Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Security»Passwords Vs Passphrases

    Passwords Vs Passphrases

    March 23, 2017 Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    There are technologies being developed right now that are going to improve the process of authenticating users to computer systems, from wearable devices (rings, bracelets, watches, Digital DNA, etc.) to face and voice recognition technologies fused into every mobile device and personal computer. For right now, however, we must be content with a technology that is almost 50 years old and not very secure. I’m talking about password-based authentication. We use them because they are ubiquitous to every system and or application. They are simple to implement, change, or delete. Because of these benefits, password-based authentication is going to be around for a while. Yet, with a proper policy in place, we can increase their overall security.

    Wikipedia defines passwords as a “word or string of characters used for user authentication to prove identity or access approval to gain access to a computer resource, which is to be kept secret from those not allowed access.” By letting users select a word or string of characters, we found ourselves in a classic dilemma. Security administrators are trying to secure access to their systems by implementing strong password policies (random words with lengths greater than X number of characters from at least three character sets that need to be changed frequently and cannot be reused repeatedly). These policies force users to create complicated passwords that are very difficult to remember and have the negative effect of making the users engage in a variety of bad behaviors that compromise the security of passwords (sticky notes under the keyboard) making it easier for non-authorized personnel to gain access into the systems.

    The strength of any given password is related to its length, complexity, and randomness. From these, length is the easiest to implement and is the one that has the greatest impact.

    Entropy is used in information science to measure the strength of a password and is measured in bits; the higher the bit count, the stronger the password. Let’s use the following process to create a strong password:

    • Random word from Webster’s New World College Dictionary (there are over 160,000 entries).

    • Add one digit (10 digits).

    • Add one special character (33 special characters).

    This process will generate a total of 52,800,000 (160,0001033) possible combinations, now let’s calculate the entropy bits: Log2 (160,0001033) equals 25 entropy bits. This is our baseline. Now let’s select two, three, four and five random characters from the 95 ASCII printable characters set (10 digits, 26 lower and 26 upper case letters, and 33 special characters):

    • Log2 (95*95) equals 13 bits with 9,025 combinations.

    • Log2 (959595) equals 19 bits with 857,375 combinations.

    • Log2 (959595*95) equals 26 bits with 81.4 million combinations.

    • Log2 (9595959595) equals 32 bits with 7.7 billion combinations.

    We can see that at four characters, we already surpass our baseline. In this specific example, we see that increasing length is more effective than complexity.

    Now, let’s compare how length effects a strong password versus a passphrase. For this, we are going to use an online tool at https://howsecureismypassword.net which calculates the amount of time a computer needs to execute a brute-force attack to be successful in cracking the selected password.

    As we can see, the strong password in our example (having 14 characters in length, digits, upper and lower case letters, and special characters) is very secure, but not so easy to remember. Passphrases on the other hand, are as secure — if not more — just by the fact of having more characters. They are almost impossible for hackers to crack using brute-force and rainbow table attacks, and are very difficult to guess. Passphrases satisfy security best practices and are easier to remember.

    If we want to help our users with the daily task of authenticating while also improving the security of passwords, we should look at implementing passphrases instead.

     

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Bigger Risk After a Breach Isn’t Data Loss — It’s Lawsuits

    December 11, 2025

    AI in Gaming – Cybersecurity Considerations

    December 11, 2025

    Why Is There an @ Symbol?

    December 11, 2025
    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT