University of Applied Sciences St. Pölten
Department of Information Security
Password Security in Practice:
An Analysis of Human Password Behaviour
Against Breach Datasets
Master's Thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Information Security
All evaluation is performed locally in the browser — no data is transmitted.
| Length | — |
|---|---|
| Uppercase (A–Z) | — |
| Lowercase (a–z) | — |
| Digits (0–9) | — |
| Special characters | — |
| Estimated entropy | — |
Loading breach dataset…
Abstract
Password-based authentication persists as the dominant access control paradigm across digital systems, despite decades of evidence documenting its structural vulnerabilities. Human cognitive limitations — including finite working memory and a tendency toward pattern-based heuristics — consistently produce credentials that are simultaneously memorable and predictable. This work examines password selection behaviour through the lens of the RockYou breach dataset, a corpus of 14.3 million credentials exposed in the 2009 RockYou data breach. Drawing on foundational literature in human-centred security, we contextualise observed patterns within established frameworks of usable security design. An interactive evaluation tool is presented that allows users to assess individual passwords against the highest-frequency entries in the breach corpus, providing immediate, evidence-based feedback on credential exposure risk.
Background
Password authentication was formalised as a computer security mechanism in the 1960s, with its persistence attributable as much to institutional inertia as to technical merit [1]. Despite the emergence of multi-factor authentication, hardware tokens, and biometric alternatives, password-only authentication remains the default configuration for the vast majority of consumer-facing systems. The National Institute of Standards and Technology (NIST) Special Publication 800-63B acknowledges this reality, focusing its recommendations not on eliminating passwords but on mitigating their worst failure modes: enforcing length floors, prohibiting composition complexity requirements, eliminating mandatory periodic rotation, and maintaining blocklists of known compromised credentials [2]. This policy evolution reflects a broader recognition that technical mandates divorced from human behavioural constraints produce counterproductive outcomes.
Empirical studies consistently demonstrate that users, when unconstrained by policy, converge on a narrow subset of credential structures. Analyses of large-scale breached credential corpora reveal that a disproportionate share of accounts — often exceeding thirty percent — can be compromised by attempting fewer than one hundred candidate passwords per account [3]. This concentration is not attributable to user negligence; it reflects rational adaptation to an environment that imposes high authentication frequency with limited cognitive bandwidth. The tendency to select passwords based on keyboard proximity, sequential patterns, or culturally salient words (names, sports teams, expletives) is well-documented across demographic groups and persists even when users are aware that such patterns are insecure. Password reuse across services further compounds this exposure: a credential validated against one breach corpus provides probabilistic coverage across multiple target systems, enabling credential-stuffing attacks at industrial scale.
References
- [1] Corbató, F. J., Merwin-Daggett, M., & Daley, R. C. (1962). An experimental time-sharing system. Proceedings of the Spring Joint Computer Conference, 335–344.
- [2] Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). NIST Special Publication 800-63B: Digital identity guidelines — authentication and lifecycle management. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-63b
- [3] Bonneau, J. (2012). The science of guessing: Analyzing an anonymized corpus of 70 million passwords. 2012 IEEE Symposium on Security and Privacy, 538–552. https://doi.org/10.1109/SP.2012.49
- [4] Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46. https://doi.org/10.1145/322796.322806
- [5] Bonneau, J., Herley, C., van Oorschot, P. C., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. 2012 IEEE Symposium on Security and Privacy, 553–567. https://doi.org/10.1109/SP.2012.44
- [6] Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M. L., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., & Cranor, L. F. (2012). How does your password measure up? The effect of strength meters on password creation. Proceedings of the 21st USENIX Security Symposium, 65–80.