{"id":14107,"date":"2012-03-15T18:24:06","date_gmt":"2012-03-15T22:24:06","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2023-06-14T20:32:30","modified_gmt":"2023-06-15T00:32:30","slug":"first-computer-passwords-useless","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/first-computer-passwords-useless\/","title":{"rendered":"First Computer Passwords Useless"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-14199\" title=\"First Computer Passwords Useless\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/strongpassword-e1563843184851-150x142.jpg?resize=62%2C59&#038;ssl=1\" alt=\"First Computer Passwords Useless\" width=\"62\" height=\"59\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/strongpassword-e1563843184851.jpg?resize=150%2C142&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/strongpassword-e1563843184851.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/strongpassword-e1563843184851.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 62px) 100vw, 62px\" \/><a title=\"Robert McMillan\" href=\"https:\/\/web.archive.org\/web\/20140317215027\/http:\/\/www.wired.com:80\/wiredenterprise\/author\/bobmcmillan\" target=\"_blank\" rel=\"noopener noreferrer\">Robert McMillan<\/a> at <em><a title=\"www.wired.com\" href=\"http:\/\/www.wired.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wired<\/a><\/em> <a title=\"www.wired.com\" href=\"https:\/\/web.archive.org\/web\/20140321133915\/http:\/\/www.wired.com:80\/wiredenterprise\/2012\/01\/computer-password\" target=\"_blank\" rel=\"noopener noreferrer\">dug thru<\/a> the annals of tech and recently confirmed that <strong>passwords have been a pain in the tuckus for a millennium<\/strong>. But who\u2019s to blame? <strong>Who invented the computer password<\/strong>?<\/p>\n<p><a href=\"http:\/\/web.archive.org\/web\/20130120153020\/http:\/\/shakespeare.palomar.edu\/works.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14202 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"shakespeare\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/shakespeare.gif?resize=86%2C96&#038;ssl=1\" alt=\"Shakespeare\" width=\"86\" height=\"96\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/shakespeare.gif?resize=134%2C150&amp;ssl=1 134w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/shakespeare.gif?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/shakespeare.gif?w=261&amp;ssl=1 261w\" sizes=\"auto, (max-width: 86px) 100vw, 86px\" \/><\/a>The origin of the password is shrouded in the mist of history like the invention of the wheel or the story of the doorknob, according to <em>Wired<\/em>. Roman soldiers memorized spoken passwords to gain access to camps. <a title=\"William Shakespeare\" href=\"https:\/\/www.shakespeare.org.uk\/explore-shakespeare\/shakespedia\/william-shakespeare\/william-shakespeare-biography\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shakespeare<\/a> kicks off <a title=\"www.william-shakespeare.info\" href=\"http:\/\/www.william-shakespeare.info\/shakespeare-play-hamlet.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hamlet<\/em><\/a> but where did the first computer password show up? <em>Wired<\/em> asks.<\/p>\n<p>Computer passwords probably arrived at the <a title=\"Massachusetts Institute of Technology\" href=\"http:\/\/web.mit.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Massachusetts Institute of Technology<\/a> in the mid-1960s. <em>Wired<\/em> says nearly all the computer historians they contacted said that the first password must have come from MIT\u2019s <a title=\"Compatible Time-Sharing System\" href=\"https:\/\/en.wikipedia.org\/wiki\/Compatible_Time-Sharing_System\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Compatible Time-Sharing System<\/a>. In geek circles, it\u2019s famous. CTSS pioneered many of the building blocks of computing as we know it today: things like e-mail, virtual machines, instant messaging, and file sharing.<\/p>\n<p><a href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14203 \" style=\"border: 0pt none;\" title=\"IBM_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/IBM_logo-e1563843268475-150x58.jpg?resize=88%2C34&#038;ssl=1\" alt=\"IBM logo\" width=\"88\" height=\"34\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/IBM_logo-e1563843268475.jpg?resize=150%2C58&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/IBM_logo-e1563843268475.jpg?resize=75%2C29&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/IBM_logo-e1563843268475.jpg?w=420&amp;ssl=1 420w\" sizes=\"auto, (max-width: 88px) 100vw, 88px\" \/><\/a><a title=\"Fernando J. Corbat\u00f3\" href=\"https:\/\/en.wikipedia.org\/wiki\/Fernando_J._Corbat%C3%B3\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Fernando Corbat\u00f3<\/a> who worked on CTSS back in the mid-1960s is a little reluctant to take credit. \u201c<em>Surely there must be some antecedents for this mechanism<\/em>,\u201d he told <em>Wired<\/em>, before questioning whether the CTSS was beaten to the punch in 1960 by\u00a0<a title=\"IBM\" href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM&#8217;s<\/a> (<a title=\"NYSE : IBM\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IBM\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a>) <a title=\"www.ibm.com\" href=\"https:\/\/web.archive.org\/web\/20120323191448\/http:\/\/www.ibm.com\/ibm100\/us\/en\/icons\/sabre\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sabre ticketing system<\/a>. When <em>Wired<\/em> contacted IBM, big blue claimed it wasn\u2019t sure.<\/p>\n<p>According to Mr. Corbat\u00f3, even though the MIT computer hackers were breaking new ground with much of what they did, passwords were pretty much a no-brainer. \u201c<em>The key problem was that we were setting up multiple terminals which were to be used by multiple persons but with each person having his own private set of files,<\/em>\u201d he told <em>Wired.<\/em> \u201c<em>Putting a password on for each individual user as a lock seemed like a very straightforward solution<\/em>.\u201d<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14205 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"handshake\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/handshake.gif?resize=62%2C66&#038;ssl=1\" alt=\"\" width=\"62\" height=\"66\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/handshake.gif?resize=141%2C150&amp;ssl=1 141w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/handshake.gif?resize=70%2C75&amp;ssl=1 70w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/handshake.gif?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 62px) 100vw, 62px\" \/>Back in the \u201960s, there were other options, according to Fred Schneider, a computer science professor at <a title=\"Cornell University\" href=\"http:\/\/www.cornell.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Cornell University<\/a>. The CTSS guys could have gone for <a title=\"Knowledge-based authentication\" href=\"https:\/\/en.wikipedia.org\/wiki\/Knowledge-based_authentication\" rel=\"wikipedia\">knowledge-based authentication<\/a>, where instead of a password, the computer asks you for something that other people probably don\u2019t know \u2014 your mother\u2019s maiden name, for example.<\/p>\n<p>But in the early days of computing, passwords were surely smaller and easier to store than the alternative, Professor Schneider says. A knowledge-based system \u201cwould have required storing a fair bit of information about a person, and nobody wanted to devote many machine resources to this authentication stuff.\u201d<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14206 \" title=\"Data_breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/Data_breach-e1563843315182-150x126.jpg?resize=86%2C72&#038;ssl=1\" alt=\"Data breach\" width=\"86\" height=\"72\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/Data_breach-e1563843315182.jpg?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/Data_breach-e1563843315182.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/02\/Data_breach-e1563843315182.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 86px) 100vw, 86px\" \/>The irony is that CTSS may also have been the first system to experience a data breach. The article recounts that in 1966, a software bug jumbled up the system\u2019s welcome message and its master password file so that anyone who logged in had access to the entire list of CTSS passwords.<\/p>\n<p>The story goes that an MIT Ph.D. researcher was looking for a way to bump up his usage time on CTSS. He received four hours per week, but it wasn\u2019t nearly enough time to run the simulations he\u2019d designed for the new computer system. So he simply printed out all the passwords stored on the system.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-128588\" title=\"punch card\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/punchcard-e1686788996459-68x150.jpg?resize=43%2C95&#038;ssl=1\" alt=\"\" width=\"43\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/punchcard-e1686788996459.jpg?resize=68%2C150&amp;ssl=1 68w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/punchcard-e1686788996459.jpg?resize=34%2C75&amp;ssl=1 34w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/punchcard-e1686788996459.jpg?w=442&amp;ssl=1 442w\" sizes=\"auto, (max-width: 43px) 100vw, 43px\" \/>\u201c<em>There was a way to request files to be printed offline by submitting a <\/em><em><a title=\"www.ibm.com\" href=\"https:\/\/web.archive.org\/web\/20120107064656\/http:\/\/www.ibm.com\/ibm100\/us\/en\/icons\/punchcard\/\" target=\"_blank\" rel=\"noopener noreferrer\">punched card<\/a><\/em>,\u201d he wrote. \u201c<em>Late one Friday night, I submitted a request to print the password files and very early Saturday morning went to the file cabinet where printouts were placed and took the listing.<\/em>\u201d<\/p>\n<p>To spread the guilt around, Mr. Scherr then handed the passwords over to other users. One of them \u2014 J.C.R. Licklieder \u2014 promptly started logging into the account of the computer lab\u2019s director <span style=\"color: #333333;\"><u>Robert Fano and<\/u><\/span>\u00a0leaving \u201ctaunting messages\u201d behind.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120422115937\/http:\/\/www.readwriteweb.com:80\/archives\/are_passwords_becoming_obsolete.php?\" target=\"_blank\" rel=\"noopener noreferrer\">Are Passwords Becoming Obsolete?<\/a> (readwriteweb.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20141014095924\/http:\/\/cryptosmith.com:80\/node\/350\" target=\"_blank\" rel=\"noopener noreferrer\">Replacing a Hacked Password<\/a> (cryptosmith.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passwords arrived on MITs CTSS &#038; first data breach by printing all the passwords for the system for more system access in the 60s<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1116,1115,125,43,120,2541,4,1117,1114],"class_list":["post-14107","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-compatible-time-sharing-system","tag-ctss","tag-data-breach","tag-ibm","tag-mit","tag-passwords","tag-security","tag-shakespeare","tag-wired"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=14107"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14107\/revisions"}],"predecessor-version":[{"id":131602,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14107\/revisions\/131602"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=14107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=14107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=14107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}