Are Graphical Authentication Mechanisms As Strong As Passwords?

被引:0
|
作者
Renaud, Karen [1 ]
Mayer, Peter [2 ]
Volkamer, Melanie [2 ]
Maguire, Joseph [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
[2] Tech Univ Darmstadt, Ctr Adv Secur Res Darmstadt, Darmstadt, Germany
关键词
PASSPOINTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fact that users struggle to keep up with all their (textual) passwords is no secret. Thus, one could argue that the textual password needs to be replaced. One alternative is graphical authentication. A wide range of graphical mechanisms have been proposed in the research literature. Yet, the industry has not embraced these alternatives. We use nowadays (textual) passwords several times a day to mediate access to protected resources and to ensure that accountability is facilitated. Consequently, the main aspect of interest to decision-makers is the strength of an authentication mechanism to resist intrusion attempts. Yet, researchers proposing alternative mechanisms have primarily focused on the users' need for superior usability while the strength of the mechanisms often remains unknown to the decision makers. In this paper we describe a range of graphical authentication mechanisms and consider how much strength they exhibit, in comparison to the textual password. As basic criteria for this comparison, we use the standard guessability, observability and recordability metrics proposed by De Angell et at. in 2005. The intention of this paper is to provide a better understanding of the potential for graphical mechanisms to be equal to, or superior to, the password in terms of meeting its most basic requirement namely resisting intrusion attempts.
引用
收藏
页码:837 / 844
页数:8
相关论文
共 50 条
  • [41] Graphical Passwords: Requisite for Secure Information Systems
    Abbasi, Kashif
    Zin, Abdullah Mohd
    Mokhtar, Mohd Rosmadi
    ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
  • [42] A Study on an Image Synthesis Method for Graphical Passwords
    Hasegawa, Madoka
    Tanaka, Yuichi
    Kato, Shigeo
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 643 - 646
  • [43] A Comprehensive Study of the Usability of Multiple Graphical Passwords
    Chowdhury, Soumyadeb
    Poet, Ron
    Mackenzie, Lewis
    HUMAN-COMPUTER INTERACTION - INTERACT 2013, PT III, 2013, 8119 : 424 - 441
  • [44] Comparison of Graphical Passwords Using ISO 9126
    Min, Lee Jue
    Hao, Lim Yong
    Wen, Ng Huey
    Guan, Tan Soon
    Ho, Yean Li
    Azman, Afizan
    Hoe, Lau Siong
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 982 - 985
  • [45] Automatic Registration of User Drawn Graphical Passwords
    Jebriel, Salem
    Poet, Ron
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 172 - 177
  • [46] Matrix Passwords: A Proposed Methodology of Password Authentication
    Zhang, Xiao
    Clark, Jan
    AMCIS 2012 PROCEEDINGS, 2012,
  • [47] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [48] Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms
    Belk, Marios
    Pamboris, Andreas
    Fidas, Christos
    Katsini, Christina
    Avouris, Nikolaos
    Samaras, George
    2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017), 2017, : 252 - 259
  • [49] Authentication Schemes for Session Passwords using Colors
    Dorage, Nita
    Sawant, Bhakti
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 120 - 123
  • [50] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +