Skip to main content

Multi-cultural Empirical Study of Password Strength Versus Ergonomic Utility

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Abstract

This paper presents the findings of a principled, empirical study of password security. Security policies direct users to select long passwords having arcane collections of case, numerals, and special characters, and no whole words. Then users are told to change passwords often, never to reuse them, and not to record them: Requirement 1: Passwords must be impossible to remember. Requirement 2: Memorize all passwords. When faced with an inconvenient request for a new password, many people reflexively reuse existing passwords, or concoct minimally adequate, easily memorable passwords on-the-fly. In this study, volunteers access the project website to complete a demographic survey, and are asked to create passwords at various points. Later in the encounter, they are asked to reiterate these passwords. Password strength (as determined by an open-source application described in the paper) is correlated with password memorability (ergonomic utility) within the context of the collected demographic factors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Helkala, K., Bakås, T.H.: National password security survey: results. In: Proceedings of the European Information Security Multi-Conference (EISMC 2013), pp. 23–33 (2013)

    Google Scholar 

  2. CS Identity.: CONSUMER SURVEY: PASSWORD HABITS A study of password habits among American consumers. Retrieved from CSID.com. https://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf (2012)

  3. Yan, J., Blackwell, A., Anderson, R., Gran, A.: The memorability and security of passwords—some empirical results. Retrieved from University of Cambridge Computer Laboratory Technical Reports. https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-500.pdf (2000)

  4. Furnell, S., Papadopoulos, I., Dowland, P.: A long‐term trial of alternative user authentication technologies. Inf. Manag. Comput. Secur. 12(2), 178–190. Retrieved from http://doi.org/10.1108/09685220410530816 (2004)

    Google Scholar 

  5. Hunt, T.: A brief Sony password analysis. Retrieved from Troy Hunt; Observations, musings and conjecture about the world of software and technology. http://www.troyhunt.com/2011/06/brief-sony-password-analysis.html (2011)

  6. SplashData.: Worst passwords. Retrieved from SplashData. http://splashdata.com/splashid/worst-passwords/ (2015)

  7. Pilar, D., Jaeger, A., Gomes, C., Stein, L.: Passwords usage and human memory limitations: a survey across age and educational background. PLoS ONE 7(12), 1–7. Retrieved from http://doi.org/10.1371/journal.pone.0051067 (2012)

    Google Scholar 

  8. Stantona, J.M., Stama, K.R., Mastrangelo, P., Joiton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133. Retrieved from http://doi.org/10.1016/j.cose.2004.07.001 (2005)

    Google Scholar 

  9. Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Baur, L., Christin, N., Egelman, S.: Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595–2604. ACM. Retrieved from http://dl.acm.org/citation.cfm?id=1979321 (2011)

  10. Lazar, L., Tikolsky, O., Zviran, C.G.: Personalized cognitive passwords: an exploratory assessment. Inf. Manag. Comput. Secur. 19(1), 25–41. Retrieved from http://dx.doi.org/10.1108/09685221111115845 (2011)

    Google Scholar 

  11. Adams, A., Sasse, M.A.: Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures. Commun. ACM 42(12), 40–46. Retrieved from http://simson.net/ref/1999/UsersAreNotTheEnemy.pdf (1999)

    Google Scholar 

  12. Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human Factors and Information Security: Individual, Culture and Security Environment. Command, Control, Communications and Intelligence Division DSTO Defence Science and Technology Organisation, Edinburgh South Australia. Retrieved from http://www.dtic.mil/get-tr-doc/pdf?AD=ADA535944 (2010)

  13. Kuo, C., Romanosky, S., Cranor, L.F.: Human selection of mnemonic phrase-based passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 67–78. ACM, Pittsburgh. doi:10.1145/1143120.1143129 (2006)

  14. Zviran, M., Haga, W.J.: Cognitive passwords: the key to easy access control. Comput. Secur. 9(8), 723–736 (1990). doi:10.1016/0167-4048(90)90115-A

    Article  Google Scholar 

  15. SC Magazine.: Passwords: The Omnipresent Risk. Retrieved from Secureauth.com. https://www.secureauth.com/SecureAuth/media/Resources/AnalystReports/SecureAuth_MarketFocus-Report_6-19-15.pdf?ext=.pdf (2015)

Download references

Acknowledgments

The Sirius 16A Team acknowledges the support of Webster University, Space Coast Region; and its Melbourne, Florida Campus Director, Dr. Robert Cox.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Monte Hancock .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Hancock, M. et al. (2016). Multi-cultural Empirical Study of Password Strength Versus Ergonomic Utility. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics