A comparison of password techniques

Download
Author
Beedenbender, Mark G.
Date
1992-03Advisor
Haga, William J.
Second Reader
Zviran, Moshe
Metadata
Show full item recordAbstract
A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized access to a system might need only to look at a personnel record or associate with the person holding the desired password in order to discover the password. Therefore, there is a compromise between user memorability and security of a system. Exploration into other methods of user authentication and access control is desired to discover a better alternative to the traditional password system. The alternative are system-generated passwords, pronounceable passwords, passphrases, cognitive passwords and authentication by word association. These methods are discussed and examined. The results from this study show that cognitive passwords and authentication by word association are superior to other methods in access control.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Investigating background pictures for picture gesture authentication
Monroy, Pauline (Monterey, California: Naval Postgraduate School, 2017-06);The military relies heavily on computer systems. Without a strong method of authentication to access these systems, threats to confi-dentiality, integrity, and availability of government information are likely to be more ... -
User authentication : a state-of-the-art review.
Coley, John A. (Monterey, California. Naval Postgraduate School, 1991-03);Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms ... -
The characteristics of user-generated passwords
Sawyer, Darren Antwon (Monterey, California: Naval Postgraduate School, 1992-09);The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to ...