Graphical Passwords: A Qualitative Study of Password Patterns

被引:0
|
作者
Vorster, Jo [1 ]
van Heerden, Renier [2 ]
机构
[1] Univ Liverpool, Liverpool L69 3BX, Merseyside, England
[2] CSIR, Informat Warfare, ZA-0001 Pretoria, South Africa
关键词
graphical passwords; access management;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be stronger in terms of security because people are better at remembering them. It is well known that the key-space for graphical passwords are at least equivalent to alpha-numeric passwords and can even be much stronger, depending on the schema. Similar to conventional passwords, graphical passwords may have patterns. A pattern that has been widely reported in the literature and studied in some detail are that of hotspots. That is, a high percentage of people will select the same spots on an image. This paper focus on a quantitative analysis of graphical passwords. During this study users from commercial companies were asked to enter graphical passwords. These passwords were then analysed and patterns identified. Users were also asked what there password selection strategies are. The combination of this information enable a qualitative analysis of graphical passwords. The results show that graphical passwords are less secure than expected, that there are a number of patterns that limit the key-space significantly and thus reduce the strength of such password schemas. Users were also asked about their perception of the security of graphical passwords. The survey suggest that users are divided in their opinion on how secure such technologies are. Lastly we also report on reasons that users gave for why they think such technology are not yet ready for use as a security mechanism in an organizational context.
引用
收藏
页码:375 / 383
页数:9
相关论文
共 50 条
  • [1] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [2] Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
    Chiasson, Sonia
    Forget, Alain
    Stobert, Elizabeth
    van Oorschot, P. C.
    Biddle, Robert
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 500 - 511
  • [3] GRAPHICAL PASSWORDS IMPLIES ON TOLERANCE PASSWORD, IMAGE CHOICE, AND PUZZLE LOGIN SECURITY
    Gunaseeli, L.
    Canessane, R. Aroul
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [4] Can I Guess Your Password? Examining Security Aspects of Graphical Passwords
    Alsubait, Tahani
    Alabdullatif, Raghad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 258 - 262
  • [5] On Multiple Password Interference of Touch Screen Patterns and Text Passwords
    Meng, Weizhi
    Li, Wenjuan
    Jiang, Lijun
    Meng, Liying
    [J]. 34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, : 4818 - 4822
  • [6] PASSWORD CRACKING BASED ON LEARNED PATTERNS FROM DISCLOSED PASSWORDS
    Chou, Hsien-Cheng
    Lee, Hung-Chang
    Yu, Hwan-Jeu
    Lai, Fei-Pei
    Huang, Kuo-Hsuan
    Hsueh, Chih-Wen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (02): : 821 - 839
  • [7] Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords
    Tihanyi, Norbert
    Kovacs, Attila
    Vargha, Gergely
    Lenart, Adam
    [J]. TECHNOLOGY AND PRACTICE OF PASSWORDS, PASSWORDS'14, 2015, 9393 : 89 - 101
  • [8] On Cultural-centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability
    Constantinides, Argyris
    Belk, Marios
    Fidas, Christos
    Samaras, George
    [J]. PROCEEDINGS OF THE 26TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (UMAP'18), 2018, : 245 - 249
  • [9] Graphical Password: Comprehensive study of the usability features of the Recognition Base Graphical Password methods
    Eljetlawi, Ali Mohamed
    Ithnin, Norafida
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1137 - +
  • [10] A Study on an Image Synthesis Method for Graphical Passwords
    Hasegawa, Madoka
    Tanaka, Yuichi
    Kato, Shigeo
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 643 - 646