 22 randomly chosen digits and 4 significant ones, each digit
- will appear randomly 2.2 times in addition to its significant appearance
- giving only a chance of about 1 in 100 of guessing pin2. (In the case above
- there are actually 108 possible choices for pin2.) Since the bank gives you
- only three chances to guess the PIN before it takes the card, this risk is
- quite low, even given that the knowledge of pin1 had been compromised. If
- pin1 has not been compromised, the risk is very near zero.
-
- For the case of computer passwords, the security problem becomes much
- more severe. Again looking at selected lines from the listing:
-
- A B C D E F G H I J K L M N O P Q R S T U V W X Y Z label
-
- 3 + m 8 4 V s q ) s t g t r * r b o o z X p M : m g l VAX
- 4 1 1 m w 3 j Z y o m j w b a t I m z v k m E n o { x unix
-
- Just the knowledge that my unix password was in line 4 would give the
- clever codebreaker a leg up on the problem that will allow a shortcut to the
- password, given the power of modern machines, and the ability to make fast
- repeated attempts. We are decreasing the potential number of characters
- from which a guesser must choose from more than 90 to less than 26. Clear-
- ly, this is no way to secure the root password on the bank's master comput-
- er. The problem is mitigated somewhat by storing the correct line buried in
- several dummy lines. (Is the password in unix or in VAX?) Putting the
- first two characters in unix, my initials in the middle, and the last two
- characters in VAX, such as w3LPL4V will increase the security significantly.
- It is still not good.
-
- DETAILS
-
- This program is submitted as freeware. Please let me know of any bugs,
- or suggested improvements. I will fix and include them as time permits.
- The program was written in Turbo Pascal version 4.
-
- Len Levine
- Department of Electrical Engineering and Computer Science
- University of Wisconsin-Milwaukee
- PO Box 785
- Milwaukee, WI 53201
-
- 3942 N. Oakland Avenue, Apt 241
- Shorewood, WI 53211
-
- len@evax.milw.wisc.edu
- (414) 229-5170 work
- (414) 962-4719 home
-
-
-
-
-
-