1 1 11/17/09 2 2 11/17/09 The SiteKey. This is not a graphical - - PDF document

1
SMART_READER_LITE
LIVE PREVIEW

1 1 11/17/09 2 2 11/17/09 The SiteKey. This is not a graphical - - PDF document

11/17/09 1 1 11/17/09 2 2 11/17/09 The SiteKey. This is not a graphical password system. ...and I'm pretty sure it doesn't work. 3 3 11/17/09 - basic outline -problems with password usability and security -how various graphical


slide-1
SLIDE 1

11/17/09 1 1

slide-2
SLIDE 2

11/17/09 2 2

slide-3
SLIDE 3

11/17/09 3

The SiteKey. This is not a graphical password system. ...and I'm pretty sure it doesn't work.

3

slide-4
SLIDE 4

11/17/09 4

  • basic outline
  • problems with password usability and security
  • how various graphical password systems address them.

Usability includes memorability – this will be a big chunk of my talk – and ease of entry Security includes issues of social engineering, cracking, and shoulder-surfing

  • The picture-password system I developed for my master’s thesis

4

slide-5
SLIDE 5

11/17/09 5 5

slide-6
SLIDE 6

11/17/09 6

It in our terminology this boils down to…

6

slide-7
SLIDE 7

11/17/09 7 7

slide-8
SLIDE 8

11/17/09 8 8

slide-9
SLIDE 9

11/17/09 9

Rich covered this in our last student presentation, and I’ll be building on that a little bit. You can talk about the entropy of individual characters, but they have to be entered in the right order, so you end up needing to know the probabilities of entire passwords. When this concept is applied to passwords it is also called the “guessing entropy”

9

slide-10
SLIDE 10

11/17/09 10

…which is well-explained in chapter 9 of our book. So, the more entropy in our passwords the harder they are to guess. Looking at this, if you are in charge of a password system, you’d want to

10

slide-11
SLIDE 11

11/17/09 11

…increase the entropy of your passwords. Here are some ways to increase entropy… (discuss) One way to increase entropy (check if passwords match)

11

slide-12
SLIDE 12

11/17/09 12

There is an assumption being made here, that the attacker has perfect strategy, but this assumes the above. Something I want you to think about: Is this a good assumption? And I want you to think about that as I talk about

12

slide-13
SLIDE 13

11/17/09 13 13

slide-14
SLIDE 14

11/17/09 14

Hashing is used in almost all standard password systems.

14

slide-15
SLIDE 15

11/17/09 15

Hashing is used in almost all standard password systems.

  • System doesn’t even know your password. An admin looking at the password file doesn’t

know your password…

  • But if an admin sees two hashes in the file that are the same…

15

slide-16
SLIDE 16

11/17/09 16

So we add salt. This makes the hashes different between users and even across systems, so you can use the same password on multiple systems or two people could have the same password and no one will know, even if they know the salts (which are typically stored in the password file).

16

slide-17
SLIDE 17

11/17/09 17 17

slide-18
SLIDE 18

11/17/09 18

Given that we can hash passwords to hide this information, is entropy the right way to think about passwords? And remember what entropy analysis does

18

slide-19
SLIDE 19

11/17/09 19

…it produces policies like this. (discuss) Given what you’ve learned so far, do policies like this make sense?

  • Does anything on this list seem unnecessary?
  • Does anything seem necessary?

19

slide-20
SLIDE 20

11/17/09 20

Jeff Yan in chapter 7 and in other papers says that about 10% of a population will always be non-compliant…

20

slide-21
SLIDE 21

11/17/09 21 21

slide-22
SLIDE 22

11/17/09 22

slide-23
SLIDE 23

11/17/09 23

slide-24
SLIDE 24

11/17/09 24

Consolidation is a term from neuroscience that describes how memories can be strengthened over time...

  • graphical passwords often have training interfaces
  • holding all else equal, 10 minutes will always win

This is straightforward.

24

slide-25
SLIDE 25

11/17/09 25

Now lets talk about picture superiority. Most graphical-password systems use pictures because of this effect.

25

slide-26
SLIDE 26

11/17/09 26

The PSE is a heavily studied and verified phenomenon in psychology which states that pictures are remembered better than words.

  • continuum (transitivity)
  • what makes items memorable?

26

slide-27
SLIDE 27

11/17/09 27

There are many facets to the PSE that have been experimentally verified. I am going to run through them now because they all impact memory for pictures in different ways.

27

slide-28
SLIDE 28

11/17/09 28

This can be seen in the paper assigned for today (Passpoints)… A picture of an apple is easier to remember than the word “apple” (but only if you try to remember the word “apple” and not the thing “apple”)

28

slide-29
SLIDE 29

11/17/09 29

slide-30
SLIDE 30

11/17/09 30

This was a popular theory during the 70s and 80s but has since been mostly refuted… … but there is evidence that multiple encodings encourage redintegration…

  • mnemonic passwords and muscle memory

30

slide-31
SLIDE 31

11/17/09 31 31

slide-32
SLIDE 32

11/17/09 32

Polysemy is a major problem with pictures and it has to do with similarity. It is hard to remember things that don’t stand out. Or, if you have to remember a subset of items in a larger set, the items can be confused on these three levels.

32

slide-33
SLIDE 33

11/17/09 33

This is a major problem with pictures and it has to do with similarity. This is an example of schematic similarity

33

slide-34
SLIDE 34

11/17/09 34 34

slide-35
SLIDE 35

11/17/09 35

What is this a picture of? How many think it’s a crocodile? How many think it’s an alligator? How many are not sure?...

35

slide-36
SLIDE 36

11/17/09 36

Even though pictures have all these features that can make them easy to remember, when you apply them to passwords you can run into a problem. If you want to remember pictures in a specific order you have to work with serial memory (native ASL-signers story).

  • impact on PassPoints
  • unordered passwords

36

slide-37
SLIDE 37

11/17/09 37 37

slide-38
SLIDE 38

11/17/09 38

A lot of graphical password systems rely on recognition, but pictures are actually better than text at both. In fact, the relative advantage of pictures in recall tasks is greater than their advantage for recognition tasks (though recognition always performs better than recall).

38

slide-39
SLIDE 39

11/17/09 39 39

slide-40
SLIDE 40

11/17/09 40

  • Passwords and lack of feedback.
  • Repeated input problem

40

slide-41
SLIDE 41

11/17/09 41 41

  • inputs from study
  • best example
  • Why is this a problem?
slide-42
SLIDE 42

11/17/09 42

  • attacker inputs vs innocent user

42

slide-43
SLIDE 43

11/17/09 43

In Chapter 7 of our book, the authors use the term passphrase to refer to something that I call a mnemonic password, but I don’t think that is typical. Here I’m referring to a password that is composed of several words strung together.

  • Passphrase length vs brute force
  • Passphrase and semantic units
  • Passphrases and entropy
  • Passphrases and typos (typographical error rate of 20% for 15-character passphrases)

43

slide-44
SLIDE 44

11/17/09 44

Login time is time to a successful login. Login time is relevant to passphrases because more characters takes longer to input. It’s also relevant because typos mean the user has to try again and this increases login time. Graphical password systems often have novel input methods and several screens.

44

slide-45
SLIDE 45

11/17/09 45

PassPoints has the user click five points in order on a single image.

45

slide-46
SLIDE 46

11/17/09 46

The Déjà vu system has the user select 5 images from their portfolio (I’ll talk about that later) from a set of 25 that are presented. The other 20 are “decoys”.

46

slide-47
SLIDE 47

11/17/09 47

Click 5 times.

  • password is 5 icons, systems shows 3-5 per round, 5 rounds to authenticate.
  • game-like system, animation

47

slide-48
SLIDE 48

11/17/09 48 48

slide-49
SLIDE 49

11/17/09 49

The déjà vu system uses “random art” (an algorithmic way to generate nonrepresentational art images) A benefit of using images like this is that, seemingly, they cannot be written down. (discuss) Can they be written down? (discuss) Does this solve the social engineering problem?

49

slide-50
SLIDE 50

11/17/09 50

The contest. Dictionary word = 1 point Strong password = 2 points Passfaces password = 2 points Cristian’s password = 5 points

  • Paper found PassFaces extremely hard to surf but the current version of PassFaces

required inclusion of my own pictures which should make it easier.

50

slide-51
SLIDE 51

11/17/09 51

Pictures of PassFaces screens

51

slide-52
SLIDE 52

11/17/09 52

slide-53
SLIDE 53

11/17/09 53

slide-54
SLIDE 54

11/17/09 54

slide-55
SLIDE 55

11/17/09 55

slide-56
SLIDE 56

11/17/09 56

This is the spy-resistant keyboard.

  • same principle as Passfaces
  • meant for Microsoft Surface and large touchscreen displays

56

slide-57
SLIDE 57

11/17/09 57

So the spy-resistant keyboard is what I would call a shoulder-surfing resistant system. If you record the authentication, you can figure out the password. There are other systems which I would call shoulder-surfing immune. These are systems which, even if you record the authentication process, you won’t be able to figure out the password.

57

slide-58
SLIDE 58

11/17/09 58

This is such a system. It's calledthe Convex Hull Click system.

  • passicons
  • 5 screens
slide-59
SLIDE 59

11/17/09 59

slide-60
SLIDE 60

11/17/09 60

slide-61
SLIDE 61

11/17/09 61

slide-62
SLIDE 62

11/17/09 62

slide-63
SLIDE 63

11/17/09 63

slide-64
SLIDE 64

11/17/09 64

slide-65
SLIDE 65

11/17/09 65

  • because the system needs to know the password

65

slide-66
SLIDE 66

11/17/09 66

…and you have systems like convex hull click which are not hashable and some, like PassPoints that don’t employ hashing.

66

slide-67
SLIDE 67

11/17/09 67

And by “hashed” I mean stored as a hash and not storing the password explicitly.

67

slide-68
SLIDE 68

11/17/09 68

Both PassFaces and PassPoints have been studied from a security perspective and in both cases, user-selected passwords were easily guessed.

68

slide-69
SLIDE 69

11/17/09 69 69

slide-70
SLIDE 70

11/17/09 70 70

slide-71
SLIDE 71

11/17/09 71

This is the login screen for my picture password system. My goal was to try to design the best password system.

71

slide-72
SLIDE 72

11/17/09 72

  • emphasize random assignment

72

slide-73
SLIDE 73

11/17/09 73

slide-74
SLIDE 74

11/17/09 74

slide-75
SLIDE 75

11/17/09 75 75

slide-76
SLIDE 76

11/17/09 76 76

slide-77
SLIDE 77

11/17/09 77 77

slide-78
SLIDE 78

11/17/09 78

Interactive training and learning

78

slide-79
SLIDE 79

11/17/09 79 79

slide-80
SLIDE 80

11/17/09 80 80

slide-81
SLIDE 81

11/17/09 81

slide-82
SLIDE 82

11/17/09 82 82

slide-83
SLIDE 83

11/17/09 83

slide-84
SLIDE 84

11/17/09 84

slide-85
SLIDE 85

11/17/09 85

slide-86
SLIDE 86

11/17/09 86