Graphical dictionaries and the memorable space of graphical passwords

被引:0
|
作者
Thorpe, J [1 ]
van Oorschot, PC [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force password crackers using attack dictionaries. This leads us to ask what classes of graphical passwords users find memorable. We postulate one such class supported by a collection of cognitive studies on visual recall, which can be characterized as mirror symmetric (reflective) passwords. We assume that an attacker would put this class in an attack dictionary for graphical passwords and propose how an attacker might order such a dictionary. We extend the existing analysis of graphical passwords by analyzing the size of the mirror symmetric password space relative to the full password space of the graphical password scheme of Jermyn et al. (1999), and show it to be exponentially smaller (assuming appropriate axes of reflection). This reduction m size can be compensated for by longer passwords: the size of the space of mirror symmetric passwords of length about L + 5 exceeds that of the full password space for corresponding length L less than or equal to 14 on a 5 x 5 grid. This work could be used to help in formulating password rules for graphical password users and in creating proactive graphical password checkers.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [1] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [2] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428
  • [3] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [4] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950
  • [5] Eye Tracking Graphical Passwords
    Mihajlov, Martin
    Jerman-Blazic, Borka
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 37 - 44
  • [6] On Coloring/Labelling Graphical Groups For Creating New Graphical Passwords
    Yao, Bing
    Sun, Hui
    Zhao, Meimei
    Li, Jingwen
    Yan, Guanghui
    Yao, Bing
    [J]. PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1371 - 1375
  • [7] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [8] Graphical passwords: Behind the attainment of goals
    Vaddeti, Ankitha
    Vidiyala, Deepthi
    Puritipati, Vineetha
    Ponnuru, Raveendra Babu
    Shin, Ji Sun
    Alavalapati, Goutham Reddy
    [J]. SECURITY AND PRIVACY, 2020, 3 (06):
  • [9] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [10] The Pattern-richness of Graphical Passwords
    Vorster, Johannes S.
    van Heerden, Renier P.
    Irwin, Barry
    [J]. 2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 69 - 76