zxcvbn password complexity algorithm in golang
Go to file
Nathan Button 621312d738 Merge pull request #13 from bjacokes/bjacokes.logflags
Remove global changes to log.flags
2016-03-04 15:02:45 -07:00
Godeps added Go deps 2016-01-13 15:02:53 -07:00
adjacency Remove global changes to log.flags 2016-03-03 13:46:58 -08:00
data Fixed the spatial match issue. Added more test 2016-01-19 11:59:29 -07:00
entropy passwords now passing through the 1337 matcher. Not sure if scoring is correct. 2016-01-29 14:53:09 -07:00
frequency fat 2016-01-13 15:49:04 -07:00
match Pull entropy calculation into its own file. Simplified the Match struct. matching now populates Match.Entropy. 2016-01-21 15:26:33 -07:00
matching missed a file 2016-01-29 14:53:33 -07:00
scoring Pull entropy calculation into its own file. Simplified the Match struct. matching now populates Match.Entropy. 2016-01-21 15:26:33 -07:00
utils/math fat 2016-01-13 15:49:04 -07:00
.gitignore Scoring partly done. Its now in a state that it can be used. =D 2015-10-06 12:43:37 -06:00
LICENSE.txt Update LICENSE.txt 2015-10-06 14:11:02 -06:00
README.md Start work on l33t. 2016-01-27 17:11:50 -07:00
zxcvbn.go fat 2016-01-13 15:49:04 -07:00
zxcvbn_test.go passwords now passing through the 1337 matcher. Not sure if scoring is correct. 2016-01-29 14:53:09 -07:00

README.md

This is a goLang port of python-zxcvbn and zxcvbn, which are python and JavaScript password strength generators. zxcvbn attempts to give sound password advice through pattern matching and conservative entropy calculations. It finds 10k common passwords, common American names and surnames, common English words, and common patterns like dates, repeats (aaa), sequences (abcd), and QWERTY patterns.

Please refer to http://tech.dropbox.com/?p=165 for the full details and motivation behind zxcbvn. The source code for the original JavaScript (well, actually CoffeeScript) implementation can be found at:

https://github.com/lowe/zxcvbn

Python at:

https://github.com/dropbox/python-zxcvbn

For full motivation, see:

http://tech.dropbox.com/?p=165


Use

The zxcvbn module has the public method PasswordStrength() function. Import zxcvbn, and call PasswordStrength(password string, userInputs []string). The function will return a result dictionary with the following keys:

Entropy # bits

CrackTime # estimation of actual crack time, in seconds.

CrackTimeDisplay # same crack time, as a friendlier string: # "instant", "6 minutes", "centuries", etc.

Score # [0,1,2,3,4] if crack time is less than # [10^2, 10^4, 10^6, 10^8, Infinity]. # (useful for implementing a strength bar.)

MatchSequence # the list of patterns that zxcvbn based the # entropy calculation on.

CalcTime # how long it took to calculate an answer, # in milliseconds. usually only a few ms.

The userInputs argument is an splice of strings that zxcvbn will add to its internal dictionary. This can be whatever list of strings you like, but is meant for user inputs from other fields of the form, like name and email. That way a password that includes the user's personal info can be heavily penalized. This list is also good for site-specific vocabulary.

Bug reports and pull requests welcome!


Project Status

Use zxcvbn_test.go to check how close to feature parity the project is.


Acknowledgment

Thanks to Dan Wheeler (https://github.com/lowe) for the CoffeeScript implementation (see above.) To repeat his outside acknowledgements (which remain useful, as always):

Many thanks to Mark Burnett for releasing his 10k top passwords list: http://xato.net/passwords/more-top-worst-passwords and for his 2006 book, "Perfect Passwords: Selection, Protection, Authentication"

Huge thanks to Wiktionary contributors for building a frequency list of English as used in television and movies: http://en.wiktionary.org/wiki/Wiktionary:Frequency_lists

Last but not least, big thanks to xkcd :) https://xkcd.com/936/