Introduction
Creating and managing passwords is familiar to most of us. We use passwords on computing devices every day. To access social media accounts, check the balance on online banking apps, or send an email, individuals must authenticate themselves, often by logging into a computer system with a username and password. Password creation and management practices require knowledge that may seem commonsensical. Yet common sense about passwords and security is often misleading nonsense. Many people hold incorrect beliefs about what makes a password secure, the nature and origin of security threats, and what practices compromise or conversely strengthen security. Substantial research has shown that user-chosen passwords are highly predictable and follow similar patterns; individuals create weak passwords based on memorability rather than on secureness, reuse passwords, and often use personal information in passwords that is easily discovered or guessed. Yet, less research has been done to understand the origins and persistence of common nonsense about password security. Several research questions arise: What beliefs do users have about creating secure passwords, security threats, and best practices? Where do these beliefs come from? Do users realize that they are selecting easily guessable passwords, and if so, is this intentional? Do users believe that the passwords they create are secure? Are users more focused on convenience and memorability than security? Are individuals aware of password security risks? Do individuals not understand these risks or do individuals understand the risks and create weak passwords anyway?

Figure 5.1 Visual themes from common nonsense about password security and the expert–layperson knowledge gap.
While the gap between lay and expert knowledge about password security is well documented, less well understood are why the gap persists and what are the origins of incorrect beliefs and misguided security practices. In this paper, we examine the gap and identify knowledge governance dilemmas that help explain its persistence. We use the Governing Knowledge Commons (GKC) framework to structure our study and frame the sets of conceptual and empirical questions we investigate. The security knowledge ecosystem is complex. We focus on password security.
We initially framed our study in terms of two knowledge communities – lay persons and security experts, but we learned during interviews with experts that a better structure would differentiate and explore the interactions between three communities – lay persons, professionals/practitioners, and experts. Notably, it may be a stretch to describe lay persons and professionals/practitioners as communities. Actors in these classifications are members of various communities within which password security knowledge is shared and acted upon, but unlike the password security expert community, these various communities are not organized around or otherwise focused on password security knowledge. More important than community definitions, at least for purposes of this study, are the relationships, interactions, knowledge flows, and governance dilemmas among lay persons, professionals/practitioners, and experts.
We employed two primary methods: (i) a systematic literature review to gather information about password security, password behaviors, expert knowledge on passwords, and lay knowledge about passwords; and (ii) semi-structured interviews of password security experts to supplement the findings from the literature review and gain first-hand information and perspectives. We briefly describe each and provide more detail and data in an Appendix available via the GKC repository (an open data portal).Footnote 1
Our literature review involved five steps. First, we collected peer review publications, focusing on research articles and user studies. We searched major research databases, including Google Scholar, Science Direct, ACM, and Springer Link. Keywords included variations of password, user security perceptions, password creation behaviors, and password security awareness methods. Second, we screened research articles by assessing if the title, abstract, and full article matched the relevant subject matter. We also ensured that the research literature met five inclusion criteria.Footnote 2 Third, we identified additional publications by examining references of all the articles we had included and repeating the second step. Fourth, we identified additional articles through suggestions by experts during interviews and by drawing from the publication pages of experts we interviewed. The resulting sample size is ninety-seven articles. (N=97). Fifth, we qualitatively analyzed the research literature using both the GCK framework and a basic set of research questions regarding password security beliefs and practices.Footnote 3
After protocol review by the Villanova University IRB, we conducted eight semi-structured interviews with professionals directly involved in password security and/or usability.Footnote 4 We used the systematic literature review and the GKC framework to provide structure and generate interview questions.Footnote 5 We recorded, transcribed, analyzed, and summarized each of the interviews. Then, once all interviews were completed, we reviewed the transcripts again. We summarize the results of our qualitative analysis of the literature and interviews below.
Background: Passwords and Security
Basic Overview
Passwords have become a recurring aspect of everyday life in our digital networked world because of the many different devices and online accounts we use daily that require authentication. A 2020 study by Nordpass, a password manager website created by Nord Security, revealed that the average user has around 100 passwords, a 25 percent increase from 2019 (Bobba & Paruchuri 2022).
Passwords are also familiar to most people because of their offline use in other social contexts, for example, as a signal of membership in a club. Passwords take many forms and have a long history. People learn about passwords not only in practice but also in literature. One of our favorite examples, described by Martin Paul Eve (Reference Paul Eve2016) in his book Password, is Daedalus’s labyrinth, “designed as a spatial-control mechanism for determining the unique identity of a single individual based on knowledge of its topology. … For everyone but Daedalus, the labyrinth was supposed to be, quite literally, a death trap.” Theseus escaped by circumventing the identification function and thus, according to Eve, “is one of the earliest species of geek that we now would call a hacker or cracker (3–4).
Passwords are a knowledge-based means for authentication.Footnote 6 Knowledge (of a password) serves as a proxy for identification in a system designed to control access to resources or systems. Alternative means of authentication that do not rely on knowledge may be based on “something you have, such as a token or a particular mobile phone [or] something you are, that is, some form of biometric” (Bellovin Reference Bellovin2016, 107). Steve Bellovin explains that one must understand the “systems nature of authentication,” meaning: “The total environment – who will use it, how you deal with lost credentials, what the consequences are of lack of access or access by the wrong person, and more.” Ultimately, he concludes: “The most important question of all is how people will actually use the authentication technology in the real world” (107).
So how do people use passwords? What do people believe about the passwords they use? Do they understand password strength, security threats, and relevant consequences? These are some of the basic background questions we sought to answer in our review of the literature.
Literature Review and Interviews
Our literature review aimed to answer questions about password security beliefs, where these beliefs originate, how these beliefs are transmitted more broadly, and how the beliefs shape everyday actions and practices. Many articles we reviewed used either surveys alone or surveys with lab experiments as their methodology.Footnote 7 We group our findings into two categories: lay knowledge and expert knowledge.
