期刊文献+

口令重用行为与多维口令体系研究

Research on Password Reuse Behavior and Multidimensional Password System
下载PDF
导出
摘要 互联网的迅速发展与网络服务的高度分散,促使广大网民不断注册更多的账户,并导致口令重用行为普遍化,使得用户信息面临泄露的风险。为此,基于2011年底互联网泄密门数据和大学生在线调查数据,分析了网民口令的结构特征和重用行为,并由此设计融入信息维度和分级管理思想的多维口令体系。该体系以根口令-重用码结构为基础,内容维包含多个独立的信息因子,构成口令的可记忆性主体;形式维负责形式变换,以提升口令的复杂性和安全性;时空维用于保障口令的时效性和重用性。对比量化分析结果表明,该口令体系具备良好的记忆性和便捷性,能有效抵御暴力攻击和熟人攻击。 The rapid development of the Internet and highly decentralized network services prompts the majority of Internet users to register more accounts,and causes a high incidence of password reuse,which makes the user information leakage risks facing the domino-style. Based on the data of Internet password leak door at the end of 2011 as well as the college students online survey,this paper analyzes the structural characteristics and reuse behavior of netizen passwords in detail,and thus designs a multidimensional password system which infuses into the information dimensions and classified management. This system,based on the structure of"seed-reuse code",includes three dimensions:the content dimension contains multi-independent"information factor",which constitutes the main part of the password,the formal dimension is responsible for conversion formatting,in order to enhance the complexity and security of the password,and space-time dimension is targeted designed to protect the password timeliness and reusability. Through comparative analysis and quantitative analysis,the password system not only has good memorability and convenience,but also can effectively resist the violent attacks and acquaintances attacks.
出处 《计算机工程》 CAS CSCD 2014年第12期114-120,125,共8页 Computer Engineering
基金 国家自然科学基金资助重大项目(91218301) 国家社会科学基金资助项目(11AZD077) 中央高校基本科研业务费专项基金资助项目(JBK130503 JBK120505)
关键词 口令安全 口令重用 根口令 重用码 多维口令体系 password security password reuse seed password reuse code multidimensional password system
  • 相关文献

参考文献16

  • 1de Rodrigo L G,Carlos A L,Atman A,et al.Biometric Identification Systems[J].Signal Processing,2003,83(12):2539-2557.
  • 2Halderman J A,Waters B,Felten E W.A Convenient Method for Securely Managing Passwords[C]//Proceedings of the14th International Conference on World Wide Web.[S.1.]:ACM Press,2005:471-479.
  • 3Shirley G,Edword W F.Password Management Strategies for Online Accounts[C]//Proceedings of the2nd Symposium on Usable Privacy and Security.[S.1.]:ACM Press,2006:44-55.
  • 4Pinkas B,Sander T.Securing Passwords Against Dictionary Attacks[C]//Proceedings of the9th ACM Conference on Computer and Communications Security.[S.1.]:ACM Press,2002:161-170.
  • 5中国互联网信息中心.第28次中国互联网发展状况统计报告[EB/OL].http://www.cnnic.net.cn.
  • 6Zhang J,Luo X,Akkaladevi S,et al.Improving Multiplepassword Recall:An Empirical Study[J].European Journal of Information Systems,2009,18(2):165-176.
  • 7Notoatmodjo G,Thomborson C.Passwords and Perceptions[C]//Proceedings of the7th Australasian Conference on Information Security.[S.1.]:Australian Computer Society,Inc.,2009:71-78.
  • 8Devi S M,Geetha M.OPass:Attractive Presentation of User Authentication Protocol with Resist to Password Reuse Attacks[J].International Journal of Computer Science and Mobile Computing,2013,8(2):174-180.
  • 9Ives B,Walsh K R,Schneider H.The Domino Effect of Password Reuse[J].Communications of the ACM,2004,47(4):75-78.
  • 10Schneier B.Schneier on Security[M].[S.1.]:Wiley,2006.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部