🤖 AI Summary
This study identifies the fundamental failure mechanisms of large language models (LLMs) in generating or cracking real-world passwords based on users’ structured attributes. Method: We systematically evaluate open-source LLMs—including TinyLLaMA, Falcon-RW-1B, and Flan-T5—on synthetic user profiles, measuring password generation accuracy under both plaintext and SHA-256 hash settings using Hit@1/5/10 metrics. Contribution/Results: All models achieve ≤1.5% Hit@10 accuracy—substantially underperforming conventional rule-based and combinatorial password cracking tools. Crucially, this work provides the first empirical evidence that pre-trained LLMs inherently lack cryptographic domain knowledge, user behavioral priors, and structured reasoning memory; consequently, they cannot effectively model real-world password distributions—even after unsupervised fine-tuning. Our findings establish critical methodological benchmarks and deliver a key caution regarding the applicability boundaries of LLMs in security-sensitive contexts.
📝 Abstract
The remarkable capabilities of Large Language Models (LLMs) in natural language understanding and generation have sparked interest in their potential for cybersecurity applications, including password guessing. In this study, we conduct an empirical investigation into the efficacy of pre-trained LLMs for password cracking using synthetic user profiles. Specifically, we evaluate the performance of state-of-the-art open-source LLMs such as TinyLLaMA, Falcon-RW-1B, and Flan-T5 by prompting them to generate plausible passwords based on structured user attributes (e.g., name, birthdate, hobbies). Our results, measured using Hit@1, Hit@5, and Hit@10 metrics under both plaintext and SHA-256 hash comparisons, reveal consistently poor performance, with all models achieving less than 1.5% accuracy at Hit@10. In contrast, traditional rule-based and combinator-based cracking methods demonstrate significantly higher success rates. Through detailed analysis and visualization, we identify key limitations in the generative reasoning of LLMs when applied to the domain-specific task of password guessing. Our findings suggest that, despite their linguistic prowess, current LLMs lack the domain adaptation and memorization capabilities required for effective password inference, especially in the absence of supervised fine-tuning on leaked password datasets. This study provides critical insights into the limitations of LLMs in adversarial contexts and lays the groundwork for future efforts in secure, privacy-preserving, and robust password modeling.