Graphical dictionaries and the memorable space of graphical passwords

被引:0
|
作者
Thorpe, J [1 ]
van Oorschot, PC [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force password crackers using attack dictionaries. This leads us to ask what classes of graphical passwords users find memorable. We postulate one such class supported by a collection of cognitive studies on visual recall, which can be characterized as mirror symmetric (reflective) passwords. We assume that an attacker would put this class in an attack dictionary for graphical passwords and propose how an attacker might order such a dictionary. We extend the existing analysis of graphical passwords by analyzing the size of the mirror symmetric password space relative to the full password space of the graphical password scheme of Jermyn et al. (1999), and show it to be exponentially smaller (assuming appropriate axes of reflection). This reduction m size can be compensated for by longer passwords: the size of the space of mirror symmetric passwords of length about L + 5 exceeds that of the full password space for corresponding length L less than or equal to 14 on a 5 x 5 grid. This work could be used to help in formulating password rules for graphical password users and in creating proactive graphical password checkers.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [31] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [32] A Preliminary Study to Evaluate Graphical Passwords for Older Adults
    Jittibumrungrak, Paranya
    Hongwarittorrn, Nuttanont
    [J]. PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 88 - 95
  • [33] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)
  • [34] Is it Better to Choose Seen or Unseen Distracters for Graphical Passwords
    Ashraf, Abdul
    Poet, Ron
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [35] On predictive models and user-drawn graphical passwords
    Van Oorschot, P. C.
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [36] Click to Enter: Comparing Graphical and Textual Passwords for Children
    Cole, Jasper
    Walsh, Greg
    Pease, Zachary
    [J]. PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INTERACTION DESIGN AND CHILDREN (IDC 2017), 2017, : 472 - 477
  • [37] On Automated Image Choice for Secure and Usable Graphical Passwords
    Dunphy, Paul
    Olivier, Patrick
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 99 - 108
  • [38] A Human Factors Study of Graphical Passwords Using Biometrics
    Riggan, Benjamin S.
    Snyder, Wesley E.
    Wang, Xiaogang
    Feng, Jing
    [J]. PATTERN RECOGNITION, GCPR 2014, 2014, 8753 : 464 - 475
  • [39] Implementation of Graphical Passwords in Internet Banking for Enhanced Security
    Razvi, Salma Abid
    Neelima, S.
    Prathyusha, C.
    Yuvasree, G.
    Ganga, C.
    Kumar, K. Manoj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 35 - 41
  • [40] Guessing Click-Based Graphical Passwords by Eye Tracking
    LeBlanc, Daniel
    Forget, Alain
    Biddle, Robert
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 197 - 204