Generating and Managing Strong Passwords using Hotel Mnemonic (original) (raw)
Related papers
A Study for an Ideal Password Management System
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
The growing number of online services needs users to have control over their password management system (generation, storage, recall). But the demand for total randomness and exclusivity of passwords is impractical in day-today life. Each component of a password management system comes with its cognitive burden on a user. There are many password management solutions available for users but every one of them has some drawbacks. Password managers have the ability to help users manage their passwords more successfully while also addressing many of the problems about password-based authentication. In this study, We're analyzing various previous studies regarding the effectiveness, usability, and security of password managers of all categories. Also, we're trying to come up with an ideal set of parameters to build the best possible password management system in 2022. This study will help to understand the key parameters and algorithms that we can use while building the ideal password generation, storage, and recall system for the user. I.
A Dynamic Method and Program for Multiple Password Generation and Management
Journal of Emerging Computer Technologies, 2021
Authentication is a process that users must do first to gain access to the websites/services they receive service from. Today, the most common method used for authentication is still text-based passwords. But, some difficulties/problems are encountered in the use of passwords for authentication. One of the difficulties is that users must use a separate and strong (cannot be guessed easily and hard to remember) password for each different website. Unfortunately, rather than using distinct passwords, users generally prefer to use the same password or similar passwords for different services. This leads to security vulnerabilities. Therefore, there is a need for a method/program that will enable easy and secure management of many strong passwords. In this study, a dynamic method and program is proposed to solve this problem. This method and program, inspired by the Chinese Remainders Theorem (CRT), simplifies the generation and management of multiple passwords. With this program, many individual passwords can be generated from a single unique password. Both the unique password and the individual passwords are not stored anywhere. The only thing users need to remember is the unique password, and in our method, long but easy-to-remember unique passwords can be used safely. