Security of a non-random password but that relies on information an attacker cannot possibly know

I am trying to figure out whether a non-random password that relies on information an attacker cannot possibly know can be secure.

To give an example, let’s say that I generate my password by putting together the surnames of the first 5 people that I ever fancied. Let’s also assume that there is nobody in the world who knows those names apart from me. I can think of reasons for why this password can be considered both insecure and secure, and I am unable to determine which one is correct.

Reasons it might be insecure:

  1. The password entropy associated with this method for generating the password is 0. It is completely deterministic.
  2. All discussions I found on password security center around entropy, so this should be considered a weak password based on its entropy of 0.

Reasons it might be secure:

  1. The information required for generating a password using this method cannot be known by a potential attacker.
  2. The best an attacker can do is somehow figure out my method. Even then, the “word list” of all possible surnames would contain thousands of words, so perhaps the entropy should not be considered as 0 in practice?
  3. While it sounds like security by obscurity, I believe that it might not be, because this is a case where an attacker cannot possibly get to know the surnames.
  4. And all of this is assuming that the attacker can somehow figure out my method of generating the password, which they have no way of figuring it.

I went through lots of great questions on here regarding password entropy:

  1. XKCD #936: Short complex password, or long dictionary passphrase?
  2. Is “the oft-cited XKCD scheme […] no longer good advice”?
  3. Why are passwords generated by a password generator a complicated mix of letters and numbers instead of a long phrase?
  4. Should passwords be truly random?
  5. What does “random” mean in the context of password creation?
  6. Confused about (password) entropy
  7. Why use entropy at all in considering password strength?
    How secure is Snowden’s MargaretThatcheris110%SEXY password?

However, I am still unable to find the answer.

Continue reading Security of a non-random password but that relies on information an attacker cannot possibly know

Impact of quantum computers on password security [closed]

I wrote an article on the impacts of sufficiently capable quantum computers on password strength and attacks.
The basic premise is that Grover’s algorithm halves the protective strength of password hashes and passwords, plus any additional… Continue reading Impact of quantum computers on password security [closed]

Hello ‘123456,’ my old friend, I’ve come to talk with you again

Once again, it reins supreme as the #1 smelliest old fish of a password on the list of ones that most frequently turn up in data breaches. Continue reading Hello ‘123456,’ my old friend, I’ve come to talk with you again

Strong WooCommerce passwords – enforcing policies without deterring customers

Keeping your eCommerce store secure is a must. Not only is it an important source of income for your business, but it also contains sensitive customer information, such as billing details and credit card numbers. Strong passwords can prevent many cyber… Continue reading Strong WooCommerce passwords – enforcing policies without deterring customers

Worst passwords list is out, but this time we’re not scolding users

This is on you, makers of sites and services that allow users to create passwords like “password.” You can do better! Continue reading Worst passwords list is out, but this time we’re not scolding users

The smarter the student, the stronger the password – study

A consulting director at Asia Pacific College (APC) in the Philippines decided to match student GPAs against the strength of their passwords. The findings suggest there is some degree of correlation between smarts and good password hygiene. JV Roig, wh… Continue reading The smarter the student, the stronger the password – study