Doing the Two-Step, Beyond the A.T.M.
BANK A.T.M.'s embody decades-old technology. A four-digit PIN? What a seemingly crude security system. Where are the uppercase and lowercase letters and the random punctuation that we are continually told are crucial to hacker-resistant passwords?
In fact, though, the four-digit numbers required to use cash machines are one element of an extremely strong security model that most of today's Web sites fall well short of matching.
Think about it: An A.T.M. requires the presentation of both a physical card and a correct PIN. Web sites can and should follow this general principle of requiring two dissimilar things before access is granted.
After supplying the password, that second thing could be a code that arrives as a text message on one's phone. A thief would find that stealing your password for a Web site was useless without also having your phone in hand.
The technical term for requiring something you know and something you have when trying to log into an online account is âtwo-factor authentication.â It's also known as two-step verification.
If this system, using passwords and smartphones, were used on all limited-access Web sites, the passwords wouldn't have to be long and complex. But many Web users have easy-to-guess passwords in just one-step verification, which is highly imprudent.
Nick Berry, president of DataGenetics, a consulting firm in Seattle, has analyzed the large password databases that hackers who have broken into various Web sites have publicly released. Among 30.3 million passwords he has found 3.4 million consisting of nothing but four digits. (It's astounding that there are still Web sites that permit these. I always encounter password requirements that force me to choose ever longer, more complex strings of characters, numbers and punctuation marks.)
Some four-digit passwords are far more popular than others: â1234â alone accounts for almost 11 percent of these passwords; â1111,â an additional 6 percent. Repetitive patterns occupy many of the other spots among the 20 most frequent numbers. Lower on the list are numbers that are likely to be a year of birth or the four-digit rendering of the month and day of a birthday.
We can speculate that some of the four-digit passwords found in Web sites' databases were first conceived as PINs for A.T.M.'s. They may also be serving as the users' PINs for unlocking smartphones. Mr. Berry says he also saw a number of instances of what he calls âfinger walkingâ on a keypad, in which the sequence comes from a geometric pattern, like â2580â - moving from top to bottom in the keypad's center.
The bank customer who chooses the year of her birth as her cash-machine PIN isn't putting her savings in great jeopardy. The thief who picks up a lost wallet with an A.T.M. card in it would have to guess the PIN correctly in just the first few tries, or the system would shut down the account. Even if successful, the thief would be limited by the ceiling on daily A.T.M. withdrawals. And, in cases of theft, the customer would be made whole by the bank for the loss.
When that short PIN is used as a password on the Web, however, without a second form of verification, it is just about the worst possible choice, almost as bad as choosing âpasswordâ as one's password. âUsing an A.T.M. PIN in the context of the online world is unwise,â says Marty Jost, a product marketing manager at Symantec, the computer security company. âUsing an easy-to-remember PIN is even more unwise because it's easy to guess.â
Mr. Jost says Web sites should use multiple layers of security so that âthe password is not the only authentication mechanism.â
Users of Gmail and other Google services, for example, can elect to have a two-step verification system to protect their accounts. When the system is activated, the user fills in the boxes for user name and password, as usual, but then is sent to another page where a verification code must be typed in. Users may choose to have this arrive as a text message, or they can obtain it by using an app on their smartphone. There's a backup method, too, in case their smartphone is lost or stolen.
PayPal and Dropbox also offer their users the option of requiring two-step verification for added peace of mind. Many corporate networks have long used this security model, too.
YES, it's a bit cumbersome. Jeff Atwood, a software developer, author, and co-founder of the programming question-and-answer site Stack Overflow, acknowledged this when he urged readers of his blog in April to use Gmail's two-step verification option.
But, he wrote, this process âis inconvenient in the same way that bank vaults and door locks are. The upside is that once you enable this, your e-mail becomes extremely secure.â
That feeling of security originates not with a long master password, which may fall into the hands of a bad actor, but with the elegantly simple two-step verification. The designers of A.T.M.'s were on to something.
Two-step verification for Gmail or other Web services can't work for us, however, unless we set it up. And there's no better time than the present to do so. âNot tomorrow. Not next week,â Mr. Atwood wrote. Now.
Randall Stross, a professor of business at San Jose State University, is the author of âThe Launch Pad,â published last month.
A version of this article appeared in print on October 14, 2012, on page BU3 of the New York edition with the headline: Doing the Two-Step, Beyond the A.T.M..