Randomly chosen e-mail addresses recovered from Gravatars on the website stackoverflow.com

MD5 hashe-mail
327e60e4d24a3511bd00e82732101765j******l@gmail.com
33f9a56f55dd1e7a97f6599d0f879982j*********y@hotmail.com
87f93dcfbb48d004264771b9d4739086r********0@yahoo.com
d73a693bf9576ec04ae831d66c26498de****************1@hotmail.com
ea34fd67a05182d8384b5acadf683ab1d*******n@yahoo.co.in
a3351c3660b9a47cd76bbb494f454a68a**********9@gmail.com
3155ae8d6fea002230e35e076c31c91ei***********g@gmail.com
c7829766e13132cdc990e03f9f9aabcfp****f@well.com
42b8312de2a2de7147bf87cb97ae7043g*************0@yahoo.com
8fbf25cd953fab1a015f6be56d9fc5b7c*********2@hotmail.com
ae21fe22eaa490eddadddba6d697b27dp************8@gmail.com
e52bac93fb01b547a5e2b4a0ecf9cc88k*********o@gmail.com
58d127ef8887e494011e5f8fb6979abdw******m@gmail.com
e0f614ef9e50e75a07c297c9d91243e2k*********s@gmail.com
bf95b585b996e4e9ba5fb89e565bfb0ac***************9@hotmail.com
8b188e997fb796ddc48262aa8ce7dc58s******n@hotmail.com
1d9eeef25ba189c64f5e675921fb0ec4h***********g@gmail.com
bef41597aa3b6c7ce23c58e2c7f29ffcj******h@gmail.com
75aea27d01bec65f5a925132fe7ac81cx********u@gmail.com
2a1b546595727d6b9664106850e61a76a*************3@gmail.com

Losowo wybierane adresy e-mail odtworzone z Gravatarów w serwisie jakoszczedzacpieniadze.pl

MD5 hashe-mail
c612dc02a45452775b59310933ac9d38e*********k@gmail.com
f6c708ed23db859e497fd718e0994c28a************k@gmail.com
bcc86a0313ba83b4249dc520bde0f33da***************i@interia.pl
9dbd1a1ab52505b00dee8f1d6303f078p*******k@outlook.com
4ea80fe7f05b7a83c7c59601bbba5ab2r******3@wp.pl
1b21e6186bd155fcb4a3bb2ec29a8f90m***************k@mail.com
ab5ddc49a95ec33031bcd19cd1e721cdi**********l@gmail.com
af402a8465e7e1ad40f6a65a6de470fch**********1@wp.pl
6d7d2fa49fe3a7fbc54804cabcd6093eb************z@wp.pl
988226d6173836c1e8e1f2c0f01763afd******6@wp.pl
87949d146d5245c50476dabda3ccefe5w****z@vp.pl
ee8ebee9577601de90919b89f39caffev*******a@gmail.com
e5faef2c48d59d2f4d09a6845fc743dar*****l@gluwer.com
72fc5ae3936b80467a21e29686cb0890a******1@op.pl
dd2afef52e81d2b0084eeb53d535887fo*********a@gmail.com
16d525c14069556b3df8135320aaee7as****************a@gmail.com
5a45ec22c5a645548dd4299b691c3cedw***********5@gmail.com
2fd9c94fc11550eaeb8dc1749d77cf84s************m@gmail.com
e5cac9d462885558576f5b72e2d32903k*********1@gmail.com
75a35f8f3ec2e1f0f036b89a30ec638dm*************a@interia.pl

