Living in the intersection of cryptography and psychology, password psychology is the study of what makes passwords or cryptographic keys easy to remember or guess.
In order for a password to work successfully and provide security to its user, it must be kept secret and un-guessable; this also requires the user to memorize their password. The psychology behind choosing a password is a unique balance between memorization, security and convenience. Password security involves many psychological and social issues including; whether or not to share a password, the feeling of security, and the eventual choice of whether or not to change a password. Passwords may also be reflective of personality. Those who are more uptight or security-oriented may choose longer or more complicated passwords. Those who are lax or who feel more secure in their everyday lives may never change their password.[1] The most common password is Password1, which may point to convenience over security as the main concern for internet users.[2][3]
History
editThe use and memorization of both nonsense and meaningful alphanumeric material has had a long history in psychology beginning with Hermann Ebbinghaus. Since then, numerous studies have established that not only are both meaningful and nonsense "words" easily forgotten, but that both their forgetting curves are exponential with time.[4] Chomsky advocates meaning as arising from semantic features, leading to the idea of "concept formation" in the 1930s.[4]
Current research
editResearch is being done to find new ways of enhancing and creating new techniques for cognitive ability and memorization when it comes to password selection.[5] A study from 2004 indicates that the typical college student creates about 4 different passwords for use with about 8 different items, such as computers, cell phones, and email accounts, and the typical password is used for about two items.[6] Information about the type of passwords points to an approximate even split between linguistic and numeric passwords with about a quarter using a mix of linguistic/numeric information. Names (proper, nicknames) are the most common information used for passwords, and dates are the second most common type of information used in passwords.[6] Research is also being done regarding the effect of policies that force users to create more secure and effective passwords.[7] The results of this study show that a password composition policy reduces the similarity of passwords to dictionary words. However, such a policy did not reduce the use of meaningful information in passwords such as names and birth dates, nor did it reduce password recycling.[7]
Memorization problems
editPassword psychology is directly linked to memorization and the use of mnemonics. Mnemonic devices are often used as passwords but many choose to use simpler passwords. It has been shown that mnemonic devices and simple passwords are equally easy to remember and that the choice of convenience plays a key role in password creation.[8]
Password alternatives
editIn order to address the issues presented by memorization and security, many businesses and internet sites have turned to accepting different authentication protocols. This authentication could be a biometric, a 2D key, a multi-factor authentication, a passwordless authentication, or cognitive passwords that are question based. Many of these options are more expensive, time-consuming, or still require some form of memorization. Thus, most businesses and individuals still use the common format of single word and text-based passwords as security protection.
The most common alternative to tradition passwords and PIN codes has been biometric authentication.[9] Biometric authentication is a method where systems use physical and/or behavioral traits unique to a specific individual to authorize access.[9] Some of the most popular forms of biometric passwords are as follows: fingerprint, palm prints, iris, retina, voice, and facial structure.[10] The appeal of biometrics as a form of passwords is that they increase security.[11] Only one person has access to a set of fingerprints or retinal patterns, which means the likelihood of hacking decreases significantly. Biometric authentication has 4 important factors, or modules, that keep systems and accounts from being compromised: sensor module, feature extraction module, template database, and matching module.[9] These 4 sections of biometric authentication, while more involved, create a layer of protection that a tradition password option cannot. The sensor module is responsible for getting a hold of a user’s method of protection whether it be fingerprint scan, facial scan, or voice.[11][9] The second module, feature extraction, is where all the raw data acquired from the previous module is broken down into the key components. The template, or database module, takes the key components gathered previously and saves them virtually. Lastly, the matching module is employed in order to verify if the inputted biometric method is legitimate.[11][9][10] The modules that record, process, and verify biometrics, need to be run in 2 different stages: enrollment and recognition. These stages contain more substages. In the enrollment stage, the four modules work at once as a digital version of the biometric data is generated and stored.[11] The recognition stage has two subsections called verification and identification.[11] During verification process, the system must ensure that the individual trying to gain access is who they are stating they are. The identification process fully identifies the individual.
Though biometric authentication is seen increasingly more often, it is not without its issues. A biometric system is affected by similar issues that a tradition password system has. When a user inputs their biometric information, one of four things can happen. A user may be truly be who they say they are and are granted access to the system. Conversely, a user may be impersonating someone and will be rejected access. The two other scenarios are when an authentic user is rejected access and an impersonator is granted access.[11] This type of fraud can occur as there are certain individuals that may share virtually identical voices.[11] In other instances, the initial attempt to record the biometric data may have been compromised. During the 4 modules, a user may have inputted corrupted data. An example of this is most commonly seen in fingerprints, where an individual may use a wet finger or a scarred finger to record their data.[11] These errors introduce insecurity.[9] These issues can occur for facial recognition. If a pair of twins or even two people who look similar try to access a system, they may be granted access.
See also
editReferences
edit- ^ Info Security; The contradictions of password psychology 22 February 2012 Copy Right Reed Exhibitions http://www.infosecurity-magazine.com/view/24057/the-contradictions-of-password-psychology/
- ^ Cowley, Stacy. "If You're Using 'Password', Change It. Now." CNNMoney. Cable News Network, 01 Mar. 2012. Web. 23 Mar. 2012. http://money.cnn.com/2012/03/01/technology/password_security/index.htm
- ^ "Have I Been Pwned: Pwned Passwords".
- ^ a b OSTOJIC, P. P., & PHILLIPS, J. G. (2009). MEMORABILITY OF ALTERNATIVE PASSWORD SYSTEMS. International Journal of Pattern Recognition & Artificial Intelligence, 23(5), 987–1004
- ^ Nelson, D., vu K. L. (2010). Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords. Computers In Human Behavior, 26(4), 705–715. Doi:10.1016/chb2010.01.007
- ^ a b Brown, Alan S.; al, et. (2004), "Generating and Remembering Passwords", Applied Cognitive Psychology 18 (6): 641–651
- ^ a b Campbell J, Ma W, Kleeman D. Impact of restrictive composition policy on user password choices. Behaviour & Information Technology [serial online]. May 2011;30(3):379-388.
- ^ Yan, Jeff, Alan Blackwell, Ross Anderson, and Alasdair Grant. IEEE SECURITY & PRIVACY. THE IEEE COMPUTER SOCIETY, Sept. 2004. Web. "Archived copy" (PDF). Archived from the original (PDF) on 2012-04-14. Retrieved 2016-02-05.
{{cite web}}
: CS1 maint: archived copy as title (link) - ^ a b c d e f Yang, Wencheng; Wang, Song; Hu, Jiankun; Zheng, Guanglou; Valli, Craig (2019-01-28). "Security and Accuracy of Fingerprint-Based Biometrics: A Review". Symmetry. 11 (2): 141. Bibcode:2019Symm...11..141Y. doi:10.3390/sym11020141. ISSN 2073-8994.
- ^ a b Riaz, Naveed; Riaz, Ayesha; Khan, Sajid Ali (2018-01-15). "Biometric template security: an overview". Sensor Review. 38 (1): 120–127. doi:10.1108/SR-07-2017-0131. ISSN 0260-2288.
- ^ a b c d e f g h "What Is A Biometric System, and How To Secure It". Veridium. 2018-07-19. Retrieved 2021-04-16.