Graphical Passwords - A Discussion

被引:8
|
作者
Kayem, Anne V. D. M. [1 ]
机构
[1] Univ Cape Town, Dept Comp Sci, ZA-7701 Cape Town, South Africa
关键词
D O I
10.1109/WAINA.2016.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentications, on web applications and service platforms such as the ones that enable collaborative information sharing and resource management, are typically handled via text-based passwords. From a security usability perspective, text-based passwords are easy to use and familiar to users. Text-based passwords however, are prone to attacks that stem from challenges that users' face with memorability. Text-based password memorability issues pose problems for service providers on platforms where identity management is a key concern. Application examples emerge in social media, online commerce, and also in the management of critical infrastructure such as smart micro-grids. A further concern is that, large volumes of sensitive information are made available and shared on these applications and so constitute an attractive target for obtaining data in adversarial ways in order to provoke impersonation and inferential attacks, for instance. In this paper, we discuss the pros and cons of using graphical passwords instead of text-based passwords on information sharing platforms. We support our discussion by considering two graphical password schemes based on the principles of recall and cued-recall respectively which are philosophically similar to text-based passwords. Results from our proof-of-concept implementation indicate that, in comparison to text-based and recall graphical passwords, cued-recall graphical passwords are a better authentication mechanism in terms of memorability and password security.
引用
收藏
页码:596 / 600
页数:5
相关论文
共 50 条
  • [1] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428
  • [2] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [3] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [4] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950
  • [5] Eye Tracking Graphical Passwords
    Mihajlov, Martin
    Jerman-Blazic, Borka
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 37 - 44
  • [6] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [7] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [8] Graphical passwords: Behind the attainment of goals
    Vaddeti, Ankitha
    Vidiyala, Deepthi
    Puritipati, Vineetha
    Ponnuru, Raveendra Babu
    Shin, Ji Sun
    Alavalapati, Goutham Reddy
    [J]. SECURITY AND PRIVACY, 2020, 3 (06):
  • [9] Graphical passwords based on robust discretization
    Birget, Jean-Camille
    Hong, Dawei
    Memon, Nasir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) : 395 - 399
  • [10] Authentication by Graphical Passwords Method 'Hope'
    Zujevs, Nikita
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99