skip to main content
10.1145/3267305.3274127acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Assistance in Daily Password Generation Tasks

Published: 08 October 2018 Publication History

Abstract

Passwords and PINs are used to protect all kinds of services against adversaries in our everyday lives. To serve their purpose, passwords require a certain degree of complexity which is often enforced through password policies. This results in complicated passwords, which might not only be hard for users to create, but also hard to remember. Furthermore, users might reuse passwords which they feel are secure. We present a scheme for deterministic password generation that solves these problems by assisting the user in generating and remembering passwords. The passwords are generated based on previously stored meta data (e.g., policies) and a master password. Since the password generation is deterministic, only the master password is required to recreate the passwords. As proof of concept we implemented a mobile app and pre-evaluated it. The pre-evaluation indicates that our scheme offers a good usability.

References

[1]
Nora Alkaldi and Karen Renaud. 2016. Why Do People Adopt, or Reject, Smartphone Password Managers?. In Proceedings of the 1st European Workshop on Usable Security (EuroUSEC). Internet Society, Reston, VA, USA, 1--14.
[2]
Aaron Bangor, Philip Kortum, and James Miller. 2009. Determining What Individual SUS Scores Mean: Adding an Adjective Rating Scale. Journal of Usability Studies 4, 3 (2009), 114--123.
[3]
John Brooke. 1996. SUS - A Quick and Dirty Usability Scale. Usability Evaluation in Industry 189, 194 (1996), 4--7.
[4]
Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and Xiao Feng Wang. 2014. The Tangled Web of Password Reuse. In Proceedings of Network and Distributed System Security Symposium (NDSS). Internet Society, Reston, VA, USA, 23--26.
[5]
Dinei Florencio and Cormac Herley. 2007. A Large-Scale Study of Web Password Habits. In Proceedings of the 16th international Conference on World Wide Web (WWW). ACM, New York, NY, USA, 657--666.
[6]
Cormac Herley. 2009. So Long, and No Thanks for the Externalities: the Rational Rejection of Security Advice by Users. In Proceedings of the New Security Paradigms Workshop (NSPW). ACM, New York, NY, USA, 133--144.
[7]
Moritz Horsch. 2018. Generating and Managing Secure Passwords for Online Accounts. Ph.D. Dissertation. Technische Universität Darmstadt.
[8]
Philip G. Inglesant and M. Angela Sasse. 2010. The True Cost of Unusable Password Policies: Password Use in the Wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, New York, NY, USA, 383--392.
[9]
Markus Jakobsson and Ruj Akavipat. 2012. Rethinking Passwords to Adapt to Constrained Keyboards. In Proceedings of the Workshop on Mobile Security Technologies (MoST). IEEE, Piscataway, NJ, USA, 1--11.
[10]
Burt Kaliski. 2000. RFC 2898: PKCS# 5: Password-Based Cryptography Specification Version 2.0. (2000).
[11]
Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Serge Egelman. 2011. Of Passwords and People: Measuring the Effect of Password-Composition Policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, New York, NY, USA, 2595--2604.
[12]
David Llewellyn-Jones and Graham Rymer. 2017. Cracking Pwdhash: A Bruteforce Attack on Client-Side Password Hashing. In Proceedings of the 11th International Conference on Passwords (Passwords). Springer-Verlag, Cham, Switzerland.
[13]
Karola Marky, Andreas Gutmann, Philipp Rack, and Melanie Volkamer. 2016. Privacy Friendly Apps - Making Developers Aware of Privacy Violations. In Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security (IMPS). CEUR Workshop Proceedings, 46--48.
[14]
Colin Percival. 2009. Stronger Key Derivation via Sequential Memory-Hard Functions. https://www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf. (2009). Self-published, Online; accessed: 12-June-2018}.
[15]
Niels Provos and David Mazieres. 1999. A Future-Adaptable Password Scheme. In Proceedings of the USENIX Annual Technical Conference (ATC). Usenix Association, Berkeley, CA, USA, 81--91.
[16]
Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, and John C Mitchell. 2005. Stronger Password Authentication Using Browser Extensions. In Proceedings of the USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 17--32.
[17]
Meltem Sönmez Turan, Elaine Barker, William Burr, and Lily Chen. 2010. Recommendation for Password-Based Key Derivation. NIST special publication 800 (2010), 132.

Cited By

View all

Index Terms

  1. Assistance in Daily Password Generation Tasks

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers
    October 2018
    1881 pages
    ISBN:9781450359665
    DOI:10.1145/3267305
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Password Assistance
    2. Password Generation
    3. Password Management

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    UbiComp '18
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 764 of 2,912 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 07 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media