The Effectiveness and Usability of Passphrases for Authentication

نویسندگان

  • Mark Keith
  • Benjamin Shao
  • Paul John Steinbart
چکیده

In developing password policies, IT managers must strike a balance between security and memorability. Rules that improve structural integrity against attacks (e.g., increasing length and multiple character types) may also result in passwords that are difficult to remember. Recent technologies have relaxed the 8-character password constraint – permitting the creation of longer pass-“phrases” consisting of multiple words. Psychology theories suggest users can remember passphrases at least as well as passwords. This paper reports an experiment currently in progress that tests the usability of passphrases. Subjects are randomly assigned to three different password creation techniques: a control group with no constraints, a secure group given strong password requirements, and a passphrase group. It is expected that the passphrases group will have fewer failed login attempts than the secure group and no more failed login attempts than the control group. Practical implications include stronger authentication with reduced help desk costs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The usability of passphrases for authentication: An empirical field study

In developing password policies, IT managers must strike a balance between security and memorability. Rules that improve structural integrity against attacks may also result in passwords that are difficult to remember. Recent technologies have relaxed the 8-character password constraint to permit the creation of longer pass-‘‘phrases’’ consisting of multiple words. Longer passphrases are attrac...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Usability of cushions designed specifically for car industries’ assembly lines

Background: Ergonomics is a science that provides methods of creating reasonable adaption between occupation and worker by improving usability through consideration of job demands and human ability to satisfy them. A deep understanding of user’s thoughts on and attitudes toward utilizing a tool could improve its design. In the present study, two cushions designed particularly for one of c...

متن کامل

Linguistic Properties of Multi-word Passphrases

We examine patterns of human choice in a passphrase-based authentication system deployed by Amazon, a large online merchant. We tested the availability of a large corpus of over 100,000 possible phrases at Amazon’s registration page, which prohibits using any phrase already registered by another user. A number of large, readily-available lists such as movie and book titles prove effective in gu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005