Reference Hub2
A Novel Cue based Picture Word Shape Character Password Creation Scheme

A Novel Cue based Picture Word Shape Character Password Creation Scheme

Kevin Curran, Andrew Snodgrass
Copyright: © 2015 |Volume: 7 |Issue: 3 |Pages: 23
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466676954|DOI: 10.4018/IJDCF.2015070103
Cite Article Cite Article

MLA

Curran, Kevin, and Andrew Snodgrass. "A Novel Cue based Picture Word Shape Character Password Creation Scheme." IJDCF vol.7, no.3 2015: pp.37-59. http://doi.org/10.4018/IJDCF.2015070103

APA

Curran, K. & Snodgrass, A. (2015). A Novel Cue based Picture Word Shape Character Password Creation Scheme. International Journal of Digital Crime and Forensics (IJDCF), 7(3), 37-59. http://doi.org/10.4018/IJDCF.2015070103

Chicago

Curran, Kevin, and Andrew Snodgrass. "A Novel Cue based Picture Word Shape Character Password Creation Scheme," International Journal of Digital Crime and Forensics (IJDCF) 7, no.3: 37-59. http://doi.org/10.4018/IJDCF.2015070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The number of internet users is growing at a rapid rate and this means users now have to remember passwords for many different accounts. The side effects of this increase of user accounts is that users are putting password usability before password security in order to remember these passwords. This paper outlines a novel password creation scheme for creating strong, secure unique passwords that are easier for users to remember on multiple sites. The scheme includes features to more easily create a secure password and recall this password, whilst including multiple layers of security against a targeted attack by an adversary. Results showed that users who did not use a scheme had a much lower login success rate for their accounts than the users who used the created scheme. They also showed that the average password length for each group of users was the same meaning the created scheme passwords in this sample has no greater protection against brute-force attacks, but in terms of dictionary and hybrid attacks the scheme passwords generally seemed to have a lot more protection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.