skip to main content
10.1145/2810103.2813622acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Surpass: System-initiated User-replaceable Passwords

Published: 12 October 2015 Publication History

Abstract

System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult to remember. In this paper, we propose a system-initiated password scheme called "Surpass" that lets users replace few characters in a random password to make it more memorable. We conducted a large-scale online study to evaluate the usability and security of four Surpass policies, varying the number of character replacements allowed from 1 to 4 in randomly-generated 8-character passwords. The study results suggest that some Surpass policies (with 3 and 4 character replacements) outperform by 11% to 13% the original randomly-generated password policy in memorability, while showing a small increase in the percentage of cracked passwords. When compared to a user-generated password complexity policy (that mandates the use of numbers, symbols, and uppercase letters) the Surpass policy with 4-character replacements did not show statistically significant inferiority in memorability. Our qualitative lab study showed similar trends. This Surpass policy demonstrated significant superiority in security though, with 21% fewer cracked passwords than the user-generated password policy.

References

[1]
Amazon Mechanical Turk. https://www.mturk.com/mturk/welcome.
[2]
R. Atkinson and R. Shiffrin. Human memory: A proposed system and its control processes. volume 2 of Psychology of Learning and Motivation. Academic Press, 1968.
[3]
S. Bhuyan. Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Minimum Equal Security. PhD thesis, Clemson University, 2011.
[4]
M. Bishop. Password management. In Compcon Spring '91. Digest of Papers, pages 167--169, Feb 1991.
[5]
J. Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012.
[6]
J. Bonneau and S. Schechter. Towards Reliable Storage of 56-bit Secrets in Human Memory. In Proceedings of the 23rd USENIX Conference on Security Symposium, 2014.
[7]
M. Ciampa. A comparison of password feedback mechanisms and their impact on password entropy. Information Management & Computer Security, 21(5):344--359, 2013.
[8]
S. Fahl, M. Harbach, Y. Acar, and M. Smith. On the ecological validity of a password study. In Proceedings of the 9th Symposium on Usable Privacy and Security, 2013.
[9]
A. Forget, S. Chiasson, P. C. van Oorschot, and R. Biddle. Improving Text Passwords Through Persuasion. In Proceedings of the 4th Symposium on Usable Privacy and Security, 2008.
[10]
D. Goodin. Anatomy of a hack: How crackers ransack passwords like "qeadzcwrsfxv1331". http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/, May 2013.
[11]
hashcat. Rule-based Attack. http://hashcat.net/wiki/doku.php?id=rule_based_attack.
[12]
J. H. Huh, H. Kim, R. B. Bobba, M. N. Bashir, and K. Beznosov. On the Memorability of System-generated PINs: Can Chunking Help? In Proceedings of the 11th Symposium On Usable Privacy and Security, 2015.
[13]
M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. International Journal of Human-Computer Studies, 65:17--28, 2007.
[14]
Kelley, Patrick Gage and Komanduri, Saranga and Mazurek, Michelle L. and Shay, Richard and Vidas, Timothy and Bauer, Lujo and Christin, Nicolas and Cranor, Lorrie Faith and Lopez, Julio. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. In Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012.
[15]
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In Proceedings of the 29th SIGCHI Conference on Human Factors in Computing Systems, 2011.
[16]
R. Shay, P. G. Kelley, S. Komanduri, M. L. Mazurek, B. Ur, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. Correct Horse Battery Staple: Exploring the Usability of System-assigned Passphrases. In Proceedings of the 8th Symposium on Usable Privacy and Security, 2012.
[17]
R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L. Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F. Cranor. Can Long Passwords Be Secure and Usable? In Proceedings of the 33rd SIGCHI Conference on Human Factors in Computing Systems, 2014.
[18]
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. Encountering stronger password requirements: user attitudes and behaviors. In Proceedings of the 6th Symposium on Usable Privacy and Security, 2010.
[19]
B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In Proceedings of the 21st USENIX Conference on Security Symposium, 2012.
[20]
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: empirical results. IEEE Security and Privacy, 2(5):25--31, 2004.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
October 2015
1750 pages
ISBN:9781450338325
DOI:10.1145/2810103
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. passwords
  2. policy
  3. security
  4. usability

Qualifiers

  • Research-article

Conference

CCS'15
Sponsor:

Acceptance Rates

CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media