Lay Knowledge (Dilemmas) Concerning Password Security
We collected data on user beliefs about the nature and origins of security threats, what users believe makes a password secure, and what users believe compromise or strengthen security. Across the articles that focused on understanding users’ perceptions, beliefs, and behaviors, some common practices and beliefs among users were as follows:
Practices:
choose passwords from a limited set of alpha-numeric characters;
use names, slang words, dictionary words, or consecutive digits as passwords;Footnote 8
use personal information when creating passwords because it makes the passwords more memorable and easier to recall;
reuse identical passwords across multiple sites.
Beliefs:
adding numbers makes a password more secure than using only letters;
adding an exclamation mark or other symbol at the end of a password makes it more secure;
using a word that is difficult to spell as a password is more secure than an easy-to-spell word;
a password is secure if the password is longer and contains uppercase letters, digits, and symbols;
attacks on passwords are targeted at specific individuals;
using personal information, such as a birthday, in a password is secure if such information is not on their social media accounts;
password strength meters accurately measure the security of a password.
Misconceptions about password security persist despite growing public awareness of security threats. There are many reasons. We highlight those that surfaced most often and prominently in the literature and interviews.
First, lay people struggle to create and manage an ever-growing list of secure passwords.Footnote 9 In a (somewhat dated) large-scale study of password habits, Dinei Florencio and Cormac Herley (Reference Florencio and Herley2006) found that on average, people tend to have twenty-five accounts that require passwords, actively use around seven distinct passwords, and reuse passwords across sites/accounts. The researchers concluded that their large-scale study confirmed conventional wisdom about the large number of passwords that users maintain, the poor quality of those passwords, and the frequency of password reuse. In our interview, Herley confirmed that these basic observations from over fifteen years ago remain salient. The number of passwords people create and manage has risen significantly, possibly by an order of magnitude, and people continue to reuse passwords. Herley emphasized that people sometimes exercise common sense effectively when creating, managing, and even reusing passwords. There is a rough and often implicit cost–benefit analysis that people must engage in, given the growing number of password-protected accounts. Contrary to security advice not to reuse passwords often given by experts, Herley told us, “I reuse passwords all the time. I do it without fear, without shame.” Using his own experience as an example, he explained that for 200 or so password-protected accounts, 150 are low-value accounts for which weaker and even reused passwords might be justified. There are just too many accounts to create and keep track of strong, distinct passwords, and if a low-value account is hacked, there is less downside so long as it does not provide access to a high value account or enable another type of attack (e.g., phishing). Thus, one password security dilemma is knowing how to partition among low- and high-value (risk) accounts, and a second one is knowing how to respond when an account is compromised.
Second, lay people tend to have an incomplete understanding of the nature and variety of password security threats, which has changed substantially over the past few decades. The experts we interviewed all emphasized there are many different threats to consider when evaluating password security. Some threats involve “guessing a password,” and these threats are often what people think about when considering what is necessary for a secure password.Footnote 10 Password guessing can be as simple as it sounds – a person trying to guess the password. That is a threat model most people can understand. But it can get much more complicated, and correspondingly more difficult for lay people to understand, when the person (guesser/attacker) uses different tools, ranging from surveillance tools (e.g., to collect information about likely passwords)Footnote 11 to computational tools (e.g., a password-guessing algorithm). Further, it can be difficult to appreciate the differences between attacks directed a specific target and undirected attacks, online versus offline attacks,Footnote 12 and other variations of guessing attacks.
To make matters more complicated, many threats to password-protected resources do not involve password guessing at all. For example, a person might look over your shoulder and observe you entering your password. Or a person might trick you into downloading malware onto your computer and that software may capture your keystrokes and thus your password(s). Or a person may hack the system for which a password is required and thereby obtain the password (along with others); if that password had been used for more than one password-protected account (password reuse), then those other accounts could be compromised. Notably, each of these threats occurs without any guessing. While it may be easy for someone to catch the person looking over one’s shoulder and respond to that threat, the other threats require more knowledge for lay people to be able to manage their security. For example, our literature review and interviews suggested that people tend to underappreciate the risk of password reuse because they fail to understand the external effects from a hacked system. (The hack of system 1 where password A is obtained compromises systems 2, 3, … N where A is also used as a password. Lay people who understand password security threats in terms of targeted attacks or guessing attacks may fail to appreciate fully the risk of password reuse.)
Misunderstanding the nature and variety of threats can strengthen incorrect beliefs and lead to poor security practices. For example, according to two studies (Ur et al. Reference Ur, Bees, Segreti, Noma and Bees2016a, Reference Ur, Noma and Bees2016b) and (Ur et al. 2015) that directly examined user perceptions of password security threats, most users believed that attackers were strangers located far away from them; the users were concerned with attackers having access to and using their personal information. In these studies, users avoided using their own personal information such as birthdays and pet names, but some used the personal information of their family and friends instead to create passwords. The authors concluded that the users’ misconceptions about password security directly related to their misunderstanding or lack of knowledge about automated password guessing attacks, which would be able to guess those passwords. Thus, another dilemma to consider is how user (mis)perceptions of security threats shape user beliefs about what constitutes a secure password or practice.
A third reason concerns how lay people learn about password security. Our literature review did not provide much insight on this issue. For the most part, the studies we reviewed aimed to uncover lay persons’ beliefs and practices, but the studies did not examine learning processes or the origins of those beliefs. There are some studies that criticize security advice and suggest that lay people reject the advice because it is too difficult to follow given the ever-growing number of passwords to manage. (We discuss these studies below.) The experts we interviewed suggested that people learn through their everyday experiences with passwords (supporting, if not confirming, our hypothesis that password knowledge is often in the realm of everyday common sense knowledge). People engage with password creation regularly, encountering password composition rules and password security meters. In addition to their instrumental function (creating secure passwords), these tools serve an important, generally overlooked, pedagogical function, which is to teach users about password security (see Frischmann & Selinger Reference Frischmann and Selinger2018; Weizenbaum Reference Weizenbaum1976). Unfortunately, these tools can easily mislead and teach the wrong lessons. Consider the following stylized example that we raised during interviews.Footnote 13
Jeremy must create a new password. He encounters a typical password creation interface, a text box to enter characters, password composition rules displayed prominently to one side, and a password strength meter that updates the color (red, yellow, green) with each new character displayed prominently on the other side.
Step 1. Jeremy begins by typing the following characters: Jeremy
The security meter remains red.
Step 2. Jeremy continues by adding the following character: 1
The security meter turns yellow.
Step 3. Jeremy continues by adding the following character: !
The security meter turns green.Footnote 14
Figures 5.2 and 5.3 demonstrate the first and third steps using the Password Strength Test, available at the UIC Academic Computing and Communication Center.Footnote 15

Figure 5.2 Password strength test.

Figure 5.3 Password strength test.
What might Jeremy learn from this experience? What have these tools taught him about password security? During interviews, the experts noted how there are various ways in which the tools could teach the wrong lessons (i.e., misinformation about password security).
First, the security meter implies marginal security improvements that may not be genuine or meaningful improvements. Adding a single number and/or symbol at the end of a common name does not substantially improve the strength of the password. In the specific example, Jeremy, Jeremy1, and Jeremy1! are all relatively weak passwords. The marginal difference between the first two passwords is negligible; the third is an improvement, but it is not substantial. The differences among the three do not impose much of a burden on automated guessing attacks.Footnote 16
Second, in more absolute terms, the security meter suggests Jeremy1! is a strong password when in fact, it is not. This is an incredibly important source of consequential misinformation. Jeremy, like most lay persons, is likely to trust the digital tool, rely on its “advice” and the weak password, and go no further to create an even stronger password or learn more about password security. How can this possibly occur? In practice, security meters are based on compliance with password composition rules and essentially that means strength depends on checking a series of boxes, such as including characters from different character classes (upper and lowercase letters, numbers, symbols), having enough characters (e.g., length of password is 8, 12, or possibly more characters), and not being on a blacklist of already known common passwords (Carnavalet & Mannan Reference de Carné de Carnavalet and Mannan2014). For most password strength meters, the first two examples in the hypothetical would remain in the red (weak) because they lacked a symbol and would be too short (password length under eight characters); the third example would pass some, however, because it checks those two boxes.Footnote 17 To be clear, the point we are illustrating with this hypothetical is not limited to the Jeremy1! example or even password strength meter tools. Below, we discuss other examples related to password security, but it is important to highlight how this examination is relevant to other digital networked technologies and social dilemmas concerning mis- and dis-information.Footnote 18
Third, above and beyond the specific attempt to create a password, are the lessons learned about password security that Jeremy may carry into his next password creation experience or that he may relate to other people. We know very little about these types of effects. None of the studies we reviewed considered them.
Security meters could be designed to be better pedagogical tools. For example, when Jeremy added the numeral 1 to his name, the tool could suggest more secure alternatives using the same addition, for example by placing the number in the middle rather than the end of the string of characters. Regardless of whether Jeremy chose that option, he could learn why it was more secure with just a little explanation. Conversational prompts during password creation, for example, could teach while also nudging users toward stronger passwords (Khern-am-nuai Reference Khern-am-nuai, Hashim, Pinsonneault, Yang and Li2022). As Arvind Narayanan suggested after discussing the stylized hypothetical: “Well-designed password meters can both help users create stronger passwords and teach them what makes a stronger password.” Experts have found that password meters with a variety of visual appearances led users to create longer passwords, but significant increases in resistance to password-cracking algorithms were only achieved using meters that scored passwords stringently (Ur et al. Reference Ur, Kelley and Passaro2012). These findings support the push for wide-scale deployment of more stringent password meters to train users to create stronger passwords more routinely. Yet, as we discuss below, this has not happened. Professionals and practitioners who design and deploy password creation tools typically balance security, usability, and market incentives to keep consumers using their services. Further, it is not clear that consumers want to learn about security when they are asked to create passwords, which is often when they are excited to try out a new service.Footnote 19 (Again, we must emphasize that these observations are not necessarily limited to password creation tools; we strongly suspect that many other digital tools and interfaces could be designed to be better pedagogical tools but face similar dynamics.)
Another common experience lay people have with passwords is forgetting them. That is, people often forget a password and then engage with password recovery tools, for example, responding to a set of security questions (sometimes called “secret questions” or “challenge questions”) that substitute for the password as a knowledge-based means of authentication (Bonneau et al. Reference Bonneau, Bursztein, Caron, Jackson and Williamson2015a). Password recovery tools also have instrumental and pedagogical functions. People need to access password-protected resources, and the recovery tools serve that need. The security dilemma is two-fold: First, the password recovery tools are not always secure. The types of security questions a person must answer may be easier to guess than a password (Bonneau et al. Reference Bonneau, Bursztein, Caron, Jackson and Williamson2015a). There are more secure password recovery tools (e.g., SMS and email-based recovery; Bonneau et al. Reference Bonneau, Bursztein, Caron, Jackson and Williamson2015a). But again, businesses face tradeoffs between security, usability, and convenience (Bonneau et al. Reference Bonneau, Bursztein, Caron, Jackson and Williamson2015a). Second, since password recovery tools are often easier to use than remembering a strong password, some people (learn to) adopt a strategy of relying on them rather than passwords as a means for authentication and obtaining access to resources. We can see the pedagogical function of password security tools in terms of how experience using the tools shapes everyday security beliefs and practices.
When comparing the behavior of experts to that of nonexperts, Iulia Ion, Rob Reeder, and Sunny Consolvo found that experts report installing software updates, using two-factor authentication, using unique passwords, and using passwords managers to remain safe online, while nonexperts report using antivirus software, using strong passwords, only using known websites, and changing their passwords frequently (Ion et al. Reference Ion, Reeder and Consolvo2015). As a result of their findings, Ion et al. suggest that better messaging along with systems and usability work are necessary to get nonexperts to follow the same security practices that experts do.
Expert Knowledge (Dilemmas) Concerning Password Security
In this section, we explain what we learned from the literature review and interviews about expert knowledge, how it has changed over the past few decades, and what are the “best practices” currently recognized by security experts. Our abbreviated history of expert knowledge about password security focuses on major themes related to knowledge dilemmas within the community, rather than specific actors or their contributions. While the literature review provides support for the findings we highlight, most of the insights are drawn from the interviews.
In the early days of computing and networking, password security experts mostly were academic researchers with expertise in computer science, mathematics, and engineering. These experts thought about password security as a mathematical problem. Security experts mostly worried about automated guessing attacks – that is, guessing attacks leveraging computational tools.Footnote 20 The offense and defense of password security was, at its core, a computational problem. As such, expert knowledge about password security was based heavily on the mathematical theory of computation. Expert knowledge thus led to certain prescriptions, namely that users should create sufficiently strong passwords to withstand an attack. Experts measured strength in terms of complexity (e.g., Shannon entropy), which usually involved a calculation based on the length of the password and the number of different character classes. For a reasonably accessible and thorough explanation, see Appendix A: Estimating Entropy and Strength, in the NIST Electronic Authentication Guideline (Burr et al. Reference Burr, Dodson and Nabbus2013b). Notably, as we discuss below, security experts now regard complexity/entropy as a bad proxy for guessability and instead prefer to evaluate password strength using an adversarial guessing approach (Lee et al. Reference Lee, Sjöberg and Narayanan2022).
Expert knowledge about password security shifted dramatically over the past few decades, and it continues to change. According to interviewees, during the 2000s, significant changes in expert knowledge emerged as knowledge grounded in theory failed to match reality (everyday life experience). Bonneau et al. discusses the evolution of passwords suggesting that estimates of password strength, models of user behavior, and policies related to password composition work in theory but can be unsupported in practice and even contradicted when observed empirically, possibly leading the research community to focus on the wrong threats (Bonneau et al. Reference Bonneau, Herley, van Oorschot and Stajano2015b). We highlight two themes that surfaced repeatedly during interviews – first, changes in the technological environment (or reality on the ground), and second, corresponding changes in the expert community. We then turn to the role of professionals and practitioners in the password security ecosystem and explore how these actors mediate between the experts and lay people. We conclude with a brief discussion of the latest expert knowledge regarding best practices and knowledge dilemmas associated with translating such knowledge to actual practice by professionals, practitioners, and lay people.
Changes in the Technological Environment
Over the past few decades, digital networked computing technologies evolved considerably and diffused widely. The number of users and the number of accounts each user must manage grew incredibly.Footnote 21 Password-protected resources became part of everyday life experience for billions of people. This shift dramatically expanded the attack surface where the offense and defense of password security played out and, as a result, fundamentally altered the epistemic demands on password security experts. Not surprisingly, security threats multiplied and changed. Initially, security experts (mostly) agreed that strong passwords were an appropriate solution for the threat of guessing attacks. But as password security became an everyday life concern for lay people (at home, work, and everywhere else), this conventional expert wisdom began to fail for a few reasons.
First, despite reasonable consensus among experts on what constitutes a strong password (complexity/entropy, though that would change), people nonetheless often chose and still choose terribly weak passwords (see section “Expert Knowledge (Dilemmas) Concerning Password Security”). Leaked datasets of millions of actual passwords, for example the 2009 RockYou.com database leak, confirmed what many considered to be common sense: Lay people were unable to keep up with the computational arms race and ever-growing number of passwords,Footnote 22 and they often defaulted to weak but memorable passwords and reused such passwords across different accounts. (As Herley and colleagues pointed out, lay people often were exercising common sense, performing rough cost–benefit analyses, and using stronger passwords for more important accounts.) This realization in the mid-2000s led to a shift in focus among security researchers toward the needs and capabilities of actual human beings involved in authentication processes. Human factors and usability matter! This realization also focused attention on the increasingly important role of professionals and practitioners who designed, deployed, and managed digital networked technologies, including password creation tools (e.g., human–computer interfaces, password composition rules, strength meters).
Second, automated guessing attacks became more sophisticated and varied. Attackers could use an array of widely available tools, including dictionaries, large datasets of stolen passwords, and even the various password creation tools themselves, to improve their guessing algorithms. Attackers easily could learn about how people tend to respond to password composition rules, for example by adding 1! at the end of a character string deemed weak by a strength meter or by replacing letters with similar symbols ($ for s). This knowledge advantaged attackers and confounded the Shannon entropy calculation used to determine password strength.
For some threats, such as online guessing attacks made at the login interface, experts determined effective countermeasures, such as limiting the rate at which guesses can be made by injecting exponentially increasing time delays between each wrong guess.Footnote 23 Despite the mathematical beauty of this solution, such friction-in-design measures are not, however, universally implemented. Again, math theory falls victim to pragmatic considerations of everyday life; human factors and usability matter. Such delays are inconvenient and that can be off-putting for consumers of digital services, and so, as companies engage in a (rough) cost–benefit tradeoff, they may forsake security in the name of consumer convenience (profits). Of course, as David Thaw pointed out during our interview, this countermeasure is effectively used to secure bank ATMs from PIN guessing attacks and ought to be used much more widely. Bruce Schneier made a similar point, noting that “systems that lock you out after only a few incorrect guesses work great; it’s why your ATM card password can be secure with only four digits.” But he warned of “a denial-of-service trade-off: I can deliberately lock you out of any system that has that feature by using your username and guessing wrong.”Footnote 24
For offline guessing attacks (e.g., following a database leak), countermeasures often are the burden of professionals operating web services. Xavier de Carné de Carnavalet (2022) observed:
Proper password hashing, for example, should be applied to protect plaintext passwords; otherwise, even seemingly hard-to-guess passwords would be readily available in the [leaked] database. Inappropriate hashing algorithms such as MD5 and SHA1 have been extensively used, and one can still find recent breaches with such algorithms used. Besides the lag between expert and professional knowledge explained later [in this chapter], this is also the result of outdated resources being promoted on the first page of Google search results [and] how young professionals learned about authentication at school.Footnote 25
Third, beyond guessing attacks, the threats multiplied, became more varied, and hybridized. Some attacks targeted vulnerable weak links. For example, attackers recognized that password hosts and login commands could be subverted. Phishing attacks, compromised servers, and compromised client hosts make it easier for attackers to steal passwords (Bellovin Reference Bellovin2016). If an attacker has accomplished one of these attacks, then a strong password does not provide any defense (Florencio et al. Reference Florencio, Herley and Coskun2007); the attacker doesn’t care about special characters, or any other suggested characteristics users are told will make their passwords stronger and more secure. Thus, security experts realized that even if necessary, strong passwords are not sufficient protection for password-protected accounts and resources. David Thaw told us that strong passwords were counterproductive in the sense that (i) they could contribute to “security theatre” by providing a false sense of security to users so long as they comply with password composition rules, and (ii) draw attention away from other more important security threats and countermeasures.Footnote 26 Lee et al. (Reference Lee, Sjöberg and Narayanan2022, 572) similarly offer as a hypothesis to help explain “the disconnect between industry and the academic community” the idea that “Password policy is security theater: measures such as character-class PCPs, even if ineffective, may give users a false sense of security, and websites use them for this reason.”
Initial thinking about security measures to counter the threat of an organizational attack also was grounded in the math theory mindset. Conventional wisdom among experts suggested that one way to minimize the downside risk of a data breach at a company where a password file (database) has been compromised is to require people change their passwords periodically; then in the event of a breach, there is a good chance that by the time someone tries to exploit the leaked data, it has already been replaced with a new password. Bellovin explains why this wisdom fails. Users dislike frequent requests to change their passwords and tend to use similar patterns when rotating passwords (e.g., adding a number or increasing an existing number by one), making the replacement passwords even easier to guess. Again, sophisticated attackers who pay attention to human factors and behavioral patterns easily learn to predict what people will do when forced to periodically change their passwords. Armed with such knowledge, attackers can more easily guess passwords using a hacked dataset as a baseline (input) for their guessing algorithm. The conventional wisdom thus backfires. We return to this example below as a mini-case study that highlights relevant knowledge dilemmas between experts, professionals/practitioners, and lay people.
The emergence of new threats and their successful exploitation forced the expert community to confront the notion that password security is not just a mathematical problem solved with strong passwords. Instead, it is multifaceted and necessarily embroiled with the many fallibilities of humans and organizations.
Changes in the Password Security Expert Community
Interviewees mostly described the password security expert community as academic researchers who published research in peer review journals and attended academic conferences. Some industry researchers, often at research labs, who participated in these same activities also were considered members of the expert community.Footnote 27 Here we highlight changes in community membership (types of experts included) and corresponding changes in the types of research and knowledge developed within the expert community. One of our interviewees described the transformative shift in the expert community that occurred roughly over the course of a decade (late 2000s to 2010s) as the triumph of empirical observation over math theory, a demonstration that human factors matter and that usability needed to be considered by security experts. Essentially, changes in the technological environment described above drove changes in the expert community as the community expanded to integrate different expertise. In the first few decades of computing and networking, the security expert community included mostly computer scientists and engineers who approached password security more or less as a security optimization problem. For example, where guessing attacks were the threat to password-based authentications systems, password strength needed to be optimized considering the attacker’s resource constraints; thus, the research question was how strong a password must be to withstand an automated guessing attack, taking into account expected computational resources of attackers. A similar mathematical, risk-based framing occurred for the threat of data breaches and stolen password files, and this framing led to security prescriptions against password reuse and in favor of organizational policies requiring periodic password changes.
In the 2000s to early 2010s, research from experts outside of the traditional computer security community highlighted how other sets of real-world constraints needed to be considered. Specifically, human factors and usability constitute real-world constraints on the effectiveness of strong passwords as knowledge-based authentication mechanisms. Lorrie Cranor stated that until this new research from usability researchers surfaced and gained traction within the security community, “there was basically no knowledge about usability of passwords other than just intuition.” She further explained:
Experts knew what was easier or difficult for them personally, but beyond that there was basically no knowledge. Most of the knowledge about security was based on math. We can calculate how many possible passwords exist if we limit ourselves to characters and keys on the keyboard. You can do the math and figure out the password space. So people were looking at that sort of thing, but what they weren’t looking at is the fact that there are a lot of combinations of characters that no human would ever come up with on their own. The space of realistic passwords is much smaller than the space of all possible passwords unless you have a computer randomly generating them for you. Over the past 15 years, we’ve learned a lot about what kinds of passwords humans actually create when left to their own devices. And we’ve also learned about how to nudge humans towards creating stronger passwords.Footnote 28
The expert community gradually broadened beyond conventional computer security experts to include experts in usability, information technology, and other related scientific and engineering disciplines as well as experts from adjacent social sciences such as psychology, economics, and cybercrime. The community remained an academic one, in the sense that these experts participated in academic conferences and published research in peer review publications, regardless of whether they were affiliated formally with academic institutions. This led to the development of new cross-disciplinary conferences and specialties, such as usable security.
When asked how expert knowledge had changed over the past two decades, Arvind Narayanan replied:
Computer security [is] a field that has often fetishized mathematical knowledge over human subjects experiments, for various cultural reasons, historical accidents, etc., and so … a lot of the earlier experts’ wisdom and decrees regarding password security often involved burdening users, and we never really tested to see how effective [those burdens] are, and so a lot of the things that experts know better today are the opposite of things they might have said 20 years ago. So what are some of those things?
Never write down your password. That’s one piece of bad password wisdom. The problem with that is because our memories are finite, and not writing down passwords means that people are going to reuse passwords, and that’s a much bigger problem today. Most experts (today) will say it’s OK to write down passwords, but think about the physical safety of where you write them down.
A second one today is the importance of multifactor authentication; passwords are never going to be your only line of defense. It doesn’t matter how clever your password is. It’s probably going to get breached at some point.
A third one is that a lot of the password-related advice these days would be directed at companies as opposed to users.
…
I think the security expert community is just a little bit more humane now than twenty years ago. Rather than treating users as the problem, [experts] recogniz[e] that people are overburdened as they go about their everyday lives, and designers have the primary responsibility for security.Footnote 29
These observations resonated with some articles we reviewed from that transitional period that noted how experts sometimes misunderstood users. Herley (Reference Herley2009) noted that some experts may suggest that users are lazy, choose weak passwords, and ignore expert security advice; but he argued that these actions may be entirely justifiable. Users’ rejection of security advice often is rational, Herley suggested. According to Herley, much of the public security advice for users is complex, outdated, and does little to address actual threats that users face, offering a poor cost–benefit tradeoff, and thus users reject the advice. Dinei Florencio, Cormac Herley, and Paul C. van Oorschot (Reference Florencio, Herley and van Oorschot2014) explored how users should manage large numbers of accounts and found that mandating that users only use strong passwords and not reuse passwords leaves users with an impossible task as the number of accounts they have has grown.
Intermediating Role of Security Professionals and Practitioners
Changes in the technological environment were driven by and at the same time drove growth and expansion of an intermediate layer of computer and network security professionals and practitioners (hereinafter, “professionals” for brevity).Footnote 30 The expert security community came to recognize the importance of these actors and engaged with them more directly. Unfortunately, we were unable to fully explore this engagement during our research. It surfaced during interviews in a few different ways. Some interviewees noted how some industry security researchers actively participated in the academic security research community, whether by attending conferences or publishing in peer review journals. Others noted how IT, security, and other professionals often learned about password security while at university and then went on to careers where security was often one of many responsibilities. This intermediate layer of professionals played an increasingly important role in determining password security practices, by setting organizational policies and deploying technologies and services that required users to create and manage passwords.
While we were unable to fully map and explore the knowledge flows between these different communities (experts, professionals, lay people), we highlight observations drawn from interviews to help frame future research.
One theme that surfaced repeatedly in our interviews is the idea of a disconnect between expert knowledge and professional knowledge and practice, which, in turn, seems to trickle down and potentially generate lay person misunderstanding. This disconnect is, at least in part, the result of a lag in the knowledge flows between experts and professionals. The flow of knowledge from experts to professionals can be slow and delay the ability of professionals to implement new standards and translate that information into forms accessible to lay people. Reasons for this lag include the rapidly changing technological environment and different, and sometimes competing, incentives between the expert community and the professional community. According to David Thaw, it is easy to propagate information about security and best practices through the professional community because it is not held to evidence-based standards (at least, not the same as academics). Professionals have access to academic research, but that does not mean they keep up to date with it. They have mixed responsibilities and priorities and may view security primarily in terms of compliance.
Three notable concerns arise. First, professionals responsible for password security, business practices, and interface design may perceive security as one of many different competing considerations (business, technical, etc.). Second, a compliance mindset may lead professionals to ignore academic security research and instead rely on security standards set by insurance companies, auditors, other industry actors, or government. Finally, professionals may be overconfident and inaccurately see themselves as security experts or as being sufficiently up-to-date on security.
Expert consensus on what actions constitute best practices also struggles to keep up with the rapidly changing technological environment. As a result, what was accepted as best practices five to ten years ago can become outdated. Experts must correct their views first and then translate that knowledge to the broader public, including professionals and lay people. Knowledge transfer between experts as well as between experts and professionals may happen too slowly; technological changes may occur faster than expert knowledge can update and percolate. As a result, lay users may be the last community to become aware of new password security developments, and their security behaviors may be at odds with the behaviors experts characterize as best practices. Based on this lag-induced knowledge gap, lay users may unknowingly become accustomed to outdated security practices believing that they are increasing their security when they are in fact doing the opposite.
Experts and professionals also may have competing incentives, directly impacting how information is shared, which information is regarded as important, and how best practices and security advice get implemented. According to various interviewees, academic incentives prioritize publishing articles to increase prestige within the community. Arvind Narayanan emphasized his view that academic researchers have a responsibility to translate their findings to the public, including professionals and lay people, since most academics receive funding from taxpayers. He suggested that most fail to do this work and that universities should consider crediting such efforts in order to realign academic incentives with the public interest.
Interviewees suggested that the professional community has a compliance mindset. As a result, the professional community tends to evaluate security based on process rather than outcomes. One of the ways professionals evaluate security is through security checklists from organizations such as NIST or companies such as Deloitte. These checklists are sometimes forced upon professionals by their auditors and often are not updated to reflect the latest expert knowledge. Thus, a question arises as to whether professionals believe they are following the best security practices when they comply with these checklists. A related concern is that many professionals have been in the industry for years, but they are not getting retrained or refreshing their knowledge to reflect evolving expert knowledge. As a result, updated best practices and expert knowledge may not reach professionals and trickle down to lay people. While the lack of consistent training and refresher courses may be out of the control of professionals and more in the hands of the companies they work for, Rick Wash suggests that many professionals care more about checklists and not getting blamed for any problems than staying educated about security itself. Bruce Schneier similarly suggested that organizational inertia coupled with these compliance incentives do not allow for expert consensus to be integrated successfully in the professional community. Finally, Xavier de Carné de Carnavalet (2022) ties the observations of Wash and Schneier back to the concept of security theatre:
bothering users with ineffective and sometimes counterproductive measures gives them a sense that a system is “secure”, i.e., it tries to prevent attacks by requesting additional steps. … This could also explain why security practitioners are slow to adopt the latest NIST standard that deprecates PCPs. Those were at least some visible security steps, and it seems that improving security should be synonymous [with] adding constraints, not removing them.Footnote 31
(Some) Best Practices
The conventional wisdom (consensus views) among security experts about best practices have changed over time as we have already described. Today, there are some identifiable best practices that security experts mostly agree on. We do not provide a comprehensive analysis of current best practices.Footnote 32 Instead, we focus on the password creation action arenaFootnote 33 and highlight a recent study by Lee et al. Reference Lee, Sjöberg and Narayanan2022, which sought to empirically study whether 120 of the most popular websites followed best practices. To do this, the authors identified the following “established” best practices based on prior research in security and usability:
1. Blocklists: (i) Check user passwords against blocklists that include leaked and easily guessed passwords. (ii) Block user passwords that appear on such lists. (iii) Prompt user to create a different password (Lee et al. Reference Lee, Sjöberg and Narayanan2022). (We might add: Inform user about the reason.)
2. Strength meters and minimum strength requirement: (i) Provide accurate, real-time strength estimates and feedback. (ii) Set minimum strength requirements based on an appropriate measure of password strength, namely guessability rather than complexity, Shannon entropy, or compliance with composition rules (Lee et al. Reference Lee, Sjöberg and Narayanan2022).
3. Composition policies. (i) Do not require specific character classes. (ii) Set minimum password length of eight characters (Lee et al. Reference Lee, Sjöberg and Narayanan2022).
Lee et al. (Reference Lee, Sjöberg and Narayanan2022) explain how these practices are supported by recent research in security and usability. While precluding users from creating passwords found on blocklists is a low-cost security measure, Tan et al. (Reference Tan, Bauer, Christin and Cranor2020) tested different password security requirements in two experiments and found security–usability tradeoffs among different blocklist configurations. Also, in their study, strength meter and text feedback informed users about the reason for disallowing a password. Other research has shown that such feedback can nudge users to create stronger passwords.
Lee et al. (Reference Lee, Sjöberg and Narayanan2022, 563) explain that minimum strength “requirements and strength meters are both effective and user-friendly.” However, the preferred means for evaluating strength has changed from complexity to guessability, which is the “number of guesses needed to crack a password” (563). Determining strength thus involves testing the password against an adversarial neural network rather than calculating complexity/entropy. These developments led to a corresponding shift away from character-class requirements (e.g., password composition rules that require characters drawn from specific character classes) and toward minimum strength requirements of “at least 106 [guesses] to prevent online guessing attacks” (564).
Remarkably, Lee et al. (Reference Lee, Sjöberg and Narayanan2022) found that out of 120 popular websites, only 13 percent followed the established best practices noted above. More than half of the websites did not check user passwords and allowed users to use the most common, leaked, and easy-to-guess passwords (e.g., “12345678”). Almost a decade ago, Carnavalet and Mannan (Reference de Carné de Carnavalet and Mannan2014) published a damning empirical study of password meters that showed how poorly password meters fared in terms of evaluating password strength and guiding users to create strong passwords, in part because many of the meters measured strength based on entropy rather than guessability. That study also showed inaccurate and inconsistent results across password meters, such that weak passwords were sometimes rated as strong. Yet Lee et al. (Reference Lee, Sjöberg and Narayanan2022) found that little had changed. Surprisingly, most sites did not use password meters, despite plenty of research in the intervening period showing their value when properly deployed. The websites that did include password strength meters (i) misused the meters to nudge users towards including certain characters (i.e., to satisfy outdated character-class requirements) instead of serving the preferred best practice of encouraging users to freely construct strong passwords and (ii) did not include an evaluation of guessability (Lee et al. Reference Lee, Sjöberg and Narayanan2022). One positive note from Lee et al. (Reference Lee, Sjöberg and Narayanan2022) was the observation that more than half of the websites have an eight-character minimum length requirement. The authors surmised, “Perhaps this is a result of updated guidance from NIST in 2017, which now recommends an 8-character minimum length for passwords, up from its previous recommendation of 6 characters” (Lee et al. Reference Lee, Sjöberg and Narayanan2022, 569).
Based on their findings, Lee et al. (Reference Lee, Sjöberg and Narayanan2022) concluded that websites should review the best practices established by academic experts to adjust to their password policies. Moreover, the researchers concluded that because there seems to be a disconnect between academic password security experts and industry, future research should directly engage with system administrators to address the disconnect.
We conclude this section by noting another shift in best practice advice that surfaced during interviews.Footnote 34 One conventional wisdom dispelled by experts during interviews is the idea that people should not write down their passwords in a notebook or on a piece of paper; a few experts mentioned this example. They explained that experts now generally agree that writing down passwords is a good security practice so long as the physical password list is kept in a secure location because it helps people keep track of passwords and thus avoid (i) creating overly simple passwords to compensate for memorization difficulties and (ii) engaging with password recovery tools. The experts emphasized that the shift in advice reflects a better understanding of human factors and usability as well as prioritization of the security threats ordinary people face.
