{"id":1296,"date":"2024-12-14T13:09:10","date_gmt":"2024-12-14T12:09:10","guid":{"rendered":"https:\/\/mindynamic.com\/en\/?p=1296"},"modified":"2025-05-02T12:09:48","modified_gmt":"2025-05-02T10:09:48","slug":"secure-passwords-in-the-age-of-ai-what-really-matters","status":"publish","type":"post","link":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/","title":{"rendered":"Secure Passwords in the age of AI: What Really Matters"},"content":{"rendered":"\n<p style=\"margin-top:var(--wp--preset--spacing--medium)\">For decades, we\u2019ve been taught to create passwords using a combination of numbers, uppercase and lowercase letters, and special characters. But is this really the best approach? Are there perhaps other ways to generate secure passwords and how does AI help attackers to crack passwords? In this post, we will explore these questions.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);margin-right:0;margin-left:0;padding-right:0;padding-left:0\">Although current efforts increasingly aim to minimize the use of passwords \u2013 for example, through passkeys \u2013 passwords will remain with us for the foreseeable future. They are especially essential in the realm of system access and accounts, where authentication via a password or secret remains the most common method.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Password Entropy<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">A secure password is defined by a level of complexity that makes it economically impractical for attackers to crack. The complexity of a password can be increased in two ways \u2013 either through a larger character set or by increasing the password length.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">To calculate password complexity, the concept of password entropy is used. This is measured in bits and indicates the actual strength of a password.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Before diving deeper into this, let&#8217;s first take a look at how long it takes to crack passwords with different character sets and lengths. The table below is published annually by Hive Systems:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-kadence-image kb-image1296_c66dac-1f size-medium_large\"><a href=\"https:\/\/www.hivesystems.com\/password\" class=\"kb-advanced-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-768x768.png\" alt=\"Brute force password attack list\" class=\"kb-img wp-image-1424\" srcset=\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-768x768.png 768w, https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-300x300.png 300w, https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-1024x1024.png 1024w, https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-150x150.png 150w, https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square-1536x1536.png 1536w, https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/Hive-Systems-Password-Table-2024-Square.png 2000w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">It is based on a so-called brute-force attack, meaning that all possible combinations are systematically tested. More about the different types of attacks will be covered in the next chapter.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">So, what do these numbers from the table mean? Does this mean that it always takes exactly that long to crack a password with the corresponding complexity?<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">No, the values in the table represent a worst-case scenario. This means that all possible combinations must be tested to find the correct one.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">For example: A password with 8 uppercase and lowercase letters could take 8 months to crack in the worst case. However, it&#8217;s also possible that the password could be found much earlier. The more complex a password is, the less likely it is that it will be randomly cracked quickly. This is why it&#8217;s important to allow some flexibility in complexity.<\/p>\n\n\n\n<p><strong>One thing to consider: <\/strong>the tested passwords where hashed with bcrypt, one of the gold standards in password hashing. This hashing algorithm is slow on purpose. If the tested passwords would have been hashed with a fast algorithm like SHA, the search could be faster by a factor of a million!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What can we learn from the table?<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">The table shows that a secure password can be created with relatively few characters when a complex character set is used\u2014comprising uppercase and lowercase letters, numbers, and special characters.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">More importantly, we also see that it is possible to create secure passwords with a smaller character set.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">For example, a password made solely of random numbers, when 18 characters long, can be considered secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is that?<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">This is where password entropy comes into play.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Let\u2019s take a password with 10 characters and a character set consisting of uppercase and lowercase letters, numbers, and symbols (a total of 32 characters). This password has an entropy of approximately 66 bits, or about 1.8 \u00d7 10\u00b9\u2079 possibilities (18,446,744,073,709,551,616).<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Now, comparing this with an 18-character password made only of numbers, we get an entropy of 60 bits\u2014just 6 bits less.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">So, we conclude: The entropy of a password is what matters most, not necessarily the use of different character types or symbols.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"margin-bottom:var(--wp--preset--spacing--small)\">Principles for Secure Passwords<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);margin-bottom:var(--wp--preset--spacing--small)\">Before we dive into what really matters when creating secure passwords, let&#8217;s first take a look at some basic best practices:<\/p>\n\n\n\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items1296_dd02a6-9c kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\">\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_2ce052-81\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Unique Password for Each Account<\/strong><\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_e6f306-4a\"><div class=\"kt-svg-icon-list-single\" style=\"display: inline-flex; justify-content: center; align-items: center;\"><svg viewBox=\"0 0 24 24\" height=\"1em\" width=\"1em\" fill=\"none\" stroke=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"display: inline-block; vertical-align: middle;\"><\/svg><\/div><span class=\"kt-svg-icon-list-text\">Using the same password for multiple accounts is one of the biggest mistakes you can make\u2014and yet it remains widespread. A unique password for each account protects against unpleasant surprises.<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_64dde1-97\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Use a Password Manager<\/strong><\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_0301af-60\"><div class=\"kt-svg-icon-list-single\" style=\"display: inline-flex; justify-content: center; align-items: center;\"><svg viewBox=\"0 0 24 24\" height=\"1em\" width=\"1em\" fill=\"none\" stroke=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"display: inline-block; vertical-align: middle;\"><\/svg><\/div><span class=\"kt-svg-icon-list-text\">Given the number of accounts and logins we require today, along with the best practice of using a different password for each one, a password manager is essential. It securely stores passwords and generates unique combinations for every account.<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_73d42b-89\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Check for Password Leaks<\/strong><\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_57ac4d-41\"><div class=\"kt-svg-icon-list-single\" style=\"display: inline-flex; justify-content: center; align-items: center;\"><svg viewBox=\"0 0 24 24\" height=\"1em\" width=\"1em\" fill=\"none\" stroke=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"display: inline-block; vertical-align: middle;\"><\/svg><\/div><span class=\"kt-svg-icon-list-text\">Leaked or &#8220;pwned&#8221; passwords are those that were stolen during past attacks. They pose a significant risk because they can be used in future attacks. A good password manager offers an automatic check for such leaks.<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_08a0ea-9b\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Avoid Using Passwords from Common Lists<\/strong><\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_6e4a2a-fa\"><div class=\"kt-svg-icon-list-single\" style=\"display: inline-flex; justify-content: center; align-items: center;\"><svg viewBox=\"0 0 24 24\" height=\"1em\" width=\"1em\" fill=\"none\" stroke=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"display: inline-block; vertical-align: middle;\"><\/svg><\/div><span class=\"kt-svg-icon-list-text\">Frequently used passwords are often compiled into password lists, which allow attackers to quickly and efficiently crack passwords. Using automatically generated passwords from a password manager helps minimize this risk.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Types<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">To crack passwords, attackers use various methods that differ in complexity and effort. Phishing and social engineering have been deliberately excluded as these attack methods have nothing to do with password complexity. These are also the the strategies that AI has the biggest impact. For example to write convincing email based on personal information of the victim (spear-phishing). Now let&#8217;s look at the most common attack types:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Brute-Force Attack<\/h4>\n\n\n\n<p style=\"margin-top:0\">In a brute-force attack, all possible combinations of characters are systematically tested until the correct password is found. This is the method most people associate with password cracking, though it is rarely used by attackers.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">AI can help help to make these attacks more efficient by trying more likely combinations first. But this comes with the added cost of even more necessary compute power. Therefore the impact on this type of attack is small.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong>Advantage for attackers:<\/strong> Guaranteed success as long as there is sufficient time and computational power.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong>Disadvantage for attackers:<\/strong> Very time- and resource-intensive, especially with passwords that have high entropy (long and complex combinations).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--medium);padding-bottom:0\">Mask Attack<\/h4>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0;padding-top:0\">A mask attack is an optimized version of a brute-force attack. Instead of testing all possible combinations of characters, attackers use specific patterns or rules to guess passwords. These rules are often based on common behaviors and known password formats, such as those frequently used in practice or when certain information about a password (such as length or character set) has already been leaked through an enumeration attack.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">As with brute-force attacks the impact of AI for this kind of attack is small. It can be merely used to optimize the search for the filtered possibilities.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong><strong>Advantage for attackers:<\/strong> <\/strong> Significantly faster than a brute-force attack.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong><strong>Disadvantage for attackers:<\/strong><\/strong> Still very time- and resource-intensive depending on the level of information available.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Dictionary Attack<\/h4>\n\n\n\n<p style=\"margin-top:0;padding-top:0\">In a dictionary attack, passwords are tested using dictionaries or precompiled lists of common words or leaked passwords. This method is faster than a brute-force attack because it only tests likely passwords.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">With AI attackers can generate optimized list that are based on leaked and commonly used password. AI can have a big impact on this kind of attack if your password is weak. A tool that gained a lot of popularity is <a href=\"https:\/\/arxiv.org\/abs\/1709.00440\">PassGAN<\/a>.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong><strong>Advantage for attackers:<\/strong>  <\/strong>Password can usually be cracked within minutes if it is on the list.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);padding-top:0\"><strong><strong>Disadvantage for attackers:<\/strong><\/strong> Works only on weak passwords that are based on dictionary entries or leaked passwords.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\"><strong>Risk:<\/strong> These lists are constantly updated and optimized.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creating Secure Passwords<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Based on the insights we&#8217;ve gained, how should we create passwords?<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">To answer this question, we need to distinguish between different use cases:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">User Passwords for Manual Entry<\/h4>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Some passwords must be manually entered by the user. With consistent use of a password manager, this should generally only be the master password of the password manager itself. Regardless of the technological measures used for digital account management, there will always be at least one account or password that must be entered manually. This master password should be something you can remember easily. For additional security, it can be backed up in the password manager.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">From the previous insights, we know that special characters or symbols are not strictly necessary to make a password secure. For this particular use case, choose a password that is easy to remember, consists of as many characters as possible, and has no personal connection to you. A proven method is using a passphrase\u2014 a password made up of multiple words. This is the same principle that is used in crypto wallets. This passphrase should have nothing to do with you. And the weirder and unlikely it is, the easier to it is to remember. For example:<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);margin-bottom:0;padding-top:0;padding-bottom:0\">&#8220;seven rubber Duckies play golf in the desert&#8221;<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);padding-top:0;padding-bottom:0\">Hint: The &lt;space&gt; counts as special character and is apparently the least used of all the available special character. This makes it a great candidate for a password.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Mindynamic recommends creating a passphrase of 18 characters or more, without hard to remember special characters, to optimally combine user-friendliness, security, and memorability.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">User Passwords in the Password Manager<\/h4>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Every password manager allows you to configure a standard policy for the password generator. Since many services still require special characters and often impose a maximum password length, we recommend a standard policy of 14 characters, incorporating uppercase and lowercase letters, numbers, and special characters. It is advisable to limit the special characters to those that are unproblematic (e.g., !, ?, $, *, #, +, @) to avoid compatibility issues.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">This policy ensures a high level of security while meeting the requirements of most platforms.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">System Accounts and Service Principals<\/h4>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Since these accounts are often used for autonomous authentication by programs, scripts, and services where multi-factor authentication is not possible, we recommend using passwords with at least 20 characters. These should consist of uppercase and lowercase letters and numbers, but should not include special characters. Special characters might cause issues, as they could be interpreted by executing programs as &#8220;special characters,&#8221; potentially interfering with the correct execution.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Are you unsure if your chosen password is sufficiently secure? We recommend using the password entropy calculator from Omnicalculator. This tool helps you evaluate the strength of your password: <a href=\"https:\/\/www.omnicalculator.com\/other\/password-entropy\">Password Entropy Calculator<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Password Changes<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Some of you might be wondering about the still commonly practiced method of periodically changing passwords to enhance security.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">We will explore this and other topics related to the implementation of security policies in a detailed follow-up article.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Stay tuned!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Brute-force attacks are rarely used today because they are resource-intensive, costly, slow, and often ineffective. Instead, attackers prefer phishing and social engineering attacks. However, if you use a weak or leaked password, it can be cracked in a short amount of time. Therefore, using secure passwords remains essential.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Secure passwords do not necessarily need to contain an exceptionally large character set. What is far more crucial for security is the length of the password, as more characters have a much greater impact on entropy and, thus, on resistance to attacks than the variety of characters used.<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small)\">Unfortunately, most services still check the character set used, such as uppercase and lowercase letters, as well as the inclusion of symbols, instead of evaluating the actual entropy of the password.