skip to main content
10.1145/1143120.1143129acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Human selection of mnemonic phrase-based passwords

Published:12 July 2006Publication History

ABSTRACT

Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to strengthen passwords, some systems instruct users to create mnemonic phrase-based passwords. A mnemonic password is one where a user chooses a memorable phrase and uses a character (often the first letter) to represent each word in the phrase.In this paper, we hypothesize that users will select mnemonic phrases that are commonly available on the Internet, and that it is possible to build a dictionary to crack mnemonic phrase-based passwords. We conduct a survey to gather user-generated passwords. We show the majority of survey respondents based their mnemonic passwords on phrases that can be found on the Internet, and we generate a mnemonic password dictionary as a proof of concept. Our 400,000-entry dictionary cracked 4% of mnemonic passwords; in comparison, a standard dictionary with 1.2 million entries cracked 11% of control passwords. The user-generated mnemonic passwords were also slightly more resistant to brute force attacks than control passwords. These results suggest that mnemonic passwords may be appropriate for some uses today. However, mnemonic passwords could become more vulnerable in the future and should not be treated as a panacea.

References

  1. Adams, A., and Sasse, M. A., 1999. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Communications of the ACM 42 (12), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Australian Computer Emergency Response Team (AusCERT). Choosing good passwords. AusCERT Reference # GoodPasswords, February 1, 2001. http://www.auscert.org.au/render.html?it=2260 (accessed March 2006).Google ScholarGoogle Scholar
  3. Brostoff, S. Performance of Authentication Mechanisms. PhD Thesis, Chapter 4. http://www.cs.ucl.ac.uk/staff/s.brostoff/thesis/sachas_thesis_ch04.pdf (accessed May 2006).Google ScholarGoogle Scholar
  4. Brostoff, S., and Sasse M. A. Ten strikes and you're out: Increasing the number of login attempts can improve password usability. CHI 2003 Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, Florida.Google ScholarGoogle Scholar
  5. The Classic TV Database. Classic TV Theme Songs - Theme Song Lyrics. http://www.classic-tv.com/themesongs/lyrics.asp (accessed July 2004).Google ScholarGoogle Scholar
  6. Curry, D. A. Selecting Good Passwords. Excerpts from Improving the Security of Your UNIX System. http://www.alw.nih.gov/Security/Docs/passwd.html (accessed March 2006).Google ScholarGoogle Scholar
  7. Debian Package: GPW, http://www.mnis.fr/deb30/utils/gpw.html (accessed May 2006).Google ScholarGoogle Scholar
  8. Fact-index.com. List of Advertising Slogans. http://www.fact-index.com/l/li/list_of_advertising_slogans.html (accessed July 2004).Google ScholarGoogle Scholar
  9. Federal Information Processing Standards Publication 181, Standard for Automated Password Generator. National Institute of Standards and Technology, October 5, 1993. http://www.itl.nist.gov/fipspubs/fip181.htm (accessed February 2006).Google ScholarGoogle Scholar
  10. Ganesan, R. and Davies, C. A New Attack on Random Pronounceable Password Generators. Proceedings of the 17th {NIST}-{NCSC} National Computer Security Conference, 1994.Google ScholarGoogle Scholar
  11. Gasser, M. A Random Word Generator for Pronounceable Passwords. Technical Report ESD-TR-75-97, Electronic Systems Division, Hanscom Air Force Base, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  12. Google Accounts. "Edit Password." https://www.google.com/accounts/EditPasswd (accessed May 2006).Google ScholarGoogle Scholar
  13. The Google API, http://www.google.com/apis/ (accessed February 2006).Google ScholarGoogle Scholar
  14. John the Ripper, http://www.openwall.com/john/ (accessed February 2006).Google ScholarGoogle Scholar
  15. Johnson, B. B. The Movie Quotes Site. http://www.moviequotes.com/repository.cgi (accessed July 2004).Google ScholarGoogle Scholar
  16. Jeyaraman. S., and Topkara, U. Have the cake and eat it too-Infusing usability into text-password based authentication systems. CERIAS and Department of Computer Sciences, Purdue University, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Klein, D. V., Foiling the Cracker; A Survey of, and Improvements to Unix Password Security", (revised paper with new data) Proceedings of the 14th DoE Computer Security Group, May 1991.Google ScholarGoogle Scholar
  18. Kotadia, M. Microsoft Security Guru: Jot Down Your Passwords. CNET News.com, May 23, 2005. http://news.com.com/Microsoft+security+guru+Jot+down+your+passwords/2100--7355_3--5716590.html (accessed March 2006).Google ScholarGoogle Scholar
  19. Mac OS X Password Assistant. "Passwords: Safety in Numbers." http://www.apple.com/macosx/tips/password13.html (accessed May 2006).Google ScholarGoogle Scholar
  20. Microsoft Corporation. Strong Passwords -- How to Create and Use Them. Security At Home, Personal Information. November 30, 2005. http://www.microsoft.com/athomc/security/privacy/password.mspx (accessed March 2006).Google ScholarGoogle Scholar
  21. Moncur, M. The Quotations Page. http://www.quotationspage.com/quotes/ (accessed July 2004).Google ScholarGoogle Scholar
  22. Mozilla Corporation, http://www.mozilla.com.Google ScholarGoogle Scholar
  23. Password Cracking Wordlist. http://www.openwall.com/wordlists/ (accessed February 2006).Google ScholarGoogle Scholar
  24. Password Safe, http://passwordsafe.sourceforge.net/ (accessed February 2006).Google ScholarGoogle Scholar
  25. Quoteland.com. Quoteland.com..all the right words! http://www.quoteland.com/author.asp (accessed July 2004).Google ScholarGoogle Scholar
  26. Rhymes.org.uk. Nursery Rhymes - Lyrics and Origins! http://www.rhymes.org.uk/ (accessed July 2004).Google ScholarGoogle Scholar
  27. Richards, J. I. Research. University of Texas at Austin, Department of Advertising, February 10, 1997. http://advertising.utexas.edu/research/slogans/index.asp (accessed July 2004).Google ScholarGoogle Scholar
  28. Sasse, M. A., Brostoff, S., and Weirich, D. Transforming the weakest link: a human-computer interaction approach to usable and effective security. BT Technology Journal, Vol 19 (3), 2001, pp. 122--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Spector, Y., and Ginzberg, J. Pass-sentence - a new approach to computer code. Computers & Security, Vol 13, 1994, pp. 145--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. The Song Lyrics. Song Lyrics. http://www.thesonglyrics.com/ (accessed July 2004).Google ScholarGoogle Scholar
  31. United States Coast Guard, http://www.uscg.mil/HQ/PSC/cghrms/using_peoplesoft/how_to_change_your_password.htm (accessed February 2006).Google ScholarGoogle Scholar
  32. University of Chicago, Networking Services and Information Technologies. "Choosing Good Passwords," 2002. http://security.uchicago.edu/docs/userpassword.shtml (accessed March 2006).Google ScholarGoogle Scholar
  33. University of Colorado, Department of Computer Science. "Password Policy," November 2004. http://www.cs.colorado.edu/~lizb/internal/password-policy.html (accessed February 2006).Google ScholarGoogle Scholar
  34. University of New Orleans, Department of Computer Science. How Do I Create A Secure Password? Reprint of article in; login 21, no. 3 (1996). http://www.cs.uno.edu/Resources/FAQ/faq4.html (accessed February 2006).Google ScholarGoogle Scholar
  35. Van Vleck, T. "Java Password Generator," July 31, 1997. http://www.multicians.org/thvv/gpw.html (accessed May 2006).Google ScholarGoogle Scholar
  36. Yan. J., Blackwell A., Anderson, A., and Grant A. The Memorability and Security of Passwords -- Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000.Google ScholarGoogle Scholar
  37. Zviran, M., and Haga, W. J. Cognitive Passwords: The Key to Easy Access Control. Computers & Security, Vol 9, 1990, pp. 723--736. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Human selection of mnemonic phrase-based passwords

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SOUPS '06: Proceedings of the second symposium on Usable privacy and security
        July 2006
        168 pages
        ISBN:1595934480
        DOI:10.1145/1143120

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 July 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate15of49submissions,31%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader