A Large-scale Analysis of the Mnemonic Password Advice

被引:10
作者
Kiesel, Johannes [1 ]
Stein, Benno [1 ]
Lucks, Stefan [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
来源
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) | 2017年
关键词
SECURITY;
D O I
10.14722/ndss.2017.23077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How to choose a strong but still easily memorable password? An often recommended advice is to memorize a random sentence (the mnemonic) and to concatenate the words' initials: a so-called mnemonic password. The paper in hand analyzes the effectiveness of this advice-in terms of the obtained password strength-and sheds light on various related aspects. While it is infeasible to obtain a sufficiently large sample of human-chosen mnemonics, the password strength depends only on the distribution of certain character probabilities. We provide several pieces of evidence that these character probabilities are approximately the same for human-chosen mnemonics and sentences from a web crawl and exploit this connection for our analyses. The presented analyses are independent of cracking software, avoid privacy concerns, and allow full control over the details of how passwords are generated from sentences. In particular, the paper introduces the following original research contributions: (1) construction of one of the largest corpora of human-chosen mnemonics, (2) construction of two web sentence corpora from the 273 TB ClueWeb12 web crawl, (3) demonstration of the suitability of web sentences as substitutes for mnemonics in password strength analyses, (4) improved estimation of password probabilities by position-dependent language models, and (5) analysis of the obtained password strength using web sentence samples of different sentence complexity and using 18 generation rules for mnemonic password construction. Our findings include both expected and less expected results, among others: mnemonic passwords from lowercase letters only provide comparable strength to mnemonic passwords that exploit the 7-bit visible ASCII character set, less complex mnemonics reduce password strength in offline scenarios by less than expected, and longer mnemonic passwords provide more security in an offline but not necessarily in an online scenario. When compared to passwords generated by uniform sampling from a dictionary, distributions of mnemonic passwords can reach the same strength against offline attacks with less characters.
引用
收藏
页数:13
相关论文
共 42 条
  • [1] [Anonymous], 2010, WSDM 2010 P 3 ACM IN, DOI DOI 10.1145/1718487.1718542
  • [2] [Anonymous], 2011, J GLOBAL RES COMPUTE
  • [3] [Anonymous], 2013, P 2013 ACM SIGSAC C, DOI [DOI 10.1145/2508859.2516726, 10.1145/2508859.2516726]
  • [4] [Anonymous], 2010, 2010 Proceedings IEEE INFOCOM
  • [5] Atallah M., 2000, New Security Paradigms Workshop, P51, DOI DOI 10.1145/366173.366190
  • [6] Bishop Christopher M., 2006, Pattern Recognition and Machine Learning, V4
  • [7] Bonneau J., 2015, COMMUN ACM
  • [8] The science of guessing: analyzing an anonymized corpus of 70 million passwords
    Bonneau, Joseph
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 538 - 552
  • [9] Boztas S., 1999, Entropies, guessing, and cryptography
  • [10] Burr W.E., 2013, Nist special publication 800-63-2. electronic authentication guideline