Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cognitive Authentication Schemes – Traditional password replacement?
KTH, School of Computer Science and Communication (CSC).
KTH, School of Computer Science and Communication (CSC).
2011 (English)Independent thesis Advanced level (professional degree), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Cognitive Authentication Schemes

Traditional password replacement?

By: Michael Palmgren & Markus Byström

ABSTRACT

Although the traditional password authentication scheme is so widely used, it still has a few significant drawbacks. One of these weaknesses is that the strength of the password depends largely on the user. A poorly chosen password is weak against brute force attacks as well as dictionary attacks.

Due to this fact, there has been a lot of research regarding cognitive authentications schemes, where the user is authenticated with a system based on their answers to a number of cognitive challenges. This thesis conducts research on a few of these schemes and analyses their strengths and weaknesses. A cognitive scheme is also implemented and put through a usability test.

Our results suggest that the scheme implemented in this thesis is not practical as an authentication scheme for everyday use. The concept of cognitive authentication schemes does, however, show a lot of promise. A larger study would have to be conducted to come to a more sound conclusion.

Abstract [sv]

Kognitiva Autentiseringsmetoder

Det traditionella lösenordets ersättare?

Av: Michael Palmgren & Markus Byström

SAMMANFATTNING

Även om användningen av den traditionella lösenordsautentiseringen är så utbredd så lider den fortfarande av svagheter. En av dessa svagheter är att ett lösenords styrka beror mycket på användaren. Ett dåligt valt lösenord kan vara svagt mot "brute force" attacker samt "dictionary"-attacker.

Detta har lett till att man har forskat mycket inom kognitiva autentiseringsmetoder, där användaren autentiseras för ett system beroende på dennes svar på ett antal kognitiva utmaningar. I denna rapport studeras några av dessa metoder och deras styrkor och svagheter analyseras. En kognitiv autentiseringsmetod implementeras och sedan utvärderas användbarheten genom ett användbarhetstest.

Våra resultat från användartestet av metoden som implementerats i denna rapport är inte praktisk nog för vardagligt användande. Konceptet verkar däremot väldigt lovande. En större studie skulle behöva göras för att kunna komma till en rimlig slutsats.

Place, publisher, year, edition, pages
2011.
Series
Kandidatexjobb CSC, K11008
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-130851OAI: oai:DiVA.org:kth-130851DiVA: diva2:654298
Educational program
Master of Science in Engineering - Computer Science and Technology
Uppsok
Technology
Supervisors
Examiners
Available from: 2013-10-07 Created: 2013-10-07

Open Access in DiVA

No full text

Other links

http://www.csc.kth.se/utbildning/kandidatexjobb/datateknik/2011/rapport/palmgren_michael_OCH_bystrom_markus_K11008.pdf
By organisation
School of Computer Science and Communication (CSC)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 98 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf