A comparison of password techniques
Beedenbender, Mark G.
Haga, William J.
MetadataShow full item record
A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized access to a system might need only to look at a personnel record or associate with the person holding the desired password in order to discover the password. Therefore, there is a compromise between user memorability and security of a system. Exploration into other methods of user authentication and access control is desired to discover a better alternative to the traditional password system. The alternative are system-generated passwords, pronounceable passwords, passphrases, cognitive passwords and authentication by word association. These methods are discussed and examined. The results from this study show that cognitive passwords and authentication by word association are superior to other methods in access control.
Approved for public release, distribution is unlimited
Showing items related by title, author, creator and subject.
Monroy, Pauline (Monterey, California: Naval Postgraduate School, 2017-06);The military relies heavily on computer systems. Without a strong method of authentication to access these systems, threats to confi-dentiality, integrity, and availability of government information are likely to be more ...
Coley, John A. (Monterey, California. Naval Postgraduate School, 1991-09);Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms ...
Sawyer, Darren Antwon (Monterey, California: Naval Postgraduate School, 1990-03);The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to ...