skip to main content
article
Free Access

Easily remembered passphrases: a better approach

Published:01 September 1985Publication History
Skip Abstract Section

Abstract

As lay persons' use of information processing equipment increases, systems' accurate verification of a user's identity becomes a matter of growing concern. Prime considerations are:1. People must be prevented from convincing the system that they are someone else.2. The system must properly accept persons' accurate statements of their identities.3. Verification procedures must impose a minimal burden on lay users.4. Costs of verification must be reasonable. [9, 10, 11, 13, 19]

References

  1. Branstad, Dennis, Draft Federal Information Processing Standards.Google ScholarGoogle Scholar
  2. Gasser, M., "A Random Word Generator for Pronounceable Passwords," MITRE Corporation, November 1975.Google ScholarGoogle Scholar
  3. Haskett, James A., "Pass-Algorithms: A User Validation Scheme Based on Knowledge or Secret Algorithms," Communications of the ACM, 27, (8 /84), pages 777--781. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. International Business Machines, OS/VS2 MVS Resource Access Control Facility Installation Reference Manual, Form Number SC28-0734, IBM Corporation.Google ScholarGoogle Scholar
  5. Kurzban, Stan, "A Dozen Gross 'Mytnconceptions' about Information Processing Security," Security, IFIP/Sec'83 (Edited by Vilveke A. Fak), North Holland Publishing Company, Amsterdam (1983), pages 15--25.Google ScholarGoogle Scholar
  6. Kurzban, Stanley A., Heines, Thomas S., and Sayers, Anthony P., Operating Systems Principles (Second Edition), Van Nostrand Reinhold, New York, New York, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lamport, Leslie, "Password Authentication with Insecure Communication," Communications of the ACM, 24, 11 (Nov. 1981), pages 770--772. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. McPhee, William S., "Perspectives on System Security and System Integrity," Proceedings of Share European Association (SEAS) (October 1978), pages 264--280.Google ScholarGoogle Scholar
  9. Meissner, Paul, "Evaluation of Techniques for Verifying Personal Identity," Proceedings, ACM-NBS Fifteenth Annual Technical Symposium, National Bureau of Standards, June 17, 1976, pages 119--127.Google ScholarGoogle Scholar
  10. Morris, Robert, and Thompson, Ken, "Password Security: A Case History," Computing Science Technical Report #71, Bell Laboratories (April 3, 1978).Google ScholarGoogle Scholar
  11. Morris, R., and Thompson, K., "Password Security: A Case History," Communications of the ACM, 22, 11 (11/79), pages 594--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Orceyre, Michael J., and Courtney, Robert H., Jr., "Considerations in the Selection of Security Measures for Automatic Data Processing Systems" (Edited by Gloria R. Bolotsky), NBS Special Publication 500-33 (June 1978).Google ScholarGoogle Scholar
  13. Porter, S. N., "A Password Extension for Improved Human Factors," Computers and Security, Volume 1, Number 1, January 1982, pages 54--56.Google ScholarGoogle Scholar
  14. Reitman, Judith S., "Computer Simulation of an Information Processing Model of Short-Term Memory," in Models of Human Memory (Donald A. Norman, Editor), Academic Press, Incorporated, New York, 1970, pages 117--148.Google ScholarGoogle Scholar
  15. Schweitzer, James A., "COMPUTER SECURITY: Make Your Passwords More Effective," EDPACS, Volume X, Number 8, February 1983, pages 6--11.Google ScholarGoogle Scholar
  16. Wilkes, M. V., Time-Sharing Computer Systems, American Elsevier, New York (1968), pages 91ff. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Winitz, H., Herriman, E., and Belleross, B., "Long-Term Recall of Speech Sounds as a Function of Pronounceability," Language and Speech, 18 (1/75), pages 74--82.Google ScholarGoogle Scholar
  18. Wood, Charles Cresson, "Effective Information System Security with Password Controls," Computers and Security, 2, 1 (January 1983), pages 5--10.Google ScholarGoogle ScholarCross RefCross Ref
  19. Wood, Helen M., "The Use of Passwords for Controlled Access to Computer Resources," NBS Special Publication 500-9, May 1977.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGSAC Review
    ACM SIGSAC Review  Volume 3, Issue 2-4
    Resources: part II
    Fall/Winter 1985
    44 pages
    ISSN:0277-920X
    DOI:10.1145/1058406
    Issue’s Table of Contents

    Copyright © 1985 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 September 1985

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader