PassPoints : Design and Evaluation of a Graphical Password System

Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e., a password that is long and random. Therefore, they tend to create short and insecure passwords. Graphical passwords, which consist of clicking on pictures rather than typing alphanumeric strings, may help to overcome the problem of secure and memorable passwords. In this paper we describe PassPoints, a new and more secure graphical password system. We report an empirical study comparing the use of PassPoints to alphanumeric passwords. Participants created and practiced either an alphanumeric or graphical password. The participants subsequently carried out three longitudinal trials to input their password over the course of five weeks. The results show that the graphical password group created a valid password with fewer difficulties than the alphanumeric group. However, the graphical group took longer and made more errors in carrying out the practice. In the longitudinal trials the two groups performed similarly on memory of their password, but the graphical group took more time to input a password. INTRODUCTION Today's world of networked computing can be a frightening and dangerous place with attackers, hackers, crackers, scammers, and spammers at work. Computer security, which was relatively simple in pre-network days, is now a major and expensive problem for organizations and individuals. Constant attention to security is needed to protect against damage or theft of one's electronic assets. A home computer user installing high-speed internet service and a wireless network cannot even begin without a strong firewall, up-to-date virus protection, and 128-bit encryption. As Edward Tenner writes in his book Why Things Bite Back, "The price of protection is chronic vigilance" (1997, p. 243). The community of security researchers and practitioners has evolved rapidly in response to threats, on the one hand increasing vigilance in practice and, on the other hand, driving research innovation. Until recently the security problem has been formulated as a technical problem. However, it is now becoming widely recognized that security is also fundamentally a humancompuer interaction (HCI) problem (Patrick, Long & Flinn, 2003; Dourish, 2004). Most security mechanisms cannot be effective without taking into account the user. HCI matters in two ways: the usability of the security mechanisms themselves and the interaction of the security mechanisms with user practices and motivations. One of the key areas in security research and practice is authentication, the determination of whether a user should be allowed access to a given system or resource. Traditionally, alphanumeric passwords have been used for authentication. Today other methods, including biometrics and smart cards (Scholtz & Johnson, 2002; Coventry, De Angeli & Johnson, 2003), are possible alternatives. However, passwords are likely to remain dominant for some time because of drawbacks of reliability, security, or cost of other technologies (Brostoff & Sasse, 2000). In particular, smart cards also need PINs and passwords; biometrics, on the other hand, raise privacy concerns. Passwords also have drawbacks, most notably in terms of memorability and security. This has led to innovations to improve passwords. One such innovation is graphical passwords, that is, passwords that are based on pictures rather than alphanumeric strings. The underlying idea is that using pictures will lead to greater memorability and decrease the tendency to choose insecure passwords, which will in turn increase overall password

[1]  Andrew S. Patrick,et al.  HCI and security systems , 2003, CHI Extended Abstracts.

[2]  J. Rall Why Things Bite Back: Technology and the Revenge of Unintended Consequences. , 1997 .

[3]  J. Wixted,et al.  On the Form of Forgetting , 1991 .

[4]  Antonella De Angeli,et al.  VIP: a visual approach to user authentication , 2002, AVI '02.

[5]  Michael K. Reiter,et al.  On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.

[6]  Jeff A. Johnson,et al.  Interacting with identification technology: can it make us more secure? , 2002, CHI Extended Abstracts.

[7]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[8]  D. Rundus Analysis of rehearsal processes in free recall. , 1971 .

[9]  P. Fitts The information capacity of the human motor system in controlling the amplitude of movement. , 1954, Journal of experimental psychology.

[10]  G. Ritchey,et al.  Long-Term Memory for Pictures , 2005 .

[11]  David C. Feldmeier,et al.  UNIX Password Security - Ten Years Later , 1989, CRYPTO.

[12]  M. Bradley,et al.  Remembering pictures: pleasure and arousal in memory. , 1992, Journal of experimental psychology. Learning, memory, and cognition.

[13]  R. Shepard Recognition memory for words, sentences, and pictures , 1967 .

[14]  Daphna Weinshall,et al.  Passwords you'll never forget, but can't recall , 2004, CHI EA '04.

[15]  J. Henderson,et al.  Accurate visual memory for previously attended objects in natural scenes , 2002 .

[16]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[17]  F. Craik,et al.  Levels of Pro-cessing: A Framework for Memory Research , 1975 .

[18]  J. Wixted The psychology and neuroscience of forgetting. , 2004, Annual review of psychology.

[19]  Rachna Dhamija,et al.  Hash visualization in user authentication , 2000, CHI Extended Abstracts.

[20]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[21]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[22]  A. Paivio,et al.  Why are pictures easier to recall than words? , 1968 .

[23]  L. Standing Learning 10,000 pictures. , 1973, The Quarterly journal of experimental psychology.

[24]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[25]  Antonella De Angeli,et al.  Usability and biometric verification at the ATM interface , 2003, CHI '03.

[26]  Helmut Schneider,et al.  The domino effect of password reuse , 2004, CACM.

[27]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[28]  H. P. Bahrick Semantic memory content in permastore: fifty years of memory for Spanish learned in school. , 1984, Journal of experimental psychology. General.

[29]  Alan S. Brown,et al.  Generating and remembering passwords , 2004 .

[30]  I. Biederman,et al.  Searching for objects in real-world scences. , 1973, Journal of experimental psychology.

[31]  Nasir D. Memon,et al.  Robust discretization, with an application to graphical passwords , 2003, IACR Cryptol. ePrint Arch..