Human Selection of Mnemonic Phrase-Based Passwords
Date: July 2006 Publication: Proceedings of the 2nd Symposium On Usable Privacy and Security, SOUPS '06 Page(s): 67 - 78 Publisher: ACM Source 1: http://cups.cs.cmu.edu/soups/2006/proceedings/p67_kuo.pdf Source 2: http://repository.cmu.edu/cgi/viewcontent.cgi?article=1043&context=isr Source 3: http://dx.doi.org/10.1145/1143120.1143129 - Subscription or payment required Abstract or Summary:
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to strengthen passwords, some systems instruct users to create mnemonic phrase-based passwords. A mnemonic password is one where a user chooses a memorable phrase and uses a character (often the first letter) to represent each word in the phrase.In this paper, we hypothesize that users will select mnemonic phrases that are commonly available on the Internet, and that it is possible to build a dictionary to crack mnemonic phrase-based passwords. We conduct a survey to gather user-generated passwords. We show the majority of survey respondents based their mnemonic passwords on phrases that can be found on the Internet, and we generate a mnemonic password dictionary as a proof of concept. Our 400,000-entry dictionary cracked 4% of mnemonic passwords; in comparison, a standard dictionary with 1.2 million entries cracked 11% of control passwords. The user-generated mnemonic passwords were also slightly more resistant to brute force attacks than control passwords. These results suggest that mnemonic passwords may be appropriate for some uses today. However, mnemonic passwords could become more vulnerable in the future and should not be treated as a panacea. Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.
<-- Back to Authentication Research Paper Index |