Have a personal or library account? Click to login
Passcrack: cracking, hashing, and strength testing for a secure digital future Cover

Passcrack: cracking, hashing, and strength testing for a secure digital future

Open Access
|Jun 2025

Figures & Tables

Figure 1:

PassCrack system architecture that illustrates password strength evaluation and cracking workflow.
PassCrack system architecture that illustrates password strength evaluation and cracking workflow.

Figure 2:

Hash Finder. Example of SHA256 hash generation for the word “apple.”
Hash Finder. Example of SHA256 hash generation for the word “apple.”

Figure 3:

Hash Finder. Example of SHA256 hash generation for the word “/)]N;PGFy!23.”
Hash Finder. Example of SHA256 hash generation for the word “/)]N;PGFy!23.”

Figure 4:

Masked hash of the word “apple” using SHA256.
Masked hash of the word “apple” using SHA256.

Figure 5:

Testing the strength of the word “apple” as a password.
Testing the strength of the word “apple” as a password.

Figure 6:

Testing the strength of the stronger password recommendations.
Testing the strength of the stronger password recommendations.

Figure 7:

Immediate cracking of a weak password like “apple.”
Immediate cracking of a weak password like “apple.”

Figure 8:

Cracking hash of a strong password like “/)]N;PGFy!23”.
Cracking hash of a strong password like “/)]N;PGFy!23”.

Figure 9:

Comparison of hashing versus masking on password cracking.
Comparison of hashing versus masking on password cracking.

Figure 10:

Time comparison to crack passwords with various algorithms (with and without masking).
Time comparison to crack passwords with various algorithms (with and without masking).

Scoring rubric for password strength

CriteriaWeak (<40%)Moderate (40%–70%)Strong (>70%)
Length<8 characters8–12 characters>12 characters
Character varietyOnly letters or numbersMix of letters and numbersUppercase and lowercase letters, numbers, and symbols
Pattern complexityCommon words, predictablePartial randomness, slight patternsNo patterns, highly randomized
Entropy scoreLow (<40 bits)Medium (40–70 bits)High (>70 bits)
Resistance to attacksVulnerable to brute-force, dictionary attacksModerate resistanceHighly resistant to attacks

Comparison of attack success rates based on password strength

Password strengthExample passwordDictionary attackBrute-force attackRainbow table attackEstimated cracking time
Weak (common words, <8 characters)password123Easily crackedVery fastLikely pre-computedSeconds to minutes
Moderate (8–12 characters, mix of letters, and numbers)Pass1234May not be on the listFeasibleSlower due to partial unpredictabilityMinutes to hours
Strong (>12 characters, mix of letters, numbers, and symbols)G@7$#m!Xz29Highly unlikelyRequires extensive computationNot found in pre-computed tablesYears to centuries
Very strong (>16 characters, randomly generated)B^&hZ0sTq1*!93Not in dictionariesPractically infeasibleHash cannot be reversed easilyCenturies or more

Summary of key findings and research gaps in prior studies

StudyKey findingsResearch gaps
Kwon et al. [3]Classified password-cracking methods into dictionary attacks, brute-force attacks, and hybrid approaches. Highlighted the effectiveness of optimized dictionaries.Did not explore countermeasures in-depth or propose improved password security strategies.
Florêncio and Herley [1]Found that complexity requirements in password policies often lead to predictable patterns.Lacked experimental validation of alternative password creation strategies.
Toubiana et al. [10]Demonstrated that user psychology plays a crucial role in password security and retention.Did not propose concrete solutions to balance usability and security.
Bonneau et al. [11]Reviewed alternative authentication methods like biometrics and hardware tokens. Found limitations in spoofability and hardware failure risks.Did not address how these alternatives compare in real-world adoption.
Wang and Zhang [12]Found that password managers improve security but also pose risks if compromised.Did not analyze specific attack vectors against password managers.
Liu et al. [2]Developed a machine learning model for predicting password strength, improving accuracy over traditional heuristics.Did not implement real-world usability testing for their model.
Wu et al. [5]Showed that cybersecurity training improves password security awareness and user behavior.Did not measure long-term retention of learned security habits.
Hadnagy [13]Analyzed social engineering attacks and their role in password security breaches.Did not propose effective large-scale mitigation techniques.
Miller et al. [4]Compared efficiency of password-cracking tools (e.g., Hashcat and John the Ripper).Lacked evaluation of emerging AI-powered password-cracking methods.
Das et al. [7]Investigated rainbow table attacks and emphasized salting as an effective countermeasure.Did not explore advanced alternatives such as memory-hard hashing functions.
McCarty and Leach [16]Explored MFA as a supplement to passwords. Found usability challenges limiting adoption.Did not propose strategies for improving MFA usability.
Zhang et al. [18]Developed a deep learning model to predict weak passwords with high accuracy.Lacked analysis on defenses against AI-driven password attacks.
Wu et al. [5]Demonstrated that longer passwords significantly reduce cracking success rates.Did not evaluate the usability trade-offs of very long passphrases.
Ruoti and Muir [9]Studied password reuse across multiple sites and found that reuse increases vulnerability.Did not propose large-scale mitigation strategies for password reuse.

User engagement and password security insights

MetricValueInsights
Total users engaged>500Indicates strong interest in password security.
Average password length9.2 charactersSuggests most users create moderately strong passwords.
Weak passwords detected42%A significant portion of users still use insecure passwords.
Moderate passwords detected35%Users have some security awareness but room for improvement.
Moderate passwords detected35%Users have some security awareness but room for improvement.
Strong passwords detected23%Only a minority of users follow best practices for password security.
Most common attack success rate60% (dictionary attacks)Highlights the widespread use of common or predictable passwords.
Average time to crack weak passwords<1 minDemonstrates how easily weak passwords can be exploited.
Average time to crack strong passwords>10 yearsStrong passwords remain highly resistant to attacks.
Most common hashing algorithm usedSHA-256Indicates the preferred standard among users.
User improvement after feedback30% improved passwordsShows the educational impact of PassCrack recommendations.
Language: English
Submitted on: Jan 9, 2025
Published on: Jun 10, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2025 Pooja Bagane, Mokshada Sable, Aarohi Panicker, Anujesh Ansh, Obsa Amenu Jebessa, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.