Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication

被引:0
作者
Rass, Stefan [1 ]
Schuller, David [2 ]
Kollmitzer, Christian [2 ]
机构
[1] Univ Klagenfurt, Inst Appl Informat, Syst Secur Grp, Univ Str 65-67, A-9020 Klagenfurt, Austria
[2] Austrian Inst Technol GmbH, Quantum Technol, Dept Safety & Security, A-9020 Klagenfurt, Austria
来源
COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS | 2010年 / 6109卷
关键词
Graphical Passwords; Face-Recognition; Authentication; Shannon-Entropy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present an information-theoretic discussion of authentication via graphical passwords, and devise a model for entropy estimation. Our results make face-recognition based authentication comparable to standard password authentication in terms of uncertainty (Shannon-entropy) that an adversary is confronted with in both situations. It is widely known that cognitive abilities strongly determine the choice of alphanumeric passwords as well as graphical passwords, and we discuss various selected psychological aspects that influence the selection process. As a central result, we obtain a theoretical limit to the entropy of a face-recognition based authentication in the light of some social engineering techniques (dictionary attacks on graphical passwords). Remarkably, our results hold independently of any information that can be obtained from the internet or through other forms of social engineering. Thus, we obtain very general bounds on the quality of authentication through face-recognition that solely depend on the authentication mechanism.
引用
收藏
页码:166 / +
页数:3
相关论文
共 22 条
  • [1] AN K, 2004, P 9 INT S ART LIF RO, P37
  • [2] [Anonymous], 2005, 21 ANN COMP SEC APPL
  • [3] ARNAUD E, 2005, IEEE INT C IM PROC G
  • [4] BREUER H, 2010, SUDDEUTSCHE ZEITUNG, P16
  • [5] BROSTOFF A, 2004, THESIS U LONDON
  • [6] Brostoff S., 2000, P HCI
  • [7] Chen Chi-Hau., 2005, Handbook of Pattern Recognition and Computer Vision, Vthird
  • [8] Dhamija R, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P45
  • [9] Duc NM., 2009, Your Face is not your password: Face Authentication ByPassing. Lenovo-ASUS-Toshiba
  • [10] ELJETLAWI AM, 2008, INT C CONV INF TECHN, V2, P1137