skip to main content
10.1145/1653662.1653722acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Multiple password interference in text passwords and click-based graphical passwords

Published:09 November 2009Publication History

ABSTRACT

The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering multiple passwords. This reduces security since users reuse the same password for different systems or reveal other passwords as they try to log in. We report on a laboratory study comparing recall of multiple text passwords with recall of multiple click-based graphical passwords. In a one-hour session (short-term), we found that participants in the graphical password condition coped significantly better than those in the text password condition. In particular, they made fewer errors when recalling their passwords, did not resort to creating passwords directly related to account names, and did not use similar passwords across multiple accounts. After two weeks, participants in the two conditions had recall success rates that were not statistically different from each other, but those with text passwords made more recall errors than participants with graphical passwords. In our study, click-based graphical passwords were significantly less susceptible to multiple password interference in the short-term, while having comparable usability to text passwords in most other respects.

References

  1. A. Adams and M. Sasse. Users are not the enemy. Communication of the ACM, 42(12):41--46, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Anderson and J. Neely. Memory. Handbook of Perception and Cognition, chapter 8: Interference and inhibition in memory retrieval, pages 237--313. Academic Press, 2nd edition, 1996.Google ScholarGoogle Scholar
  3. G. Blonder. Graphical passwords. United States Patent 5,559,961, 1996.Google ScholarGoogle Scholar
  4. I. Britton. Freefoto website. http://www.freefoto, accessed February 2007.Google ScholarGoogle Scholar
  5. B. Burstein, L. Bank, and L. Jarvik. Sex differences in cognitive functioning: Evidence, determinants, implications. Human Development, 23:289--313, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Chiasson, R. Biddle, and P. C. van Oorschot. A second look at the usability of click-based graphical passwords. In 3rd Symposium on Usable Privacy and Security (SOUPS), July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. Influencing users towards better passwords: Persuasive Cued Click-Points. In BCS-HCI'08: Proceedings of the 22nd British HCI Group Annual Conference on HCI. British Computer Society, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, 8(5), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In 15th USENIX Security Symposium, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Cranor and S. Garfinkel. Security and Usability: Designing Systems that People Can Use. O'Reilly Media, edited collection edition, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Davis, F. Monrose, and M. Reiter. On user choice in graphical password schemes. In 13th USENIX Security Symposium, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Designer. John the Ripper password cracker. http://www.openwall.com/john/.Google ScholarGoogle Scholar
  13. A. Dirik, N. Menon, and J. Birget. Modeling user choice in the Passpoints graphical password scheme. In 3rd ACM Conference on Symposium on Usable Privacy and Security (SOUPS), July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In ACM Conference on Human Factors in Computing Systems (CHI), April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Florencio and C. Herley. A large-scale study of WWW password habits. In 16th ACM International World Wide Web Conference (WWW), May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Forget, S. Chiasson, P. C. van Oorschot, and R. Biddle. Improving text passwords through persuasion. In 4th Symposium on Usable Privacy and Security (SOUPS), July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Free Images.com. Free Image website. http://www.freeimages.com, accessed February 2008.Google ScholarGoogle Scholar
  18. S. Gaw and E. Felten. Password management strategies for online accounts. In 2nd Symposium On Usable Privacy and Security (SOUPS), July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Goldstein. Cognitive Psychology. Wadsworth Publishing, 2006.Google ScholarGoogle Scholar
  20. K. Golofit. Click passwords under investigation. In 12th European Symposium On Research In Computer Security (ESORICS), Springer LNCS 4734, September 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Komanduri and D. Hutchings. Order and entropy in Picture Passwords. In Graphics Interface Conference (GI), May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. S. Lockhart. The Oxford Handbook of Memory, chapter 3: Methods of Memory Research, pages 45--57. Oxford University Press: New York, NY, 2000.Google ScholarGoogle Scholar
  23. P. A. Lowe, J. W. Mayfield, and C. R. Reynolds. Gender differences in memory test performance among children and adolescents. Archives of Clinical Neuropsychology, 18:865--878, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  24. S. Madigan. Chapter 3: Picture memory. In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3. Picture Memory, pages 65--89. Lawrence Erlbaum Associates, 1983.Google ScholarGoogle Scholar
  25. W. Moncur and G. Leplatre. Pictures at the ATM: Exploring the usability of multiple graphical passwords. In ACM Conference on Human Factors in Computing Systems (CHI), April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F. Monrose and M. Reiter. Graphical passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems That People Can Use, chapter 9, pages 157--174. O'Reilly, 2005.Google ScholarGoogle Scholar
  27. PD Photo. PD Photo website. http://pdphoto.org, accessed February 2007.Google ScholarGoogle Scholar
  28. M. Peters. Revised Vandenberg&Kuse Mental Rotations Tests: forms MRT-A to MRT-D. Technical report, Department of Psychology, University of Guelph, 1995.Google ScholarGoogle Scholar
  29. K. Renaud. Evaluating authentication mechanisms. In L. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems That People Can Use, chapter 6, pages 103--128. O'Reilly Media, 2005.Google ScholarGoogle Scholar
  30. A. Salehi-Abari, J. Thorpe, and P. C. van Oorschot. On purely automated attacks and click-based graphical passwords. In 24th Annual Computer Security Applications Conference (ACSAC), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. L. Standing, J. Conezio, and R. Haber. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science, 19(2):73--74, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  32. X. Suo, Y. Zhu, and G. Owen. Graphical passwords: A survey. In Annual Computer Security Applications Conference (ACSAC), December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Thorpe and P. C. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In 16th USENIX Security Symposium, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. E. Tulving and Z. Pearlstone. Availability versus accessibility of information in memory for words. Journal of Verbal Learning and Verbal Behavior, 5:381--391, 1966.Google ScholarGoogle ScholarCross RefCross Ref
  35. M. van Lieshout and A. Baddeley. A nonparametric measure of spatial interaction in point patterns. Statistica Neerlandica, 50(3):344--361, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  36. K.-P. L. Vu, R. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook, and E. Schultz. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65:744--757, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, Washington, D.C., August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In 11th International Conference on Human-Computer Interaction (HCI International), 2005.Google ScholarGoogle Scholar
  39. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63(1-2):102--127, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. In 1st Symposium on Usable Privacy and Security (SOUPS), July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Multiple password interference in text passwords and click-based graphical passwords

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
      November 2009
      664 pages
      ISBN:9781605588940
      DOI:10.1145/1653662

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader