The Potential of Narrative Passwords for Cognitive Authentication Systems 2094 Ste En Werner & Connor Hoover, University of Idaho
Total Page:16
File Type:pdf, Size:1020Kb
The Potential of Narrative Passwords for Cognitive Authentication Systems 2094 Steen Werner & Connor Hoover, University of Idaho Motivation Study 1 Study 2 A. E. K. N. Q. U. Aigikampoi Eagle Spirit Kamaitachi Naga reballs Qilin Ubume Naiad Al Rakim Ekek Kami Qiqirn Umibōzu Alan Eleionomae Namahage V. Kanbari-nyūdō Quinotaur Alan Domovoi Kanbari-nyūdō Penghou Alien Emim Nang Takian Valravn Kanedama R. Ammit Enchanted Moor Narasimha Vardøger Kelpie Nav' Alien Duwende Kanedama Peryton The need for secure and usable cognitive password systems has long been recognized. In- Ani Hyuntikwalaski Eneld Raijū Věri Şělen Kobold Neck Procedure Argus Panoptes Erchitu Rainbow crow Vrykolakas Procedure Koro-pok-guru Nekomata Argus Panoptes Eagle Spirit Koro-pok-guru Pesanta Arikura-no-baba F. Raven Mocker W. Azukitogi Kraken Nekomusume Wanyūdō Familiar Nian Raven Spirit B. Kubikajiri Witte Wieven Ba Jiao Gui Ekek Kushtaka Pixie Feathered Serpent Nightmarchers Redcap Ba Jiao Gui Kuda-gitsune Wulver Fenghuang Nikusui Bahamut Reichsadler X. Finfolk Kudan Nimerigar Barghest Eneld Kwakwakalanooksiwae Quinotaur Bake-kujira Rompo Xing Tian Fish-man Kui Nocnitsa 861±2 word short story with 11 randomizable elements Bakeneko S. Xiuhcoatl 861±2 word short story with 11 randomizable elements Forest Bull Kurabokko Nu Gui Beast Fenghuang Laelaps Samebito Bar Juchne Y. spired by our studies on recognition-based graphical passwords, this study focuses on “narra- Furu-utsubo Kushtaka Nuno Sakabashira Barghest Yadōkai G. Kwakwakalanooksiwae Nure-onna Samebito Barong Yagyō-san Bishop-sh Forest Bull Laukų dvasios Sceadugenga Galtzagorriak Kyūbi-no-kitsune Nyami Nyami Sceadugenga Beast O. Yali Gandharva L. Bhūta Odmience Scylla Yama-uba Brag Ghost Lavellan Shachihoko Ghost Bishop-sh Laelaps Oiwa Shachihoko Yomotsu-shikome Gigelorum 20 participants, average 3:52 min reading time Boggart Lampades Okuri-inu Shade Yosuzume 34 participants, average 4:04 min reading time Buggane Gigelorum Lightning Bird Si-Te-Cah Glaistig Bogle Landvættir Ōmukade Shahbaz You Hun Ye Gui Boo Hag Golem Laukų dvasios Oni Yowie Căpcăun Glaistig Alien Mbwiri EneldSky Women Mbwiri Goryō Shedu Brag Lavellan Onoskelis Yuxa tive passwords”. Users are presented with a short story (< 1,000 words) that contains inter- Bugbear Guhin Ophiotaurus Shishi Z. Leprechaun Chichevache H. Orang Bunian Shōjō Hokhokw Mormolykeia Sleipnir Buggane Leucrota Zduhać Argus Panoptes Forest Bull Mormolykeia C. Hadhayosh Ork Simurgh Zhulong Leviathan Cretan Bull Hōkō Naga reballs Trenti Canotila Hag Orthrus Si-Te-Cah Libyan Satyr P. Căpcăun Haltija Skookum Ba Jiao Gui Ghost Nikusui Centaur Hellhound Lidérc Paasselkä devils Daitengu Indrik Nang Takian Tsurube-otoshi Lightning Bird Panes Sky Women 64 Cercopes Hiderigami Panis Independent Variables Changeling Hihi Ljósálfar Sleipnir Independent Variables Daitya Jack-In-Irons Narasimha Wanyūdō Parandrus Beast Gigelorum Penghou Cherufe Lou Carcolh Sodehiki-kozō Hippocamp Pegaeae changeable story elements (e.g., protagonist’s name, story location, objects) randomly select- Chibaiskweda Hitodama Lubber end Sōgenbi Demon Jatayu Nekomata Yomotsu-shikome Pegasus Chichevache Hobgoblin Luison Pelesit Spearnger Brag Indrik Pesanta Chrysomallus Hokhokw M. Peluda Sphinx Dipsa Kanbari-nyūdō Nikusui Zduhać Cretan Bull Hōkō Mami Wata Penghou T. Crocotta Houri MannegishiAlan Peryton Domovoi Kanbari-nyūdō Penghou Daitengu Jack-In-Irons Pixie Within: Retention Interval (RI: 10 min, >1 week) D. Taurokampoi Within: Retention Interval (RI: 10 min, >1 week) Huma Mareikura Pesanta Daitengu Peuchen Te-no-me Hydra Marid Daitya256I. Alien Phoenix DuwendeThe Cu Bird Kanedama Peryton Demon Jatayu Sky Women Martino Datsue-ba Ibong Adarna Piatek Three-legged bird Alien Ghost Mbwiri ed from separate pools of possible items. These elements form the narrative password, while Deity Ifrit Pillan Toyol Demigod Mermaid Pim-skwa-wagen-owad Iku-Turso Demon Argus Panoptes Pixie Eagle SpiritTrenti Koro-pok-guru Pesanta Dipsa Kanedama Wanyūdō Indrik Misi-kinepikw Within: Recall vs Recognition (8 levels) Di Penates Pollo Maligno Tritons Within: Recall vs Recognition Ippon-datara Mono Grande Argus Panoptes Gigelorum Dipsa Ponaturi Tsuchigumo Isonade Mora Domovoi Ba Jiao Gui Psotnik EkekTsuchinoko Kushtaka Pixie Domovoi Koro-pok-guru Yomotsu-shikome J. Morgens Pterippus Druk Tsukumogami 32 Morinji-no-okama Dryad Jack-In-Irons Pugot Tsurube-otoshi Ba Jiao Gui Indrik Duergar Jatayu MormolykeiaBarghest Putz Eneld Kwakwakalanooksiwae Quinotaur Duwende Laukų dvasios Zduhać the story serves as a context to enhance memory for the items. Between: Cued vs Uncued (target items boldface) Duwende Jenglot Moss people Python Tzitzimitl Between: Information Entropy (36, 45, & 54 bits) Beast Fenghuang Laelaps Samebito Ekek LightningBeast Bird Lightning Bird Bishop-sh Forest Bull Laukų dvasios Sceadugenga Daitengu Mbwiri Brag Ghost Lavellan Shachihoko Between: First/Lastname separated vs. combined To authenticate using a narrative password the user would have to either reproduce (cued Buggane Gigelorum Lightning Bird Si-Te-Cah Demon Mormolykeia Căpcăun Glaistig Mbwiri Sky Women Eneld16Pesanta Chichevache Hokhokw Mormolykeia Sleipnir Forest Bull Yomotsu-shikome Cretan Bull Hōkō Naga reballs Trenti recall) specic pieces of information, or the user has to pick the correct answer out of a Alien Daitengu 64Indrik Nang Takian Tsurube-otoshiEneld Mbwiri Daitya Jack-In-IronsArgus PanoptesNarasimha ForestWanyūdō Bull Mormolykeia Demon Jatayu Nekomata Yomotsu-shikome Recognition vs. Recall for Cued vs. Uncued Conditions Ba Jiao Gui Ghost Nikusui Recall vs. Recognition Performance by Recognition Set Size number of alternatives (recognition). Graphical passwords mainly use recognition-based Dipsa Kanbari-nyūdō Nikusui Zduhać 100% Beast Gigelorum Penghou 100%$!!"# methods to achieve high authentication performance. Brag Indrik Pesanta Daitengu Jack-In-Irons Pixie Demon Jatayu Sky Women ,!"# Dipsa Kanedama Wanyūdō Domovoi32Koro-pok-guruAlien Yomotsu-shikome Ghost +!"# Duwende Laukų dvasios Zduhać Argus Panoptes Gigelorum Ekek Lightning Bird Ba Jiao Gui Indrik *!"# Beast Lightning Bird 50% Daitengu Mbwiri )!"# Demon Mormolykeia -.--/01#$#2.3455# Eneld16Pesanta (!"# -.--/01#%#2.3455# Forest Bull Yomotsu-shikome 50% -.--/01#$#2.3061# -.--/01#%#2.3061# '!"# &!"# 0% uncued cued Recall (blue) vs. Recognition at 9x4 bits (orange) %!"# Examples of three dierent graphical password systems. The user has to identify the correct password elements to authenticate. lighter bars indicate 10 min RI, darker bars >1 week RI Results study 2 $!"# Study 1 used a step-down recognition paradigm where participants rst tried to recall the rele- 0%!"# undef $)# 16 undef &%# 32 undef )'# 64 vant information in response to specic questions (e.g., “what was the protagonist’s rst Recall (blue) vs. Recognition (orange) name”) after which they were shown decending lists of potential responses containing lighter bars indicate 10 min RI, darker bars >1 week RI n Recall and Recognition Performance by Question 2 (8 > n ≥ 0) choices. We were particularly interested in the optimal recognition set size to 100%100% Testing after short distraction task (10 min) Recognition of Protagonist and Minor Character Names maximize information entropy. In addition we tested the eect of highlighting the target 90% 100% 10 min >1 week items in the text. 80% 70% Study 2 compared the performance of a narrative password at three dierent levels of informa- 60% 50% tion entropy (36, 45, and 54 bits of information). We also investigated how to best use agents’ 50%50% names as part of a narrative password. 40% 30% 0% Protagonist Minor Character Protagonist Minor Character 20% Recognition of First Name and Last Name vs. Combined Names Conclusions 10% for both Retention Intervals 0% 8lastName...... 1 8......priest 1 8......color 1 feature4.. 1 8rstName...... 1 room5... 1 smell6 .... 1 drink6 .... itemGiven8 ...... 11 itemRecieved4 .. 1 8visitor ...... 1 Performance in an adaptive recognition procedure is signi- Protagonist Minor Color Feature Protagonist Location Smell Drink Gift Item Visitor Login Performance After 1 Week Retention Interval cantly better than free recall even at large recognition sets last name name of Item of item rst name (room) identity by Dierent Password Systems (text / graphical) 100%100% 100%$!!"# >1 week retention interval Elements highlighted in the text are remembered better 90% ,!"# 80% +!"# Story elements have to be selected carefully to ensure high 70% *!"# performance 60% )!"# -.--/01#$#2.3455# Name recognition is driven largely by rst names. The last 50%50% 50%(!"# -.--/01#%#2.3455# -.--/01#$#2.3061# 40% -.--/01#%#2.3061# name is usually poorly remembered and doesn’t provide an '!"# 30% additional recognition cue &!"# 20% Information entropy of narrative passwods is potentially su- %!"# 10% cient for use in secure passwords but overall performance is $!"# 0% 8...... 1 8...... 1 8...... 1 4.. 1 8...... 1 5... 1 6 .... 1 6 ....8 ...... 11 4 .. 1 8 ...... 1 0%!"# currently less than graphical passwords. lastName priest color feature rstName room smell drink itemGiven itemRecieved visitor $)# &%# )'# Recall (blue) vs. Recognition (orange, successively decreasing response sets [bits of information]) Uncued Alpha- PassPoints Cued PassFaces VIP CSA Narrative numeric Narrative 36 bits 36-46 bits 36-46 bits 36-54 bits 36-46 bits 36-46 bits 36-46 bits Biddle, R., Chiasson, S., & van Oorschot, P.C. (2012). Graphical passwords: Learning from the rst twelve years. ACM Johnson,