Are Graphical Authentication Mechanisms As Strong As Passwords?

被引:0
|
作者
Renaud, Karen [1 ]
Mayer, Peter [2 ]
Volkamer, Melanie [2 ]
Maguire, Joseph [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
[2] Tech Univ Darmstadt, Ctr Adv Secur Res Darmstadt, Darmstadt, Germany
关键词
PASSPOINTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fact that users struggle to keep up with all their (textual) passwords is no secret. Thus, one could argue that the textual password needs to be replaced. One alternative is graphical authentication. A wide range of graphical mechanisms have been proposed in the research literature. Yet, the industry has not embraced these alternatives. We use nowadays (textual) passwords several times a day to mediate access to protected resources and to ensure that accountability is facilitated. Consequently, the main aspect of interest to decision-makers is the strength of an authentication mechanism to resist intrusion attempts. Yet, researchers proposing alternative mechanisms have primarily focused on the users' need for superior usability while the strength of the mechanisms often remains unknown to the decision makers. In this paper we describe a range of graphical authentication mechanisms and consider how much strength they exhibit, in comparison to the textual password. As basic criteria for this comparison, we use the standard guessability, observability and recordability metrics proposed by De Angell et at. in 2005. The intention of this paper is to provide a better understanding of the potential for graphical mechanisms to be equal to, or superior to, the password in terms of meeting its most basic requirement namely resisting intrusion attempts.
引用
收藏
页码:837 / 844
页数:8
相关论文
共 50 条
  • [31] The Pattern-richness of Graphical Passwords
    Vorster, Johannes S.
    van Heerden, Renier P.
    Irwin, Barry
    2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 69 - 76
  • [32] Graphical passwords for older computer users
    Carter N.
    Li C.
    Li Q.
    Stevens J.A.
    Novak E.
    Qin Z.
    International Journal of Security and Networks, 2018, 13 (04) : 211 - 227
  • [33] On Coloring/Labelling Graphical Groups For Creating New Graphical Passwords
    Yao, Bing
    Sun, Hui
    Zhao, Meimei
    Li, Jingwen
    Yan, Guanghui
    Yao, Bing
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1371 - 1375
  • [34] Passwords: Philology, Security, Authentication.
    Slater, Avery
    CRITICAL INQUIRY, 2021, 47 (02) : 422 - 423
  • [35] Wireless Authentication using Remote Passwords
    Harding, Andrew
    van der Horst, Timothy W.
    Seamons, Kent E.
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 24 - 29
  • [36] Passwords are dead Alternative authentication methods
    Bachmann, Michael
    2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, : 320 - 320
  • [37] Authentication Using Session Based Passwords
    Prabhu, Sanket
    Shah, Vaibhav
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 460 - 464
  • [38] Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
    Chiasson, Sonia
    Forget, Alain
    Stobert, Elizabeth
    van Oorschot, P. C.
    Biddle, Robert
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 500 - 511
  • [39] Graphical Passwords: A Qualitative Study of Password Patterns
    Vorster, Jo
    van Heerden, Renier
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 375 - 383
  • [40] Exploring the Acceptability of Graphical Passwords for People with Dyslexia
    Evtimova, Polina
    Nicholson, James
    HUMAN-COMPUTER INTERACTION, INTERACT 2021, PT I, 2021, 12932 : 213 - 222