SEC 2006: Security and Privacy in Dynamic Environments pp 351-363 | Cite as
Click Passwords
Abstract
We present a set of algorithms and tools that enable entering passwords on devices with graphical input (touch-pad, stylus, mouse) by clicking on specific pixels of a custom image. As one of the most important features, when entering a password, the user is given limited tolerance for inaccuracy in the selection of pixels. The goal of the proposed click password system is to maximize the password space, while facilitating memorization of entered secrets. Besides enabling personalization of the login procedure through selection of the background image, the proposed system provides superior password space compared to traditional 8-character textual passwords.
Keywords
Tolerance Region Dictionary Attack Image Grid Voronoi Polygon Brute Force AttackReferences
- 1.A. Adams et al. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Comm. of the ACM, Vol.42, no. 12, pp.40–46, 1999.CrossRefGoogle Scholar
- 2.W. Belgers. Unix password security. http://www.ja.net/CERT/Belgers/UNIX-password-security.html.Google Scholar
- 3.G. Blonder. Graphical passwords. United States Patent no.5559961, 1996.Google Scholar
- 4.S. Brostoff et al. Are passfaces more usable than passwords? HCI, 2000.Google Scholar
- 5.CVonline: Geometric Feature Extraction Methods. http://homepages.inf.ed.ac.uk/rbf/CVonline/feature.htmGoogle Scholar
- 6.D.C. Feldmeier et al. UNIX Password Security-Ten Years Later. CRYPTO, pp.44–63, 1989.Google Scholar
- 7.M.R. Garey and D.S. Johnson. Computers and Intractability. Freeman, 1979.Google Scholar
- 8.I. Jermyn et al. The design and analysis of graphical passwords. USENIX Security Symposium, pp.1–14, 1999.Google Scholar
- 9.D.V. Klein. Foiling the Cracker: A survey of, and Improvements to Password Security. USENIX Security Workshop, pp.5–14, 1990.Google Scholar
- 10.Passfaces. http://www.realuser.comGoogle Scholar
- 11.Password Portal. http://www.passwordportal.net/.Google Scholar
- 12.E.E. Schultz. Advanced Windows NT security: network security. Computer Security J., Vol.15, no.3, pp. 13–22, 1999.Google Scholar
- 13.J. Yan et al. The Memorability and Security of Passwords — Some Empirical Results. Tech. Report No.500, Computer Lab., University of Cambridge, 2000.Google Scholar