Order and entropy in picture passwords

نویسندگان

  • Saranga Komanduri
  • Dugald Ralph Hutchings
چکیده

Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passwords, their true entropy remains unknown. A 23-participant study was performed in which picture and character-based passwords of equal strength were randomly assigned. Memorability was tested with up to one week between sessions. The study found that both character and picture passwords of very high entropy were easily forgotten. However, when password inputs were analyzed to determine the source of input errors, serial ordering was found to be the main cause of failure. This supports a hypothesis stating that picture-password systems which do not require ordered input may produce memorable, high-entropy passwords. Input analysis produced another interesting result, that incorrect inputs by users are often duplicated. This reduces the number of distinct guesses users can make when authentication systems lock out users after a number of failed logins. A protocol for ignoring duplicate inputs is presented here. A shoulder-surfing resistant input method was also evaluated, with six out of 15 users performing an insecure behavior.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selecting Secure Passwords

We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on conditions of the Shannon, Guessing and Min Entropy. In addition we establish various new relations between these three notions of entropy, providing strong improvements on existing bounds such as the McEliece-Yu bound...

متن کامل

The usability of picture passwords

Executive summary  In the context of growing identify theft, and especially phishing and related scams, conventional passwords no longer provide adequate authentication security for online services.  'Zero-footprint' strong authentication (i.e. requiring no software installs or hardware tokens) can be achieved with careful use of picture passwords, i.e. sequences of picture symbols.  The pic...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

The phase transition of corrected black hole with f(R) gravity

In this letter, we consider static black hole in f(R) gravity.We take advantage from corrected entropy and temperature and investigate such black hole. Finally, we study the $ P - V $ critically and phase transition of corrected black hole with respect to entropy and temperature. Here also, we obtain the heat capacity for the static black hole in $ f(R) $ gravity. This calculation help us...

متن کامل

Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme

The basic idea of DrawA Secret technique is that a user is asked to draw a simple picture on a 2D grid. The coordinates of the grid, occupied by the picture are stored in the order of the drawing. During authentication, the user is asked to re-draw the picture. If the drawing touches the same grids in the same sequence, then the user is authenticated. But sometimes user fails to recall his/her ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008