Zabezpieczanie haseł w systemach informatycznych

Celem artykułu jest usystematyzowanie metod zabezpieczania statycznych haseł przechowywanych na potrzeby systemów informatycznych, w szczególności serwisów internetowych, wskazanie słabych stron zaprezentowanych metod oraz wyciągnięcie wniosków w postaci zaleceń dla projektantów systemów informatycznych. Na wstępie przedstawiono pojęcie kryptograficznej funkcji skrótu, a następnie omówiono kolejne metody przechowywania haseł, pokazując ich ewolucję oraz podatności na współczesne ataki. Pokazano wyniki badań nad hasłami maskowanymi w polskich bankach oraz przedstawiono najciekawsze przykłady współczesnych funkcji adaptacyjnych. Następnie dokonano autorskiej systematyzacji metod zabezpieczania haseł oraz wskazano kierunki dalszych badań. Słowa kluczowe: informatyka, hasła, uwierzytelnianie, zabezpieczanie danych, funkcje skrótu.


Password protection in IT systems

The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed. At the beginning, the concept of cryptographic hash function is presented, following discussion of methods of storing passwords showing their evolution and susceptibility to modern attacks. Results of research on masked passwords of Polish banks IT systems
are presented, as well as the most interesting examples of adaptive password functions are given. Then, the systematisation of password protection methods was carried out. Finally, the directions for
further research are indicated.


DOI: 10.5604/01.3001.0011.8036
GICID: 01.3001.0011.8036
Biuletyn WAT 2018; 67 (1): 73-92


Link: https://biuletynwat.pl/resources/html/article/details?id=170409

Kryptograficzne funkcje skrótu

Celem artykułu jest przegląd informacji dotyczących funkcji skrótu oraz przedstawienie najnowszych osiągnięć kryptografii w tym zakresie. Wyjaśnione są podstawowe pojęcia dotyczące funkcji skrótu, ich zastosowanie oraz metody ataków. Pokazany jest bieżący stan kryptoanalizy znanych i powszechnie stosowanych funkcji skrótu: MD4, MD5, SHA. Na zakończenie omówiona jest przyszłość funkcji skrótu i zakończony konkurs na nowy standard funkcji SHA-3.


Cryptographic hash functions

The article presents a synthesis of information about the hash function and shows the latest developments in this field of cryptography. Basic concepts of the hash function are explained: definition, properties, classification, usage of the hash function and methods of attacks. The current state of cryptanalysis of known and commonly used hash functions (MD, SHA) is shown as well as consequences coming from this. At the end the attention will be paid to the future of the hash function and the current state of art in the competition for developing the new standard of SHA-3 function.


Zeszyty Naukowe Akademii Marynarki Wojennej, 2 (193), 2013, 91-102


Link: https://www.amw.gdynia.pl/images/AMW/Menu-zakladki/Nauka/Zeszyty_naukowe/Numery_archiwalne/2013/ZN_2013_2/11_Rodwald%20P.pdf

Survey PNA 2018

The results of the password security survey conducted among students at the Polish Naval Academy in 2018.

The survey was conducted at all faculties, both among military and civil students, both among Polish students (460 questionnaires) and foreign (50 questionnaires) as part of the diploma thesis.


1. The first group of questions concerns general issues related to passwords.


Do you use the same password on different websites?

AnswerNumber of answers
codemeaningquantitypercentage
TYES25755.87 %
NNO20344.13 %


How many unique passwords do you have to protect your Internet accounts/profiles?

AnswerNumber of answers
codemeaningquantitypercentage
=1=1296.30 %
2-32-323751.52 %
4-54-513028.26 %
6-6-6413.91 %


Have you ever thought about the safety of your Internet passwords?

AnswerNumber of answers
codemeaningquantitypercentage
TYES33873.48 %
NNO12226.52 %


2. The second group of questions concerns the level of difficulty for passwords belonging to particular categories.


Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Financial services for example Internet banks

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak20.43 %
2Weak40.87 %
3Medium429.13 %
4Strong13529.35 %
5Very strong27760.22 %


Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Social networks for example Facebook

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak30.65 %
2Weak204.35 %
3Medium11825.65 %
4Strong21847.39 %
5Very strong10121.96 %


Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Access to email for example Gmail

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak61.30 %
2Weak235.00 %
3Medium11625.22 %
4Strong20644.78 %
5Very strong10923.70 %


Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Entertainment services for example Netflix

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak173.70 %
2Weak4810.43 %
3Medium17337.61 %
4Strong15633.91 %
5Very strong6614.35 %


Set the level of difficulty of the password you use (or you would use) for the following categories of Internet services: Electronic commerce services for example Amazon

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak132.83 %
2Weak265.65 %
3Medium14030.43 %
4Strong17137.17 %
5Very strong11023.91 %

All above presented results on one figure (from left to right):

  • Financial services
  • Social networks
  • Access to email
  • Entertainment services
  • Electronic commerce

3. The third group of questions concerns a subjective opinion on the strength of passwords.


Password strenght 1467234690

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak449.57 %
2Weak9320.22 %
3Medium16235.22 %
4Strong12026.09 %
5Very strong418.91 %


Password strenght 19860425

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak5511.96 %
2Weak14030.43 %
3Medium16836.52 %
4Strong7616.52 %
5Very strong214.57 %


Password strenght zxcvbn12

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak163.48 %
2Weak7716.74 %
3Medium15533.70 %
4Strong15233.04 %
5Very strong6013.04 %


Password strenght Q2W3E4R5

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak183.91 %
2Weak8718.91 %
3Medium16034.78 %
4Strong14230.87 %
5Very strong5311.52 %


Password strenght qazwsxed

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak398.48 %
2Weak12627.39 %
3Medium19041.30 %
4Strong8618.70 %
5Very strong194.13 %


Password strenght KasiaNowak

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak34875.65 %
2Weak7516.30 %
3Medium245.22 %
4Strong51.09 %
5Very strong81.74 %


Password strenght K@$i@N0w@k

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak357.61 %
2Weak9420.43 %
3Medium10723.26 %
4Strong14130.65 %
5Very strong8318.04 %


Password strenght KawonAisak

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak6514.13 %
2Weak17337.61 %
3Medium17137.17 %
4Strong449.57 %
5Very strong71.52 %


Password strenght iwonka21

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak19642.61 %
2Weak18640.43 %
3Medium6113.26 %
4Strong102.17 %
5Very strong71.52 %


Password strenght KarOlcia9

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak11925.87 %
2Weak18840.87 %
3Medium11925.87 %
4Strong235.00 %
5Very strong112.39 %


Password strenght Aizuz1996!

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak4710.22 %
2Weak15433.48 %
3Medium15834.35 %
4Strong7616.52 %
5Very strong255.43 %


Password strenght RDE1095Ja

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak81.74 %
2Weak459.78 %
3Medium15233.04 %
4Strong18039.13 %
5Very strong7516.30 %


Password strenght passw0rd

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak16736.30 %
2Weak17437.83 %
3Medium8718.91 %
4Strong224.78 %
5Very strong102.17 %


Password strenght Q5!gH$?aWd

AnswerNumber of answers
codemeaningquantitypercentage
1Very weak61.30 %
2Weak91.96 %
3Medium296.30 %
4Strong12326.74 %
5Very strong29363.70 %


Comparison of strength of passwords which belongs to particular group.

In the real survey, passwords belonging to the same group were not
one next to the other.

Group 1

The first group of passwords consists of numbers only: 19860425 (8-digits) and 1467234690 (10-digits).


Group 2

The second group of passwords consists of a combination of keys located close to each other on the keyboard : zxcvbn12, Q2W3E4R5, qazwsxed.


Group 3

The third group of passwords consists of string made only from first and last names in three different forms: KasiaNowak (name and surname), K@$i@N0w@k (name and surname enriched with LeetSpeek – exchange of selected letters for special characters), KawonAisak (name and last name is a reverse).


Grupa 4

The fourth group of passwords consists of name only, enriched with: digits iwonka21; uppercase letters and digitKarOlcia9; reverse, digits and special sign Aizuz1996!.