Skip to main content

Travel Password: A Secure and Memorable Password Scheme

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8397))

Included in the following conference series:

Abstract

There is a trade-off between password security and usability; longer password provides higher security but can reduce usability, as it is harder to remember. To address this challenge, this paper proposed a novel password scheme, called “Travel Password”, which is memorable and also secure. The proposed scheme is designed to aid human memory by using mnemonic device, e.g., pictures and symbols, and story telling. Mnemonic device aids memory because human can remember pictures better than text. Story telling, on the other hand, allows users to make connection between each part of the password. The experiment with eighty users shows that the proposed scheme allows users to have better password recall. Compared with traditional textual password which has about 0.8 recall rate for strong passwords, users with the proposed scheme can achieve 1.0 recall rate. Moreover, the proposed scheme is more memorable than the traditional textual one. 90% of users can promptly remember strong passwords in the proposed scheme, compared with 58% of the textual one.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Miller, G.A.: The magical number seven, plus or minus two: Some limits on our capacity for processing information. The Psychological Review 63, 81–97 (1956)

    Article  Google Scholar 

  2. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.D.: Passpoints: Design and longitudinal evaluation of a graphical password system. International Journal of Man-Machine Studies 63(1-2), 102–127 (2005)

    Google Scholar 

  3. NSA (2009), http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml

  4. Orman, H., Hoffman, P.: Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC 3766 (Best Current Practice) (2004)

    Google Scholar 

  5. Gruneberg, M.M.: The role of memorization techniques in finals examination preparation–A study of psychology students. Educational Research 15(2), 134–139 (1973)

    Article  Google Scholar 

  6. Shannon, C.E.: A mathematical theory of communication. Bell System Technical 27(3), 379–423 (1948)

    Article  MATH  MathSciNet  Google Scholar 

  7. McDonald, D.: A Convention for Human-Readable 128-bit Keys. RFC 1751 (Informational) (December 1994)

    Google Scholar 

  8. Blonder, G.E.: Graphical passwords. United State Patent 5559961 (1996)

    Google Scholar 

  9. Yampolskiy, R.: User authentication via behavior based passwords. In: IEEE Long Island Systems, Applications and Technology Conference (2007)

    Google Scholar 

  10. Gani, A.: A new algorithm on graphical user authentication (gua) based on multi-line grids. Scientific Research and Essays 5(4), 3865–3875 (2010)

    Google Scholar 

  11. Dhamija, R., Perrig, A.: Déjà vu: A user study using images for authentication. In: USENIX Security Symposium (2000)

    Google Scholar 

  12. Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: USENIX Security Symposium (1999)

    Google Scholar 

  13. Microsoft Corporation: Personalize Your PC (2013), http://windows.microsoft.com/en-us/windows-8/personalize-pc-tutorial/

  14. Hafiz, M.D., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: Second Asia International Conference Modeling Simulation (2008)

    Google Scholar 

  15. Komanduri, S., Hutchings, D.R.: Order and entropy in picture passwords. In: Graphics Interface Conference. Oxford University Press (2008)

    Google Scholar 

  16. Robusto, C.C.: The cosine-haversine formula. The American Mathematical Monthly 64(1), 38–40 (1957)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Phetmak, N., Liwlompaisan, W., Boonma, P. (2014). Travel Password: A Secure and Memorable Password Scheme. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds) Intelligent Information and Database Systems. ACIIDS 2014. Lecture Notes in Computer Science(), vol 8397. Springer, Cham. https://doi.org/10.1007/978-3-319-05476-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05476-6_41

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05475-9

  • Online ISBN: 978-3-319-05476-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics