skip to main content
10.1145/1463160.1463202acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordichiConference Proceedingsconference-collections
research-article

PassShapes: utilizing stroke based authentication to increase password memorability

Published:20 October 2008Publication History

ABSTRACT

Authentication today mostly relies on passwords or personal identification numbers (PINs). Therefore the average user has to remember an increasing amount of PINs and passwords. Unfortunately, humans have limited capabilities for remembering abstract alphanumeric sequences. Thus, many people either forget them or use very simple ones, which implies several security risks. In this work, a novel authentication method called PassShapes is presented. In this system users authenticate themselves to a computing system by drawing simple geometric shapes constructed of an arbitrary combination of eight different strokes. We argue that using such shapes will allow more complex and thus more secure authentication tokens with a lower cognitive load and higher memorability. To prove these assumptions, two user studies have been conducted. The memorability evaluation showed that the PassShapes concept is able to increase the memorability when users can practice the PassShapes several times. This effect is even increasing over time. Additionally, a prototype was implemented to conduct a usability study. The results of both studies indicate that the PassShapes approach is able to provide a usable and memorable authentication method.

References

  1. Adams, A., Sasse, M. A. 1999. Users are not the enemy. In: Communications of the ACM, 42:12, 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Blonder, G., 1996. Graphical passwords. United States Patent 5559961.Google ScholarGoogle Scholar
  3. Brostoff, S., Sasse, M. A. 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In: Proceedings of the HCI 2000. 405--424.Google ScholarGoogle Scholar
  4. Craik, F. I. M., Lockhart, R. S. 1972. Levels of processing: A framework for memory research. In: Journal of Verbal Learning and Verbal Behavior, 11.Google ScholarGoogle ScholarCross RefCross Ref
  5. Davis, D., Monrose, F., Reiter, M. K. 2004. On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium, (San Diego, California, August 9--13), 151--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. De Angeli, A., Coventry, L., Johnson, G., Renaud, K. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, In: International Journal of Human-Computer Studies, 63:1--2, 128--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. De Luca, A., Weiss, R., Drewes, H. Evaluation of Eye-Gaze Interaction Methods for Security Enhanced PIN-Entry. In: Proceedings of OZCHI 2007, Adelaide, Australia, 28--30.11.2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. De Luca, A., Weiss, R., Hußmann, H., and An, X. 2008. Eyepass - eye-stroke authentication for public terminals. In CHI '08 Extended Abstracts. Florence, Italy, April 05--10, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dirik, A. E., Memon, N., Birget, J. 2007. Modeling user choice in the PassPoints graphical password scheme. In Proceedings of the SOUPS 2007, (Pittsburgh, Pennsylvania, July 18--20, 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dhamija, R., Perrig, A. 2000. Déjà Vu: a user study using images for authentication. In: Proceedings of the 9th Conference on USENIX Security Symposium (Denver, Colorado, August 14--17, 2000), 45--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Flores d'Arcais G. 1994. Order of strokes writing as a cue for retrieval in reading chinese characters. In: Europ. Journal of Cognitive Psychology, 6:4, 337--55.Google ScholarGoogle ScholarCross RefCross Ref
  12. Klein, D. 1990. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Security Workshop (Portland, Oregon, August 27, 1990), 5--14.Google ScholarGoogle Scholar
  13. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., Rubin, A. D. 1999. The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium (Washington, D.C., August 23--26, 1999), 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Naka, M., Naoi, H. 1995. The effect of repeated writing on memory. In: Memory & Cognition, 23:2.Google ScholarGoogle Scholar
  15. Nali, D., Thorpe, J. 2004. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada.Google ScholarGoogle Scholar
  16. Oorschot, P. v., Thorpe, J. 2008. On predictive models and user-drawn graphical passwords. In: ACM Transactions on Information and System Security (TISSEC) 10:4, 1--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Paivio, A., Csapo, K. 1973. Picture Superiority in Free Recall: Imagery or Dual Coding? In: Cognitive Psychology 5, 176--206.Google ScholarGoogle ScholarCross RefCross Ref
  18. Real User Corporation. PassFaces Personal. http://www.passfaces.com.Google ScholarGoogle Scholar
  19. Renaud, K., De Angeli, A. 2004. My password is here! An investigation into visuo-spatial authentication mechanisms. In: Interacting with Computers, 16:6.Google ScholarGoogle ScholarCross RefCross Ref
  20. Sasse, M. A., Brostoff, S., Weirich, D. 2001. Transforming the 'weakest link': a human--computer interaction approach to usable and effective security. In: BT Technology Journal 19:3, 122--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Shadmer, R., Brashers-Krug, T. 1999. Functional Stages in the Formation of Human Long-Term Motor Memory. In: The Journal of Neuroscience, 17:1.Google ScholarGoogle Scholar
  22. Standing, L., Conezio, J., Haber, R. N. 1970. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. In: Psychonomic Science 19:2, 73--74.Google ScholarGoogle ScholarCross RefCross Ref
  23. Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. In: International Journal of Human-Computer Studies (HCI Research in Privacy and Security) 63, 102--127. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PassShapes: utilizing stroke based authentication to increase password memorability

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                NordiCHI '08: Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
                October 2008
                621 pages
                ISBN:9781595937049
                DOI:10.1145/1463160

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 20 October 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate379of1,572submissions,24%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader