Skip to main content
Top

2024 | OriginalPaper | Chapter

Emotionally Engaged Neurosymbolic AI for Usable Password Generation

Author : Sumitra Biswal

Published in: Advances in Data-Driven Computing and Intelligent Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The chapter delves into the challenge of secure password generation in the digital era, highlighting the prevalence of password-based authentication despite advances in biometric and MFA. It introduces the Emotionally Engaged Neurosymbolic AI (EENAI) Password Recommender System, which combines AI and cognitive psychology to generate secure, memorable passwords. The system leverages emotional attributes like valence and arousal to create personalized passwords, addressing the trade-off between memorability and security. The EENAI architecture includes modules for scenario generation, password creation, and mnemonic cue generation, each contributing to the overall password generation process. Experimental results demonstrate that higher emotional attribute values significantly enhance password strength and memorability. The chapter concludes by emphasizing the potential of emotional associations in crafting robust and memorable passwords, setting the stage for future research and practical applications in password security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Business + Economics & Engineering + Technology"

Online-Abonnement

Springer Professional "Business + Economics & Engineering + Technology" gives you access to:

  • more than 102.000 books
  • more than 537 journals

from the following subject areas:

  • Automotive
  • Construction + Real Estate
  • Business IT + Informatics
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Mechanical Engineering + Materials
  • Insurance + Risk


Secure your knowledge advantage now!

Springer Professional "Engineering + Technology"

Online-Abonnement

Springer Professional "Engineering + Technology" gives you access to:

  • more than 67.000 books
  • more than 390 journals

from the following specialised fileds:

  • Automotive
  • Business IT + Informatics
  • Construction + Real Estate
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Mechanical Engineering + Materials





 

Secure your knowledge advantage now!

Springer Professional "Business + Economics"

Online-Abonnement

Springer Professional "Business + Economics" gives you access to:

  • more than 67.000 books
  • more than 340 journals

from the following specialised fileds:

  • Construction + Real Estate
  • Business IT + Informatics
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Insurance + Risk



Secure your knowledge advantage now!

