Quantitative Analysis of PIN Choices: A Contribution to the Establishment of Authentication Requirements

被引:0
|
作者
Carvalho, Jose Carlos [1 ]
Sa, Vitor [1 ,2 ]
Magalhaes, Maria Jose [1 ]
deMagalhaes, Sergio Tenreiro [1 ,2 ]
机构
[1] Catholic Univ Portugal, Fac Social Sci, Braga, Portugal
[2] Univ Minho, ALGORITMI Res Ctr, Braga, Portugal
关键词
PIN; digits; security; authentication; system; keypad;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication using a PIN number remains one of the most used ways to enter a system (mobile phone, ATM, etc.). Many people seem to dislike this form of authentication because they simply despise their use, placing unsafe PINs just because they have to put some. Some relevant results are the combination 1234, thecombinations using only one digit (example: 1111), or the central line of the numerical keypad. On the other hand there is some understanding because it is proven that remember strong passwords is a difficult task for humans, and the tendency is to choose the simplest ones. This research had a sample of 497 participants and aimed to understand the preferred choice of the participants in relation to the number of digits used for a PIN number (a choice between four and/or six digits) and realized the amount of times that each of the available digits was used. To this end it was developed a web-based tool for entering the data. This application was intended only to the data collection process, being the information processed further. Through this application, the user was asked to enter four and/or six-digit PINs. The method does not raise any doubt on the participants, which were informed about the anonymity and confidentiality of the data, and never they were asked to identify themselves. Participants were asked to use the PINs that they normally use in other contexts. With the analysis of the data it was possible to understand the distribution of digits per position in a PIN, check which digits is more/less used in each position, and check which digit is more/less used regardless of its position. Among the conclusions it appears that the layout of the numeric keypad of the system influence the PIN choice.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 50 条
  • [1] METWILL: A CONTRIBUTION TO THE LEARNING OF THE SOFT SYSTEM METHODOLOGY FOR THE ESTABLISHMENT OF INFORMATION REQUIREMENTS
    Caceres, Yesid Alexander Olave
    Florez, Luis Carlos Gomez
    Matajira, Diego Leonard Ortiz
    UIS INGENIERIAS, 2007, 6 (02): : 19 - 31
  • [2] Security Analysis and Psychological Study of Authentication Methods with PIN Codes
    Bultel, Xavier
    Dreier, Jannik
    Giraud, Matthieu
    Izaute, Marie
    Kheyrkhah, Timothee
    Lafourcade, Pascal
    Lakhzoum, Dounia
    Marlin, Vincent
    Mota, Ladislav
    2018 12TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2018,
  • [3] A contribution on the quantitative spectral analysis of solutions
    Gromann, F
    ZEITSCHRIFT FUR ANORGANISCHE UND ALLGEMEINE CHEMIE, 1929, 180 (03): : 257 - 274
  • [4] Authentication Schemes for Multimedia Streams: Quantitative Analysis and Comparison
    Hefeeda, Mohamed
    Mokhtarian, Kianoosh
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2010, 6 (01)
  • [5] A contribution to quantitative analysis of time series
    Cipra, T
    POLITICKA EKONOMIE, 2004, 52 (01) : 138 - 139
  • [6] Analysis of authentication and key establishment in inter-generational mobile telephony
    Tang, Chunyu
    Naumann, David A.
    Wetzel, Susanne
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1605 - 1614
  • [7] Qualitative and quantitative analysis of requirements on product function
    Yao H.
    Jin Y.
    Yan J.
    Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, 2010, 46 (05): : 191 - 198
  • [8] Quantitative analysis of the energy requirements for development of obesity
    Christiansen, E
    Garby, L
    Sorensen, TIA
    JOURNAL OF THEORETICAL BIOLOGY, 2005, 234 (01) : 99 - 106
  • [9] A quantitative analysis of relaxing UI eligibility requirements
    Chao, Ying H.
    LABOUR ECONOMICS, 2025, 94
  • [10] Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass
    Yadav, Dhruv Kumar
    Ionascu, Beatrice
    Ongole, Sai Vamsi Krishna
    Roy, Aditi
    Memon, Nasir
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 281 - 297