Governance Challenges
Three (meso-level) action arenas concerning everyday knowledge about password security surfaced in our study: The password creation action arena, the password recovery action arena, and the password expiration and replacement action arena. Each concerns a set of repeat interactions among stakeholders, where professional community stakeholders (e.g., employees of a company that design and operate the password creation or password recovery tools or that implement a password expiration and replacement policy) determine the rules-in-use, informed to some degree by expert knowledge, and lay people take actions to create, recover, or replace passwords, possibly learning from their experiences. These action arenas present a series of knowledge dilemmas and governance challenges, which we discussed previously. We leave further analysis of them for future work and now look “upstream” from the password expiration and replacement action arena to examine the role of the National Institute of Standards and Technology (NIST) in shaping this action arena.
NIST on Password Expiration and Replacement: A Case Study
NIST, founded in 1901, serves as a nonregulatory agency funded by the United States Department of Commerce. The mission of NIST is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.” Most important for our chapter is NIST’s role as a standard-setting body. NIST standards generally establish best practices. Government agencies such as the FBI, NSA, and USDA must adhere to NIST guidelines, and in many sectors of industry, including cybersecurity, private companies tend to adopt NIST standards, although this can get complicated and be delayed as the specific case study below demonstrates.
To examine how NIST’s capacity to set regulations, standards, and best practices in the password security industry can lead to governance challenges, we explore NIST’s decision to change password expiration standards and the results in industry that followed. In 2003, NIST released “NIST Special Publication 800-63. Appendix A,” which advised users to protect and secure their accounts by creating passwords with random characters, capital letters, and numbers, and to change their passwords regularly (McMillan Reference McMillan2017). Federal agencies, large corporations, and universities followed the advice. However, Bill Burr, who authored the publication, has since stated that the advice was largely wrong. Burr wanted to use real password data as a foundation of his advice, but there wasn’t much of this data available to use as evidence for recommendations. Instead, security experts and professionals, including Burr, relied heavily on a paper written by Robert Morris and Ken Thompson (Reference Morris and Thompson1979).
Recognizing the flaws and limitations of the 2003 publication, in June of 2017 NIST published “800-63-B: Digital Identity Guidelines: Authentication and Lifecycle Management.” In this publication, NIST established new guidelines for password security to replace widespread practices and policies that made authentication mechanisms weak. One of the recommendations given by NIST was for organizations to no longer require password expiration, stipulating that users should only change their passwords if there is evidence of compromise (Grassi et al. Reference Grassi, Fenton and Richer2017). The exact wording of the recommendation is as follows “Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.” (Grassi et al. Reference Grassi, Fenton and Richer2017).
The change in the guidelines resulted from academic research and expert consensus that password expiration is counterproductive to good password security. As we described extensively above, decades ago, the field of password security focused heavily on mathematical knowledge and theory and not on human factors and usability. Since password security ideas were based on math, rarely were expert recommendations tested empirically with users to measure their effectiveness. The modern practice of empirically testing password recommendations is relatively new. Today, security experts collect data on how often common attack types actually happen, and this data combined with empirically testing password recommendations against human usability has enabled experts to identify the following problems associated with password expiration: Lay users, when forced to comply with password expiration policies, often change their passwords in a trivial way, such as adding a 1 at the end of an already established password, making the password easy to guess; this doesn’t solve the problem (attack type) as this type of behavior is predictable from an attacker perspective. Academic researchers conducted research, collected data, and published results (Chiasson & van Oorschot Reference Chiasson and van Oorschot2015; Cranor Reference Cranor2016; Habib et al. Reference Habib, Naeini and Cranor2018; Spafford Reference Spafford2006; Yinqian Zhang et al. Reference Zhang, Monrose and Reiter2010; Zhang-Kennedy et al. Reference Zhang-Kennedy, Chiasson and van Oorschot2016), and it became obvious to them that periodic password changes needed to be eliminated as a supposed best practice. Highlighting the impactful nature of such academic expert research, when creating their updated password guidelines, NIST cited academic research that reported on the ineffectiveness of password expiration policies (Habib et al. Reference Habib, Colnago and Melicher2017; Herley & van Oorschot, Reference Herley and van Oorschot2012; Komanduri et al. Reference Komanduri, Shay and Egelman2011).
While NIST took into account up-to-date research findings and changed its standards, it is not clear whether the professional community has followed suit. Periodic password expiration and replacement appears to remain a widespread practice. Compliance with NIST’s new standard seems slow, at best. Frankly, we asked interviewees about it, and while most speculated that industry has not yet adopted the new standard, no one knew of an empirical study of the issue. When asked about the reasons for this lag, our interviewees stressed the observations we noted in the previous section concerning the compliance mindset, conflicting incentives, and insufficient training and keeping up-to-date with expert knowledge.
Conclusion
Common nonsense about password security is a type of misinformation and digital illiteracy problem. In some ways, it is distinguishable from fake news and propaganda types that depend on trolls, bots, or others who deliberately pollute knowledge networks. Yet there are similarities, particularly with respect to how people learn about and from the digital tools they regularly use as well as the perpetuation of outdated information. This study examined different epistemic dynamics and dilemmas that may require different forms of governance. Unfortunately, we did not fully explore governance institutions within and between the different communities. That is an important topic for follow-on research. Our study shed light on the roles of experts and professionals, social demand for expert knowledge transfer via better and more widely accessible communication and education channels, and the societal risk of widening the lay–professional–expert knowledge gap. The GKC framework usefully structured our research methods and analysis, and it helped us identify different action arenas deserving of further study.