<\/p>\n\n\n\n<p>The updated password guidelines from the National Institute of Standards and Technology (NIST) support the approaches discussed in this article. A summary of these guidelines and their key changes can be found here: <a href=\"https:\/\/sprinto.com\/blog\/nist-password-guidelines\/\">NIST Password Guidelines: Updated as per the Recent Version<\/a><\/p>\n\n\n\n<p>AI does have a huge impact in social engineering, but not as much on the password attacks as we might expect. As long as one uses basic principles for secure passwords, there is nothing to worry about. Additionally, interactive accounts should always be backed up by multifactor authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommendations<\/h3>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);margin-bottom:var(--wp--preset--spacing--small)\">As mentioned earlier, using a good password manager is essential. There are many good password managers out there, but Mindynamic recommends <a href=\"https:\/\/bitwarden.com\">Bitwarden<\/a> for the following reasons:<\/p>\n\n\n\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items1296_7a8ba3-87 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\">\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_b32b49-85\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Open Source<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_5e52ae-c0\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Integration with All Major Browsers<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_21d165-0c\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Mobile and Desktop Apps<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_383dd3-b5\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Passkey Support<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_d733f1-90\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Custom Fields<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_456cbc-a4\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Biometric Support<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_1ae7ec-d1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Dark Web Monitoring<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--small);margin-bottom:var(--wp--preset--spacing--small)\">For <strong>Enterprise Users<\/strong>, Bitwarden also offers:<\/p>\n\n\n\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items1296_08d9d9-3d kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\">\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_86650b-cf\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Entra-ID Integration<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_0d5cbc-3f\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Company Vault<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_f29706-8f\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Enterprise Policies<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_00b98a-b7\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">SIEM Integration<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_0760cb-e3\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Account Recovery<\/span><\/li>\n\n\n\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-1296_a3e001-bd\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">CLI and API<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>By using Bitwarden, you can ensure your passwords are managed securely, both individually and across your organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For decades, we\u2019ve been taught to create passwords using a combination of numbers, uppercase and lowercase letters, and special characters. But is this really the best approach? Are there perhaps other ways to generate secure passwords and how does AI help attackers to crack passwords? In this post, we will explore these questions. Although current [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97],"tags":[117,119,113,111,120,112,118,109,115,116],"class_list":["post-1296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-attack","tag-authentication","tag-bitwarden","tag-brute-force","tag-complexity","tag-dictionary","tag-entropy","tag-hacker","tag-password","tag-passwordmanager"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH<\/title>\n<meta name=\"description\" content=\"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH\" \/>\n<meta property=\"og:description\" content=\"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"Mindynamic GmbH\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-14T12:09:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-02T10:09:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pvogler@mindynamic.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pvogler@mindynamic.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\"},\"author\":{\"name\":\"pvogler@mindynamic.com\",\"@id\":\"https:\/\/mindynamic.com\/en\/#\/schema\/person\/9747aea85a3f2ecc4efefb93610de115\"},\"headline\":\"Secure Passwords in the age of AI: What Really Matters\",\"datePublished\":\"2024-12-14T12:09:10+00:00\",\"dateModified\":\"2025-05-02T10:09:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\"},\"wordCount\":1960,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mindynamic.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg\",\"keywords\":[\"Attack\",\"Authentication\",\"Bitwarden\",\"Brute-Force\",\"Complexity\",\"Dictionary\",\"Entropy\",\"Hacker\",\"Password\",\"Passwordmanager\"],\"articleSection\":[\"IT-Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\",\"url\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\",\"name\":\"Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/mindynamic.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg\",\"datePublished\":\"2024-12-14T12:09:10+00:00\",\"dateModified\":\"2025-05-02T10:09:48+00:00\",\"description\":\"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?\",\"breadcrumb\":{\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage\",\"url\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg\",\"contentUrl\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg\",\"width\":1920,\"height\":1200,\"caption\":\"sicheres Passwort\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mindynamic.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Passwords in the age of AI: What Really Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mindynamic.com\/en\/#website\",\"url\":\"https:\/\/mindynamic.com\/en\/\",\"name\":\"mindynamic.com\",\"description\":\"Your Partner for Innovative IT Solutions\",\"publisher\":{\"@id\":\"https:\/\/mindynamic.