GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Show simple item record

dc.contributor.author Vorster, J
dc.contributor.author Van Heerden, R
dc.date.accessioned 2015-11-12T07:38:12Z
dc.date.available 2015-11-12T07:38:12Z
dc.date.issued 2015-03
dc.identifier.citation Vorster, J and Van Heerden, R. 2015. Graphical passwords: a qualitative study of password patterns. In: International Conference on Cyber Warfare and Security (ICCWS 2015), Skukuza Conference Centre, Skukuza Rest Camp, South Africa, 24-25 March 2015, pp 375-383 en_US
dc.identifier.uri http://hdl.handle.net/10204/8263
dc.description Abstract Only. en_US
dc.description.abstract Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be stronger in terms of security because people are better at remembering them. It is well known that the key-space for graphical passwords are at least equivalent to alpha-numeric passwords and can even be much stronger, depending on the schema. Similar to conventional passwords, graphical passwords may have patterns. A pattern that has been widely reported in the literature and studied in some detail are that of hotspots. That is, a high percentage of people will select the same spots on an image. This paper focus on a quantitative analysis of graphical passwords. During this study users from commercial companies were asked to enter graphical passwords. These passwords were then analysed and patterns identified. Users were also asked what there password selection strategies are. The combination of this information enable a qualitative analysis of graphical passwords. The results show that graphical passwords are less secure than expected, that there are a number of patterns that limit the key-space significantly and thus reduce the strength of such password schemas. Users were also asked about their perception of the security of graphical passwords. The survey suggest that users are divided in their opinion on how secure such technologies are. Lastly we also report on reasons that users gave for why they think such technology are not yet ready for use as a security mechanism in an organizational context. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;15491
dc.subject Graphical passwords en_US
dc.subject Access management en_US
dc.subject Password patterns en_US
dc.title Graphical passwords: a qualitative study of password patterns en_US
dc.type Presentation en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ResearchSpace


Advanced Search

Browse

My Account