A Longitudinal Comparison of Four Password Procedures
نویسندگان
چکیده
Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and begun a longitudinal study which investigate the tradeoff between the level of security and ease of recall (and ease of use) for various types of passwords and password entry procedures. Typically, there is an inverse relationship between the level of security and ease of recall. The longer the password and the more variability in the characters, the higher the level of security provided by such a password (because they are more difficult to violate or " crack "). However, such passwords tend to be more difficult for users to remember, particularly when the password does not spell a recognizable word. Conversely, when users select their own more easily-remembered passwords, the passwords may also be easier to crack. In a recent email from Bill Gates (Chairman of Microsoft Corporation) to approximately one million people, Gates referred to passwords COPS, page 2 as " the weak link " in computer security, noting that most passwords are either easy to guess or difficult to remember (CNN.COM/Technology, 2003). The proposed study presents a new approach to entering passwords, which combines a high level of security with easy recall for the user. The Check-Off Password System (COPS) is more secure than user-selected password systems, as well as high-protection, assigned-password systems. However, we hypothesize that users will prefer this system to traditional assigned-password systems despite the more cognitively involved input mechanism, because it is easier to recall the COPS " password. " We recently completed a pilot study to investigate the tradeoffs between using COPS and three traditional password procedures, which provides a preliminary assessment of the efficacy of COPS. The pilot study offers evidence that COPS is a valid alternative to current user authentication systems. However, the pilot study only explored the use of those password procedures in a single session. As an extension of the pilot study, we have started a semester-long study in which users will employ each of the four procedures for a period of three weeks. This longitudinal study will enable us to evaluate use patterns over time, which we expect to …
منابع مشابه
PassPoints: Design and longitudinal evaluation of a graphical password system
Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is long and random. Therefore, they tend to choose short and insecure passwords. Graphical passwords, which consist of clicking on images rather than typing alphanumeric strings, may help to overcome the...
متن کاملA Comprehensive Study of the Usability of Multiple Graphical Passwords
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In...
متن کاملA Comparison of Password Authentication between Children and Adults
According to a large MediaSmarts survey, 99 percent of Canadian children aged 8-15 are online. We already have a good number of security measures for adults but can those measures keep children secure as well? As a starting point, we explore the subject of user authentication for children. We conducted two studies on three graphical password schemes (Objects, Image and Words PassTiles), one wit...
متن کاملAuthentication Using Graphical Passwords: Basic Results
Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password...
متن کاملModelling the Security of Recognition-Based Graphical Passwords
Recognition-based graphical passwords have received attention in recent research as an alternative authentication mechanism. The research often presents new schemes, usability studies or proposes countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password schemes. This paper contributes a pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003