Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information

被引:7
|
作者
Zimmermann, Verena [1 ]
Marky, Karola [1 ,2 ,3 ]
Renaud, Karen [4 ,5 ,6 ,7 ]
机构
[1] Tech Univ Darmstadt, Dept Psychol, Darmstadt, Germany
[2] Univ Glasgow, Sch Comp Sci, Glasgow, Lanark, Scotland
[3] Keio Univ, Grad Sch Media Design, Yokohama, Kanagawa, Japan
[4] Univ Strathclyde, Comp & Informat Sci, Glasgow, Lanark, Scotland
[5] Rhodes Univ, Informat Syst, Grahamstown, South Africa
[6] Univ South Africa, Sch Comp Sci, Pretoria, South Africa
[7] Abertay Univ, Sch Design & Informat, Dundee, Scotland
基金
日本科学技术振兴机构;
关键词
Authentication; password meter; nudge; password creation; user-centred design; FEAR APPEALS; SOCIAL NORMS; GUIDELINES; BEHAVIOR; USERS;
D O I
10.1080/0144929X.2022.2042384
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Supporting users with secure password creation is a well-explored yet unresolved research topic. A promising intervention is the password meter, i.e. providing feedback on the user's password strength as and when it is created. However, findings related to the password meter's effectiveness are varied. An extensive literature review revealed that, besides password feedback, effective password meters often include: (a) feedback nudges to encourage stronger passwords choices and (b) additional guidance. A between-subjects study was carried out with 645 participants to test nine variations of password meters with different types of feedback nudges exploiting various heuristics and norms. This study explored differences in resulting passwords: (1) actual strength, (2) memorability, and (3) user perceptions. The study revealed that password feedback, in combination with a feedback nudge and additional guidance, labelled a hybrid password meter, was generally more efficacious than either intervention on its own, on all three metrics. Yet, the type of feedback nudge targeting either the person, the password creation task, or the social context, did not seem to matter much. The meters were nearly equally efficacious. Future work should explore the long-term effects of hybrid password meters in real-life settings to confirm the external validity of these findings.
引用
收藏
页码:700 / 743
页数:44
相关论文
共 11 条
  • [1] LPSE: Lightweight password-strength estimation for password meters
    Guo, Yimin
    Zhang, Zhenfeng
    COMPUTERS & SECURITY, 2018, 73 : 507 - 518
  • [2] Password meters: inaccurate advice offered inconsistently?
    Furnell S.
    Computer Fraud and Security, 2019, 2019 (11) : 6 - 14
  • [3] What is in Your Password? Analyzing Memorable and Secure Passwords using a Tensor Decomposition
    Shin, Youjin
    Woo, Simon S.
    WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 3230 - 3236
  • [4] Passwords Decay, Words Endure: Secure and Re-usable Multiple Password Mnemonics
    Topkara, Umut
    Atallah, Mikhail J.
    Topkara, Mercan
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 292 - 299
  • [5] "Passwords protect my stuff"-a study of children's password practices
    Choong, Yee-Yin
    Theofanos, Mary F.
    Renaud, Karen
    Prior, Suzanne
    JOURNAL OF CYBERSECURITY, 2019, 5 (01):
  • [6] Secure Graphical One Time Password (GOTPass): An Empirical Study
    Alsaiari, H.
    Papadaki, M.
    Dowland, P.
    Furnell, S.
    INFORMATION SECURITY JOURNAL, 2015, 24 (4-6): : 207 - 220
  • [7] Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
    Ji, Shouling
    Yang, Shukun
    Hu, Xin
    Han, Weili
    Li, Zhigong
    Beyah, Raheem
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 550 - 564
  • [8] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784
  • [9] A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (01) : 68 - 81
  • [10] Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Odelu, Vanga
    Wazid, Mohammad
    Kumari, Saru
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 167 - 185