Rethinking Passwords

被引:17
|
作者
Cheswick, William [1 ,2 ]
机构
[1] Bell Labs, Murray Hill, NJ USA
[2] Lumeta Corp, Somerset, NJ USA
关键词
D O I
10.1145/2408776.2408790
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
I am not optimistic that these changes will happen rapidly, or even at all. There is a huge installed base out there. 'We do the same thing as everybody else' is an effective legal defense against malfeasance, so why change things? (I hate the word legacy!) Authentication systems are vital, and changes to them can produce widespread and embarrassing failures. It is not clear that easier authentication would provide a market advantage. Is a company less secure than another company because it is easier to log into? Will it gain market share by doing so? In spite of all this, the system seems to be working. We are leaking military and industrial secrets to attackers all over the world, but millions of people use the Internet successfully every day, and it is an important part of the world's economy. Somehow, we get by. Finally, I would like to see these systems engineered such that the user needs to remember only one security maxim: Don't be a moron. Do not pick a password that someone who knows you can guess in a few tries, or that someone watching you type can figure out easily. Unlike the eye-of-newt password rules, this last rule makes sense to the casual user and is easy to remember. All we have to do is engineer the rest to be reasonably secure. © 2013 ACM.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [1] Passwords
    Lassalle, J
    [J]. EUROPE-REVUE LITTERAIRE MENSUELLE, 2006, (924) : 232 - 248
  • [2] PASSWORDS
    DENNING, PJ
    [J]. AMERICAN SCIENTIST, 1992, 80 (02) : 117 - 120
  • [3] Passwords
    Fabre G, Sylvie
    [J]. EUROPE-REVUE LITTERAIRE MENSUELLE, 2014, (1022) : 342 - 344
  • [4] PASSWORDS
    Frank, Gordon
    [J]. COMPUTER, 2009, 42 (06) : 6 - 6
  • [5] Passwords.
    Coulter, BG
    [J]. CANADIAN REVIEW OF SOCIOLOGY AND ANTHROPOLOGY-REVUE CANADIENNE DE SOCIOLOGIE ET D ANTHROPOLOGIE, 2005, 42 (01): : 111 - 113
  • [6] Picture Passwords Superiority and Picture Passwords Dictionary Attacks
    Golofit, Krzysztof
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 179 - 183
  • [7] Haptic Passwords
    Yan, Junjie
    Huang, Kevin
    Bonaci, Tamara
    Chizeck, Howard J.
    [J]. 2015 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2015, : 1194 - 1199
  • [8] PASSWORDS AND THEIR GENERATION
    PILLER, E
    [J]. ANGEWANDTE INFORMATIK, 1989, (01): : 3 - 13
  • [9] The Problem With Passwords
    Galler, Mike
    [J]. ASHRAE Journal, 2022, 64 (04) : 58 - 59
  • [10] GeoGraphical passwords
    ZSS-Research, P.O.Box 16211, Ras Al Khaimah, United Arab Emirates
    [J]. Int. J. Secur. Netw., 1 (56-62):