Skip to main content

2015 | OriginalPaper | Buchkapitel

Effects of Password Permutation on Subjective Usability Across Platforms

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The current work examines the effects of password permutation on subjective usability across platforms, using system-generated passwords that adhere to the password requirements found in higher-security enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improve password usability. Password permutation improves mobile device entry by reducing the number of keystrokes required to enter numbers and symbols. Across platforms (smartphone, tablet, and desktop computer) participants rated the longer (length 14) permuted passwords as easier to type than the shorter (length 10) non-permuted passwords. This demonstrates that the composition and structure of a password are important; people are sensitive to factors beyond simple password length. By combining qualitative and quantitative research, we will ultimately arrive at a more complete understanding of how password construction impacts usability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Disclaimer: Any mention of commercial products or reference to commercial organizations is for information only; it does not imply recommendation or endorsement by the National Institute of Standards and Technology nor does it imply that the products mentioned are necessarily the best available for the purpose.
 
2
A platform is a unified architecture composed of common hardware and software elements that may manifest in various specific devices. For example, the iPhone and iPad are two devices sharing the iOS platform.
 
3
Code available at https://​github.​com/​usnistgov/​TypingTester. The program was designed to maximize flexibility and opportunity for reuse in future NIST experiments, but we hope that other usable security researchers may also benefit from this research tool.
 
4
Participant IDs are denoted as (P###).
 
Literatur
1.
Zurück zum Zitat Honan, M.: Kill the password: why a string of characters can’t protect us anymore. Wired (2012) Honan, M.: Kill the password: why a string of characters can’t protect us anymore. Wired (2012)
4.
Zurück zum Zitat Steves, M., Killourhy, K., Theofanos, M.F.: Clear, unambiguous password policies: an oxymoron? In: Rau, P. (ed.) CCD 2014. LNCS, vol. 8528, pp. 240–251. Springer, Heidelberg (2014) Steves, M., Killourhy, K., Theofanos, M.F.: Clear, unambiguous password policies: an oxymoron? In: Rau, P. (ed.) CCD 2014. LNCS, vol. 8528, pp. 240–251. Springer, Heidelberg (2014)
5.
Zurück zum Zitat Steves, M., Theofanos, M.F.: Password policy interpretation. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear) Steves, M., Theofanos, M.F.: Password policy interpretation. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)
6.
Zurück zum Zitat Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127–137. Springer, Heidelberg (2014) Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127–137. Springer, Heidelberg (2014)
7.
Zurück zum Zitat Greene, K.K., Kelsey, J., Franklin, J.M.: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms. National Institute of Standards and Technology Interagency Report (NISTIR) 8040 (2015) Greene, K.K., Kelsey, J., Franklin, J.M.: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms. National Institute of Standards and Technology Interagency Report (NISTIR) 8040 (2015)
8.
Zurück zum Zitat Ploehn, C., Greene, K.K.: The authentication equation: visualizing the convergence of security and usability of system-generated passwords. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear) Ploehn, C., Greene, K.K.: The authentication equation: visualizing the convergence of security and usability of system-generated passwords. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)
9.
Zurück zum Zitat Lee, P., Choong, Y.: Human generated passwords – the impacts of password requirements and presentation styles. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear) Lee, P., Choong, Y.: Human generated passwords – the impacts of password requirements and presentation styles. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)
10.
Zurück zum Zitat Stanton, B.C., Greene, K.K.: Character strings, memory and passwords: what a recall study can tell us. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 195–206. Springer, Heidelberg (2014) Stanton, B.C., Greene, K.K.: Character strings, memory and passwords: what a recall study can tell us. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 195–206. Springer, Heidelberg (2014)
11.
Zurück zum Zitat Greene, K.K., Gallagher, M.A., Stanton, B.C., Lee, P.Y.: I can’t type that! p@$$w0rd entry on mobile devices. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 160–171. Springer, Heidelberg (2014) Greene, K.K., Gallagher, M.A., Stanton, B.C., Lee, P.Y.: I can’t type that! p@$$w0rd entry on mobile devices. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 160–171. Springer, Heidelberg (2014)
12.
Zurück zum Zitat Jakobsson, M.: Mobile Authentication Problems and Solutions. Springer Briefs in Computer Science. Springer, Heidelberg (2013)CrossRef Jakobsson, M.: Mobile Authentication Problems and Solutions. Springer Briefs in Computer Science. Springer, Heidelberg (2013)CrossRef
13.
Zurück zum Zitat Gallagher, M.A.: Modeling password entry on mobile devices: please check your password and try again. Doctoral Dissertation, Rice University, Houston, TX (2015) Gallagher, M.A.: Modeling password entry on mobile devices: please check your password and try again. Doctoral Dissertation, Rice University, Houston, TX (2015)
14.
Zurück zum Zitat Choong, Y., Theofanos, M., Liu, H.K.: United States Federal Employees’ Password Management Behaviors – a Department of Commerce Case Study. National Institute of Standards and Technology Interagency Report (NISTIR) 7991 (2014) Choong, Y., Theofanos, M., Liu, H.K.: United States Federal Employees’ Password Management Behaviors – a Department of Commerce Case Study. National Institute of Standards and Technology Interagency Report (NISTIR) 7991 (2014)
15.
Zurück zum Zitat Shelton, D.C.: Reasons for non-compliance with mandatory information assurance policies by a trained population. Doctoral Dissertation, Capitol Technology University (2014) Shelton, D.C.: Reasons for non-compliance with mandatory information assurance policies by a trained population. Doctoral Dissertation, Capitol Technology University (2014)
16.
Zurück zum Zitat Choong, Y., Theofanos, M. F.: What 4,500 + people can tell you – employees’ attitudes toward organizational password policy do matter. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear) Choong, Y., Theofanos, M. F.: What 4,500 + people can tell you – employees’ attitudes toward organizational password policy do matter. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)
17.
Zurück zum Zitat Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666 (2007) Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666 (2007)
18.
Zurück zum Zitat Unsworth, N., Engle, R.W.: Individual Differences in Working Memory Capacity and Retrieval: A Cue-Dependent Search Approach. The Foundations of Remembering: Essays in Honor of Henry L. Roedgier III, pp. 241–258. Psychology Press, New York (2007) Unsworth, N., Engle, R.W.: Individual Differences in Working Memory Capacity and Retrieval: A Cue-Dependent Search Approach. The Foundations of Remembering: Essays in Honor of Henry L. Roedgier III, pp. 241–258. Psychology Press, New York (2007)
19.
Zurück zum Zitat Forget, A., Biddle, R.: Memorability of persuasive passwords. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems, pp. 3759–3764 (2008) Forget, A., Biddle, R.: Memorability of persuasive passwords. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems, pp. 3759–3764 (2008)
20.
Zurück zum Zitat Vu, K., Cook, J., Bhargav-Spantzel, A., Proctor, R.W.: Short- and long-term retention of passwords generated by first-letter and entire-word mnemonic methods. In: Proceedings of the 5th Annual Security Conference, Las Vegas, NV (2006) Vu, K., Cook, J., Bhargav-Spantzel, A., Proctor, R.W.: Short- and long-term retention of passwords generated by first-letter and entire-word mnemonic methods. In: Proceedings of the 5th Annual Security Conference, Las Vegas, NV (2006)
21.
Zurück zum Zitat Vu, K., Proctor, R., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. –Comput. Stud. 65, 744–757 (2006)CrossRef Vu, K., Proctor, R., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. –Comput. Stud. 65, 744–757 (2006)CrossRef
22.
Zurück zum Zitat Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)CrossRef Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)CrossRef
23.
Zurück zum Zitat Salthouse, T.: Perceptual, cognitive, and motoric aspects of transcription typing. Psychol. Bull. 99(3), 303–319 (1986)CrossRef Salthouse, T.: Perceptual, cognitive, and motoric aspects of transcription typing. Psychol. Bull. 99(3), 303–319 (1986)CrossRef
24.
Zurück zum Zitat Coover, J.E.: A method of teaching typewriting based upon a psychological analysis of expert typing. Nat. Educ. Assoc. 61, 561–567 (1923) Coover, J.E.: A method of teaching typewriting based upon a psychological analysis of expert typing. Nat. Educ. Assoc. 61, 561–567 (1923)
25.
Zurück zum Zitat Gentner, D.: Skilled finger movements in typing. Center for Information Processing. University of California, San Diego. CHIP Report 104 (1981) Gentner, D.: Skilled finger movements in typing. Center for Information Processing. University of California, San Diego. CHIP Report 104 (1981)
26.
Zurück zum Zitat Salthouse, T.: Effects of age and skill in typing. J. Exp. Psychol. 113(3), 345–371 (1984)CrossRef Salthouse, T.: Effects of age and skill in typing. J. Exp. Psychol. 113(3), 345–371 (1984)CrossRef
27.
Zurück zum Zitat Greene, K.K., Franklin, J., Kelsey, J.: Tap on, tap off: onscreen keyboards and mobile password entry. In: Proceedings of ShmooCon 2015 (2015) Greene, K.K., Franklin, J., Kelsey, J.: Tap on, tap off: onscreen keyboards and mobile password entry. In: Proceedings of ShmooCon 2015 (2015)
28.
Zurück zum Zitat MacKenzie, I.S., Soukoreff, R.W.: Phrase sets for evaluating text entry techniques. In: Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2003, pp. 754–755. ACM, New York (2003) MacKenzie, I.S., Soukoreff, R.W.: Phrase sets for evaluating text entry techniques. In: Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2003, pp. 754–755. ACM, New York (2003)
Metadaten
Titel
Effects of Password Permutation on Subjective Usability Across Platforms
verfasst von
Kristen K. Greene
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20376-8_6

Premium Partner