Abstract
There is a trade-off between password security and usability; longer password provides higher security but can reduce usability, as it is harder to remember. To address this challenge, this paper proposed a novel password scheme, called “Travel Password”, which is memorable and also secure. The proposed scheme is designed to aid human memory by using mnemonic device, e.g., pictures and symbols, and story telling. Mnemonic device aids memory because human can remember pictures better than text. Story telling, on the other hand, allows users to make connection between each part of the password. The experiment with eighty users shows that the proposed scheme allows users to have better password recall. Compared with traditional textual password which has about 0.8 recall rate for strong passwords, users with the proposed scheme can achieve 1.0 recall rate. Moreover, the proposed scheme is more memorable than the traditional textual one. 90% of users can promptly remember strong passwords in the proposed scheme, compared with 58% of the textual one.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Miller, G.A.: The magical number seven, plus or minus two: Some limits on our capacity for processing information. The Psychological Review 63, 81–97 (1956)
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.D.: Passpoints: Design and longitudinal evaluation of a graphical password system. International Journal of Man-Machine Studies 63(1-2), 102–127 (2005)
NSA (2009), http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
Orman, H., Hoffman, P.: Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC 3766 (Best Current Practice) (2004)
Gruneberg, M.M.: The role of memorization techniques in finals examination preparation–A study of psychology students. Educational Research 15(2), 134–139 (1973)
Shannon, C.E.: A mathematical theory of communication. Bell System Technical 27(3), 379–423 (1948)
McDonald, D.: A Convention for Human-Readable 128-bit Keys. RFC 1751 (Informational) (December 1994)
Blonder, G.E.: Graphical passwords. United State Patent 5559961 (1996)
Yampolskiy, R.: User authentication via behavior based passwords. In: IEEE Long Island Systems, Applications and Technology Conference (2007)
Gani, A.: A new algorithm on graphical user authentication (gua) based on multi-line grids. Scientific Research and Essays 5(4), 3865–3875 (2010)
Dhamija, R., Perrig, A.: Déjà vu: A user study using images for authentication. In: USENIX Security Symposium (2000)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: USENIX Security Symposium (1999)
Microsoft Corporation: Personalize Your PC (2013), http://windows.microsoft.com/en-us/windows-8/personalize-pc-tutorial/
Hafiz, M.D., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: Second Asia International Conference Modeling Simulation (2008)
Komanduri, S., Hutchings, D.R.: Order and entropy in picture passwords. In: Graphics Interface Conference. Oxford University Press (2008)
Robusto, C.C.: The cosine-haversine formula. The American Mathematical Monthly 64(1), 38–40 (1957)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Phetmak, N., Liwlompaisan, W., Boonma, P. (2014). Travel Password: A Secure and Memorable Password Scheme. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds) Intelligent Information and Database Systems. ACIIDS 2014. Lecture Notes in Computer Science(), vol 8397. Springer, Cham. https://doi.org/10.1007/978-3-319-05476-6_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-05476-6_41
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05475-9
Online ISBN: 978-3-319-05476-6
eBook Packages: Computer ScienceComputer Science (R0)