The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Password Policy: Update Recommendations Identity & Access Management Committee September, 2012.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle.
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Cryptography and Network Security Chapter 20 Intruders
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
Tom Parker Project Manager Identity Management Team IT Security Group.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Homework #4 Comments. Passwords: What are they good for? Today passwords are the #1 means of authenticating users on a day-to-day basis. – , Websites,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
NS-H /11041 System Security. NS-H /11042 Authentication Verifying the identity of another entity Two interesting cases (for this class): –Computer.
1. 2 Overview of AT&T EPIC Ordering Process for SUS (Supply Order) Suppliers 1.AT&T User creates shopping cart on internal web-based portal 2.Shopping.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Frequently Encountered Errors Idaho State Department of Education October 20, 2011.
Password Management PA Turnpike Commission
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
CIS 450 – Network Security Chapter 8 – Password Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Audio and Visual Digit Span Test Cole Gilbert Central Catholic High School 9th Grade.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Web-based Surveys Patty Nordstrom March 27, 2008.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Greystash February Program Review. Team Failing Street Kyle DeFrancia – Spring Lead Erik Paulson – Fall Lead Joe Devlin - Webmaster.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
Understanding Security Policies Lesson 3. Objectives.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Understanding Security Policies
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Password strength Dr. X.
Authentication Schemes for Session Passwords using Color and Images
Common Methods Used to Commit Computer Crimes
Boost Your Sales With Vanity Phone Numbers
Setting up an online account
Passwords.
Presentation transcript:

The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford

Purpose of Study A number of guidance's have been produced on how to create passwords, but no one has studied what types of passwords are better to remember Do users choose simple to remember passwords over good passwords Can users be educated to produce better passwords

Human Memory is Fallible Memory for sequences of items is temporally limited  Short term capacity 5-9 items (i.e. 7 digit phone numbers) Sequences must be chunked Memory thrives on redundancy

Common advice on password selection Passwords should be a mix of letters and numbers Passwords should not contain common words Passwords should not be written down Use random characters if possible Use random letters that sounds like a word

Common advice on password selection Use a pass phrase to remember the password passwords must be a minimum length Passwords must be changed on a regular interval Passwords must contain a mix of letters and numbers (system enforced)

Experimental Study 288 Freshman students volunteered to be part of the study, and were broken into 3 groups  Group instructed to pick random passwords by pointing at letters and writing them down  Group instructed to use pass phrases to memorize the passwords  Control group not given any instruction

Breakdown of Subjects Number of Users Control Group95 Random Password96 Pass Phrase97 Comparison Group100

Experimental Study After 1 month, various attacks were performed on their passwords to see how complex they were User requests to change passwords were monitored After 4 months, the subjects were ed with a 2 question survey

Password Attacks Four attacks were applied against the passwords of the test subjects and an additional 100 comparison users  Dictionary Attack  Permutation of Words and Numbers  User Information Attack  Brute Force Attack (if passwords only 6 characters long)

Results - Password Length Selected Password Lengths Control Group7.6 Random Password8 Pass Phrase7.9 Comparison Group7.3

Results – Passwords that could be cracked Cracked Passwords Control Group30 (32%) Random Password8 (8%) Pass Phrase6 (6%) Comparison Group33 (33%)

Results – Brute Force Attacks Passwords cracked with brute force (6 or less characters) Control Group3 Random Password3 Pass Phrase3 Comparison Group2

Password Memorization The study also wanted to see how much trouble users had with remembering passwords  System Admin calls were tracked to see if users were resetting their passwords  A survey was send to users questioning them on their passwords

Password Survey Two question Survey  How hard did you find it to memorize your password (1 = trivial, 5 = impossible)  How long did you have to carry your password with you (in weeks), as you had not memorized it.

Results – System Admin calls for Password Reset System Admin Calls for Password Resets Control Group2 Random Password1 Pass Phrase3

Results – Number of Subjects who responded to the survey Survey Responses Control Group80 (84%) Random Password71 (74%) Pass Phrase78 (80%) Total229 (80%)

Results – Survey Results Difficulty to Memorize Weeks to remember Control Group Random Password Pass Phrase

Conclusions People have difficulty remembering random passwords  Some users never memorized their passwords Pass phase passwords are harder to crack Random passwords are no stronger than pass phase passwords

Conclusion Pass phase passwords are as easy to remember as naively selected passwords Educating users to use random or pass phase passwords does not improve security unless there is a way to enforce the policy, since 10% of users failed to comply with the request.

Recommendations Users should be instructed to use pass phase passwords Users should be encouraged to use 10+ character passwords Passwords should contain numbers and letters

Recommendations Compliance to policy should be enforced if possible Centrally assigned random passwords improve security through improved policy compliance