skip to main content
10.1145/1355284.1355288acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Towards a framework for security analysis of multiple password schemes

Published:31 March 2008Publication History

ABSTRACT

In this paper, we provide a security analysis for generic authentication systems in which users have multiple passwords (or personal questions) and the system asks some of them to grant access. We analyze two schemes. In the first one, only one password is asked out of the password set of the user in order to access the system. In the second scheme, two passwords are asked to gain access to the system. We assume existence of an attacker who is capable to eavesdrop on the authentication channel and crack passwords with a certain probability. We derive analytical formulations for impersonation probabilities and compare the security provided by both schemes. The results of our analysis imply that asking more passwords for authentication does not necessarily mean a strengthened security; in fact it may carry a higher risk of impersonation as compared to asking less passwords when the passwords are aged.

References

  1. Adams, A. and Sasse M. A. 1999. Users are not the Enemy. In Communications of the ACM. vol. 42, no. 12, December 1999, pp. 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. FFIEC, Federal Financial Institutions Examination Council, 2005. Authentication in an Internet Banking Environment. retrieved from http://www.ffiec.gov/pdf/authentication_guidance.pdf on 9.11.2007Google ScholarGoogle Scholar
  3. Gorman, L. O, Bagga A., Bentley J. 2004. Call center customer verification by query-directed passwords. In Financial Cryptography, A. Juels (ed.), Lecture Notes in Computer Science, LNCS 3110, Springer-Verlag, Berlin, 2004, pp. 54--67.Google ScholarGoogle Scholar
  4. Gorman, L. O., 2003. Comparing Passwords, Tokens, and Biometrics for User Authentication. In Proceedings of the IEEE. vol. 91, no. 12, Dec. 2003, pp. 2019--2040.Google ScholarGoogle Scholar
  5. Hiltgen, A., Kramp T. and Weigold T. 2006. Secure Internet Banking Authentication. In IEEE Security & Privacy. vol.4, no. 2, March-April 2006, pp. 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Rassmussen, J. L. 2006. Password Authentication. In The Handbook of Information Security. H. Bidgoli (ed.), pp. 424--438. Wiley, 2006.Google ScholarGoogle Scholar
  7. Site Key at Bank of America. 2007. Retrieved from http://www.bankofamerica.com/privacy/sitekey/ on 21.11.2007Google ScholarGoogle Scholar
  8. Strong Authentication in Banking and Beyond 2007. Retrieved form http://www.zurich.ibm.com/pdf/csc/SecureInternetBankingAuthentication.pdf on 5.11.2207Google ScholarGoogle Scholar

Index Terms

  1. Towards a framework for security analysis of multiple password schemes

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                EUROSEC '08: Proceedings of the 1st European Workshop on System Security
                March 2008
                50 pages
                ISBN:9781605581194
                DOI:10.1145/1355284

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 31 March 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate47of113submissions,42%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader