Remembering Passwords Is Not a Human Job
Security experts say "use a different, long, complex password for every service." But the average internet user has over 100 accounts. Memorizing unique 16-character random passwords for each one is beyond human capability.
Password managers solve this problem with technology. Understanding how they work reveals why security professionals strongly recommend them.
How Password Managers Work
The core concept is simple: one master password encrypts and protects all your other passwords.
- Master password entry: The only password you need to remember
- Key derivation: An encryption key is generated from your master password using algorithms like PBKDF2 or Argon2
- Encrypted storage: All passwords are encrypted with AES-256 and stored in a vault
- On-demand decryption: When you log in to a site, the relevant password is decrypted and auto-filled
Crucially, even the service provider cannot read your passwords. The master password never leaves your device, and all encryption and decryption happens locally. This is called "zero-knowledge architecture."
Key Derivation - Turning Your Password into an Encryption Key
Using your master password directly as an encryption key would be dangerous - short passwords could be guessed. Key Derivation Functions (KDFs) intentionally make the computation expensive to render brute-force attacks impractical.
- PBKDF2: Adds a random salt to your password and repeats hashing hundreds of thousands of times. Used by 1Password and LastPass
- Argon2: Winner of the 2015 Password Hashing Competition. Consumes large amounts of both CPU and memory, making GPU-based parallel attacks difficult. Used by Bitwarden
With PBKDF2 set to 600,000 iterations, testing a single master password candidate takes about 0.5 seconds. Testing all combinations of an 8-character alphanumeric password (about 280 billion possibilities) would take approximately 4,400 years on a single PC.
Cloud-Synced vs. Local Storage
| Aspect | Cloud-Synced | Local Storage |
|---|---|---|
| Examples | 1Password, Bitwarden, LastPass | KeePass, KeePassXC |
| Multi-device sync | Automatic | Manual file synchronization required |
| Server breach risk | Encrypted data may be exposed | No server to breach |
| Convenience | High (browser extensions, mobile apps) | Requires technical knowledge to set up |
Even if a cloud-synced service's server is breached, zero-knowledge architecture means attackers only obtain encrypted data. With a strong master password, breaking the encryption is computationally infeasible.
Weaknesses to Be Aware Of
- Master password compromise: If your master password is exposed, all passwords are at risk. Always enable two-factor authentication
- Device malware: A keylogger could capture your master password. Device security is a prerequisite
- Credential reuse without a manager: Without a password manager, people tend to reuse passwords, leaving them vulnerable to credential stuffing attacks that exploit leaked credentials across multiple services
- Service discontinuation: Verify data export options before committing to a cloud service
- Single point of failure: If the password manager becomes inaccessible, you lose access to everything. Keep recovery keys in a secure location
Getting Started
The barrier to entry is low - most services offer free plans. Start by registering your most critical accounts (email, banking, social media) and gradually migrate the rest. As a first step toward better security hygiene, check your security score on IP確認さん to see how well your current setup protects you.
Combined with password security fundamentals, information security books provide comprehensive guidance on password management practices.