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mindynamic.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mindynamic.com\/en\/#organization\",\"name\":\"Mindynamic GmbH\",\"url\":\"https:\/\/mindynamic.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mindynamic.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/11\/FullLogo_Transparent_NoBuffer-Bold.png\",\"contentUrl\":\"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/11\/FullLogo_Transparent_NoBuffer-Bold.png\",\"width\":1280,\"height\":169,\"caption\":\"Mindynamic GmbH\"},\"image\":{\"@id\":\"https:\/\/mindynamic.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mindynamic.com\/en\/#\/schema\/person\/9747aea85a3f2ecc4efefb93610de115\",\"name\":\"pvogler@mindynamic.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mindynamic.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/77afbb06327c88ad0aefee75e47408229e7c5961e99c5c96ac16ae2229c47492?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/77afbb06327c88ad0aefee75e47408229e7c5961e99c5c96ac16ae2229c47492?s=96&d=robohash&r=g\",\"caption\":\"pvogler@mindynamic.com\"},\"sameAs\":[\"https:\/\/mindynamic.com\"],\"url\":\"https:\/\/mindynamic.com\/en\/author\/pvoglermindynamic-ch\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH","description":"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/","og_locale":"en_GB","og_type":"article","og_title":"Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH","og_description":"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?","og_url":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/","og_site_name":"Mindynamic GmbH","article_published_time":"2024-12-14T12:09:10+00:00","article_modified_time":"2025-05-02T10:09:48+00:00","og_image":[{"width":1920,"height":1200,"url":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg","type":"image\/jpeg"}],"author":"pvogler@mindynamic.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pvogler@mindynamic.com","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#article","isPartOf":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/"},"author":{"name":"pvogler@mindynamic.com","@id":"https:\/\/mindynamic.com\/en\/#\/schema\/person\/9747aea85a3f2ecc4efefb93610de115"},"headline":"Secure Passwords in the age of AI: What Really Matters","datePublished":"2024-12-14T12:09:10+00:00","dateModified":"2025-05-02T10:09:48+00:00","mainEntityOfPage":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/"},"wordCount":1960,"commentCount":0,"publisher":{"@id":"https:\/\/mindynamic.com\/en\/#organization"},"image":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg","keywords":["Attack","Authentication","Bitwarden","Brute-Force","Complexity","Dictionary","Entropy","Hacker","Password","Passwordmanager"],"articleSection":["IT-Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/","url":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/","name":"Secure Passwords in the age of AI: What Really Matters - Mindynamic GmbH","isPartOf":{"@id":"https:\/\/mindynamic.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage"},"image":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg","datePublished":"2024-12-14T12:09:10+00:00","dateModified":"2025-05-02T10:09:48+00:00","description":"What makes passwords secure, how are they generated, and what additional factors should be considered in the age of AI?","breadcrumb":{"@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#primaryimage","url":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg","contentUrl":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/12\/login-7626832_1920.jpg","width":1920,"height":1200,"caption":"sicheres Passwort"},{"@type":"BreadcrumbList","@id":"https:\/\/mindynamic.com\/en\/2024\/12\/14\/secure-passwords-in-the-age-of-ai-what-really-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mindynamic.com\/en\/"},{"@type":"ListItem","position":2,"name":"Secure Passwords in the age of AI: What Really Matters"}]},{"@type":"WebSite","@id":"https:\/\/mindynamic.com\/en\/#website","url":"https:\/\/mindynamic.com\/en\/","name":"mindynamic.com","description":"Your Partner for Innovative IT Solutions","publisher":{"@id":"https:\/\/mindynamic.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mindynamic.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/mindynamic.com\/en\/#organization","name":"Mindynamic GmbH","url":"https:\/\/mindynamic.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mindynamic.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/11\/FullLogo_Transparent_NoBuffer-Bold.png","contentUrl":"https:\/\/mindynamic.com\/en\/wp-content\/uploads\/sites\/4\/2024\/11\/FullLogo_Transparent_NoBuffer-Bold.png","width":1280,"height":169,"caption":"Mindynamic GmbH"},"image":{"@id":"https:\/\/mindynamic.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mindynamic.com\/en\/#\/schema\/person\/9747aea85a3f2ecc4efefb93610de115","name":"pvogler@mindynamic.com","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mindynamic.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77afbb06327c88ad0aefee75e47408229e7c5961e99c5c96ac16ae2229c47492?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77afbb06327c88ad0aefee75e47408229e7c5961e99c5c96ac16ae2229c47492?s=96&d=robohash&r=g","caption":"pvogler@mindynamic.com"},"sameAs":["https:\/\/mindynamic.com"],"url":"https:\/\/mindynamic.com\/en\/author\/pvoglermindynamic-ch\/"}]}},"_links":{"self":[{"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/posts\/1296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/comments?post=1296"}],"version-history":[{"count":22,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/posts\/1296\/revisions"}],"predecessor-version":[{"id":1459,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/posts\/1296\/revisions\/1459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/media\/1298"}],"wp:attachment":[{"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/media?parent=1296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/categories?post=1296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mindynamic.com\/en\/wp-json\/wp\/v2\/tags?post=1296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}