Are Graphical Authentication Mechanisms As Strong As Passwords?

被引:0
|
作者
Renaud, Karen [1 ]
Mayer, Peter [2 ]
Volkamer, Melanie [2 ]
Maguire, Joseph [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
[2] Tech Univ Darmstadt, Ctr Adv Secur Res Darmstadt, Darmstadt, Germany
关键词
PASSPOINTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fact that users struggle to keep up with all their (textual) passwords is no secret. Thus, one could argue that the textual password needs to be replaced. One alternative is graphical authentication. A wide range of graphical mechanisms have been proposed in the research literature. Yet, the industry has not embraced these alternatives. We use nowadays (textual) passwords several times a day to mediate access to protected resources and to ensure that accountability is facilitated. Consequently, the main aspect of interest to decision-makers is the strength of an authentication mechanism to resist intrusion attempts. Yet, researchers proposing alternative mechanisms have primarily focused on the users' need for superior usability while the strength of the mechanisms often remains unknown to the decision makers. In this paper we describe a range of graphical authentication mechanisms and consider how much strength they exhibit, in comparison to the textual password. As basic criteria for this comparison, we use the standard guessability, observability and recordability metrics proposed by De Angell et at. in 2005. The intention of this paper is to provide a better understanding of the potential for graphical mechanisms to be equal to, or superior to, the password in terms of meeting its most basic requirement namely resisting intrusion attempts.
引用
收藏
页码:837 / 844
页数:8
相关论文
共 50 条
  • [21] MESSAGE AUTHENTICATION AND DYNAMIC PASSWORDS
    BEKER, HJ
    COLE, GM
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 171 - 175
  • [22] Passwords: Philology, Security, Authentication
    Huskey, Samuel J.
    TECHNOLOGY AND CULTURE, 2019, 60 (04) : 1126 - 1127
  • [23] Passwords: Philology, Security, Authentication
    Vadde, Aarthi
    AMERICAN LITERATURE, 2020, 92 (04) : 820 - 824
  • [24] Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
    Rass, Stefan
    Schuller, David
    Kollmitzer, Christian
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 166 - +
  • [25] Enhancing Visual Passwords Using a Grid-Based Graphical Password Authentication to Mitigate Shoulder Surfing
    Paul, P. Mano
    Jingle, I. Berin Jeba
    Jingle, I. Diana Jeba
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 447 - 455
  • [26] A study on priming methods for graphical passwords
    Parish Z.
    Salehi-Abari A.
    Thorpe J.
    Journal of Information Security and Applications, 2021, 62
  • [27] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [28] Graphical passwords: Behind the attainment of goals
    Vaddeti, Ankitha
    Vidiyala, Deepthi
    Puritipati, Vineetha
    Ponnuru, Raveendra Babu
    Shin, Ji Sun
    Alavalapati, Goutham Reddy
    SECURITY AND PRIVACY, 2020, 3 (06)
  • [29] Balancing Usability and Security of Graphical Passwords
    Lapin, Kristina
    Siurkus, Manfredas
    DIGITAL INTERACTION AND MACHINE INTELLIGENCE, MIDI 2021, 2022, 440 : 153 - 160
  • [30] Graphical passwords based on robust discretization
    Birget, Jean-Camille
    Hong, Dawei
    Memon, Nasir
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) : 395 - 399