Literature
3.
go back to reference Khan L, Coopamootoo KPL, Ng M (2020) Not annoying the user for better password choice: effect of incidental anger emotion on password choice. In: Moallem A (eds) HCI for Cybersecurity, privacy and trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, pp 143–161 Khan L, Coopamootoo KPL, Ng M (2020) Not annoying the user for better password choice: effect of incidental anger emotion on password choice. In: Moallem A (eds) HCI for Cybersecurity, privacy and trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, pp 143–161
4.
go back to reference Coopamootoo KPL (2020) Empathy as a response to frustration in password choice. In: Berhard M et al (2020) Financial cryptography and data security. FC 2020. Lecture Notes in Computer Science, vol 12063. Springer, pp 177–191 Coopamootoo KPL (2020) Empathy as a response to frustration in password choice. In: Berhard M et al (2020) Financial cryptography and data security. FC 2020. Lecture Notes in Computer Science, vol 12063. Springer, pp 177–191
5.
go back to reference Blocki J, Blum M, Datta A (2013) Naturally rehearsing passwords. In: Sako K, Sarkar P (eds) Advances in cryptology—ASIACRYPT 2013. ASIACRYPT 2013. Lecture Notes in Computer Science, vol 8270. Springer, Berlin, Heidelberg, pp 361–380 Blocki J, Blum M, Datta A (2013) Naturally rehearsing passwords. In: Sako K, Sarkar P (eds) Advances in cryptology—ASIACRYPT 2013. ASIACRYPT 2013. Lecture Notes in Computer Science, vol 8270. Springer, Berlin, Heidelberg, pp 361–380
6.
go back to reference Blocki J, Komanduri S, Cranor L, Datta A (2014) Spaced repetition and mnemonics enable recall of multiple strong passwords. arXiv preprint arXiv:1410.1490 [cs.CR] Blocki J, Komanduri S, Cranor L, Datta A (2014) Spaced repetition and mnemonics enable recall of multiple strong passwords. arXiv preprint arXiv:​1410.​1490 [cs.CR]
7.
go back to reference Custodio J, Justel N (2023) Stress and Novelty: two interventions to modulate emotional memory in adolescents. J Cogn Enhanc 7:39–50CrossRef Custodio J, Justel N (2023) Stress and Novelty: two interventions to modulate emotional memory in adolescents. J Cogn Enhanc 7:39–50CrossRef
8.
go back to reference Hou TY, Cai WP (2022) What emotion dimensions can affect working memory performance in healthy adults? A review. World J Clin Cases. 10(2):401–411CrossRef Hou TY, Cai WP (2022) What emotion dimensions can affect working memory performance in healthy adults? A review. World J Clin Cases. 10(2):401–411CrossRef
9.
go back to reference Di Nocera F, Tempestini G (2022) Getting rid of the usability/security trade-off: a behavioral approach. J Cybersecur Privacy 2(2):245–256CrossRef Di Nocera F, Tempestini G (2022) Getting rid of the usability/security trade-off: a behavioral approach. J Cybersecur Privacy 2(2):245–256CrossRef
10.
go back to reference Bhana B, Flowerday SV (2022) Usability of the login authentication process: passphrases and passwords. Inf Comput Secur 30(2):280–305CrossRef Bhana B, Flowerday SV (2022) Usability of the login authentication process: passphrases and passwords. Inf Comput Secur 30(2):280–305CrossRef
11.
go back to reference Rodriguez JJ, Zibran MF, Eishita FZ (2022) Finding the middle ground: measuring passwords for security and memorability. In: IEEE/ACIS 20th international conference on software engineering research, management and applications (SERA). IEEE, Las Vegas, NV, USA, pp 77–82 Rodriguez JJ, Zibran MF, Eishita FZ (2022) Finding the middle ground: measuring passwords for security and memorability. In: IEEE/ACIS 20th international conference on software engineering research, management and applications (SERA). IEEE, Las Vegas, NV, USA, pp 77–82
12.
go back to reference Wang L, Li Y, Sun K (2016) Amnesia: a bilateral generative password manager. In: IEEE 36th international conference on distributed computing systems (ICDCS). IEEE, Nara, Japan, pp 313–322 Wang L, Li Y, Sun K (2016) Amnesia: a bilateral generative password manager. In: IEEE 36th international conference on distributed computing systems (ICDCS). IEEE, Nara, Japan, pp 313–322
13.
go back to reference Andriotis P, Kirby M, Takasu A (2023) Bu-Dash: a universal and dynamic graphical password scheme (extended version). Int J Inf Secur 22:381–401CrossRef Andriotis P, Kirby M, Takasu A (2023) Bu-Dash: a universal and dynamic graphical password scheme (extended version). Int J Inf Secur 22:381–401CrossRef
14.
go back to reference Segreti SM, Melicher W, Komanduri S, Melicher D, Shay R, Ur B et al (2017) Diversify to survive: making passwords stronger with adaptive policies. In: Proceedings of the thirteenth USENIX conference on usable privacy and security (SOUPS 2017), USENIX Association, USA, pp 1–12 Segreti SM, Melicher W, Komanduri S, Melicher D, Shay R, Ur B et al (2017) Diversify to survive: making passwords stronger with adaptive policies. In: Proceedings of the thirteenth USENIX conference on usable privacy and security (SOUPS 2017), USENIX Association, USA, pp 1–12
15.
go back to reference Habib H, Naeini PE, Devlin S, Oates M, Swoopes C, Bauer L et al (2018) User behaviors and attitudes under password expiration policies. In: Proceedings of the fourteenth USENIX conference on usable privacy and security (SOUPS 2018), USENIX Association, USA, pp 13–30 Habib H, Naeini PE, Devlin S, Oates M, Swoopes C, Bauer L et al (2018) User behaviors and attitudes under password expiration policies. In: Proceedings of the fourteenth USENIX conference on usable privacy and security (SOUPS 2018), USENIX Association, USA, pp 13–30
16.
go back to reference Davis DK, Chowdhury MM, Rifat N (2022) Password security: what are we doing wrong? In: 2022 IEEE international conference on electro information technology (eIT), Mankato, MN, USA, pp 562–567 Davis DK, Chowdhury MM, Rifat N (2022) Password security: what are we doing wrong? In: 2022 IEEE international conference on electro information technology (eIT), Mankato, MN, USA, pp 562–567
Metadata
Title
Emotionally Engaged Neurosymbolic AI for Usable Password Generation
Author
Sumitra Biswal
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9521-9_20