Synthesis of Secure Passwords

被引:0
|
作者
Sato, Tomoki [1 ]
Kikuchi, Hiroaki [1 ]
机构
[1] Tokai Univ, Grad Sch Engn, 4-1-1 Kitakaname, Hiratsuka, Kanagawa 2591292, Japan
关键词
password; authentication; impression; long term memory; USER AUTHENTICATION SCHEME; MUTUAL AUTHENTICATION; EFFICIENT; IMPROVEMENTS; WEAKNESSES; PROTOCOL;
D O I
10.1109/AsiaJCIS.2012.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies a synthesis of password to be easily identified and hardly forgot. A new synthesis method is proposed to construct a good passwords that satisfy both requirements. Our method focuses on the change of frequency of combined words. Each of two words has a high term frequency but the combination is not quite common and then the frequency of the combined words can give strong impression in our memory. In order to verify our hypothesis, the paper presents a formal definitions of impression I, conflict C and accuracy A for synthesized words. The impression is a measure based on subjective evaluation for words. The conflict represents a degree how much reduction in frequency is given by combination of two words. The degree of conflict can be evaluated by a fraction of synthesized words in a particular corpus. The experimental results shows that the above hypothesis holds with positive correlation between accuracy for memory and the impression given from the synthesized words.
引用
收藏
页码:35 / 43
页数:9
相关论文
共 50 条
  • [1] Selecting secure passwords
    Verheul, Eric R.
    [J]. Topics in Cryptology - CT-RSA 2007, Proceedings, 2007, 4377 : 49 - 66
  • [2] Constructing secure and memorable passwords
    Kavrestad, Joakim
    Lennartsson, Markus
    Birath, Marcus
    Nohlberg, Marcus
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 701 - 717
  • [3] GENERATION OF SECURE PASSWORDS BY THE USER
    PILLER, E
    [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 518 - 524
  • [4] Can Long Passwords Be Secure and Usable?
    Shay, Richard
    Komanduri, Saranga
    Durity, Adam L.
    Huh, Phillip
    Mazurek, Michelle L.
    Segreti, Sean M.
    Ur, Blase
    Bauer, Lujo
    Christin, Nicolas
    Cranor, Lorrie Faith
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2927 - 2936
  • [5] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [6] Sesame: A Secure and Convenient Mobile Solution for Passwords
    Aliasgari, Mehrdad
    Sabol, Nick
    Sharma, Ashutosh
    [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 36 - 40
  • [7] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    [J]. QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [8] Graphical Passwords: Requisite for Secure Information Systems
    Abbasi, Kashif
    Zin, Abdullah Mohd
    Mokhtar, Mohd Rosmadi
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
  • [9] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [10] Do You Think Your Passwords Are Secure?
    Ziegler, Dominik
    Rauter, Mattias
    Stromberger, Christof
    Teufl, Peter
    Hein, Daniel
    [J]. 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2014,