A comparison of password feedback mechanisms and their impact on password entropy
Abstract
Purpose
– Text-based passwords created by users are typically weak. A common mitigation is to provide meaningful feedback to users regarding the relative strength of their newly created password. However, the effects of these feedback mechanisms on users to create stronger passwords have not been well studied. This study examined four different types of password feedback mechanisms to determine which, if any, are the most effective. The paper aims to discuss these issues.
Design/methodology/approach
– Undergraduate student volunteers created four different passwords and then entered the passwords into four different online password feedback mechanisms. Participants were then asked whether the feedback persuaded them to change their original password.
Findings
– In all cases, the feedback mechanisms significantly influenced users with lower password entropy to choose a more secure password. The password feedback mechanism that was most effective was the feedback of the estimated amount of time to break the password.
Research limitations/implications
– Undergraduate students in an academic environment were the participants, which may limit external validity.
Practical implications
– The implications are for designers of web sites and other applications that require users to create a text-based password: any feedback mechanism can influence users to create passwords with higher entropy, yet those that indicate the length of time it would take to crack the password are most effective.
Originality/value
– There are a wide variety of password feedback mechanisms in use. However, their effects on influencing users to create stronger passwords have not been well studied.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference28 articles.
1. Brostoff, S.
and
Sasse, A.
(2000), “Are passfaces more usable than passwords? A field trial investigation”, Proceedings of Human-Computer Interaction Resource Network 2000, HCI, San Diego, CA, pp. 1-20. 2. Brown, A.
,
Bracken, E.
,
Zolccoli, S.
and
Douglas, K.
(2004), “Generating and remembering passwords”, Applied Cognitive Psychology, Vol. 18 No. 6, pp. 641-651. 3. Bunnel, J.
,
Podd, J.
,
Henderson, R.
,
Napier, R.
and
Kennedy-Moffat, J.
(1997), “Cognitive, associative and conventional passwords: recall and guessing rates”, Computers and Security, Vol. 16 No. 7, pp. 641-657. 4. Burnett, M.
and
Kleinman, D.
(2006), Perfect Passwords: Selection, Protection, Authentication, Syngress, Burlington, MA. 5. Burr, W.
,
Dodson, D.
,
Newton, E.
,
Perlner, R.
,
Polk, W.
,
Gupta, S.
and
Nabbus, E.
(2011), Computer Security Division: Computer Security Resource Center, National Institute of Standards and Technology, available at: http://csrc.nist.gov/publications/nistpubs/800-63-1/SP-800-63-1.pdf (accessed December 29, 2012).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|