skip to main content
10.1145/1233341.1233448acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Increasing security and usability of computer systems with graphical passwords

Published:23 March 2007Publication History

ABSTRACT

To gain access to computer systems, users are required to be authenticated. This is usually accomplished by having the user enter an alphanumeric username and password. Users are usually required to remember multiple passwords for different systems and this poses such problems as usability, memorabilty and secuurity. Passwords are usually difficult to remember and users have developed their own methods some of which are not secure of selecting passwords which are easy to remember.

In this research we developed a secure and usable password system which addresses the memorability problem. In our system users are required to remember three cartoon images which we demonstrate is easier to recall than a typical secure text password. This system is shown to be secure based on the probability of guessing a password and on the likelihood of an observer "shoulder surfing" the password and on the difficulty of launching a brute force attack against a graphical image system.

Our work demonstrates that security and usability can be achieved simultaneously. It lays the foundation for developing a class of similar password systems, differing only in the degree of security required. Our password system with its low memory requirements can be used in a wide array of applications.

References

  1. Birget, J., Hong, D., Memon, N., Man, S., Wiedenbeck, S. The graphical Passwords Project. Retrieved April 28, 2006, from http://clam.rutgers.edu/~birget/grPssw/Google ScholarGoogle Scholar
  2. Blonder, G. E. (1996) Graphical password. United States Patent 5559961.Google ScholarGoogle Scholar
  3. Brostoff, S., Sasse, A. Are Passfaces more usable than Passwords? A Field Trial Investigation.Google ScholarGoogle Scholar
  4. De Angeli, A., Coventry, L., Johnson, Graham., Renaud, K., (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies. Vol. 63. pp 128--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dhamija, R., Perring, A. (2000). Déjà vu: A User Study Using Images for Authentication. Proceedings of the 9 USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Preece, J., Rogers, Y., Sharp, H. Interaction Design. Beyond Human Computer Interaction. Wiley Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Real User, The Science Behind Passfaces. (2004). Real User Corporation.Google ScholarGoogle Scholar
  8. Tullis, T., Tedesco, D. (2005). Using Personal Photos as Pictoral Passwords. ACM Computer Human Interaction Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wiedenbeck, S., Birget, J., Brodskiy, A. (2005) Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. Symposium on Usable Privacy and Security (SOUPS) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Increasing security and usability of computer systems with graphical passwords

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM-SE 45: Proceedings of the 45th annual southeast regional conference
      March 2007
      574 pages
      ISBN:9781595936295
      DOI:10.1145/1233341

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 March 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate178of377submissions,47%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader