Change search
ReferencesLink to record
Permanent link

Direct link
Cognitive Authentication Schemes – Traditional password replacement?
KTH, School of Computer Science and Communication (CSC).
KTH, School of Computer Science and Communication (CSC).
2011 (English)Independent thesis Advanced level (professional degree), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Cognitive Authentication Schemes

Traditional password replacement?

By: Michael Palmgren & Markus Byström


Although the traditional password authentication scheme is so widely used, it still has a few significant drawbacks. One of these weaknesses is that the strength of the password depends largely on the user. A poorly chosen password is weak against brute force attacks as well as dictionary attacks.

Due to this fact, there has been a lot of research regarding cognitive authentications schemes, where the user is authenticated with a system based on their answers to a number of cognitive challenges. This thesis conducts research on a few of these schemes and analyses their strengths and weaknesses. A cognitive scheme is also implemented and put through a usability test.

Our results suggest that the scheme implemented in this thesis is not practical as an authentication scheme for everyday use. The concept of cognitive authentication schemes does, however, show a lot of promise. A larger study would have to be conducted to come to a more sound conclusion.

Abstract [sv]

Kognitiva Autentiseringsmetoder

Det traditionella lösenordets ersättare?

Av: Michael Palmgren & Markus Byström


Även om användningen av den traditionella lösenordsautentiseringen är så utbredd så lider den fortfarande av svagheter. En av dessa svagheter är att ett lösenords styrka beror mycket på användaren. Ett dåligt valt lösenord kan vara svagt mot "brute force" attacker samt "dictionary"-attacker.

Detta har lett till att man har forskat mycket inom kognitiva autentiseringsmetoder, där användaren autentiseras för ett system beroende på dennes svar på ett antal kognitiva utmaningar. I denna rapport studeras några av dessa metoder och deras styrkor och svagheter analyseras. En kognitiv autentiseringsmetod implementeras och sedan utvärderas användbarheten genom ett användbarhetstest.

Våra resultat från användartestet av metoden som implementerats i denna rapport är inte praktisk nog för vardagligt användande. Konceptet verkar däremot väldigt lovande. En större studie skulle behöva göras för att kunna komma till en rimlig slutsats.

Place, publisher, year, edition, pages
Kandidatexjobb CSC, K11008
National Category
Computer Science
URN: urn:nbn:se:kth:diva-130851OAI: diva2:654298
Educational program
Master of Science in Engineering - Computer Science and Technology
Available from: 2013-10-07 Created: 2013-10-07

Open Access in DiVA

No full text

Other links
By organisation
School of Computer Science and Communication (CSC)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 61 hits
ReferencesLink to record
Permanent link

Direct link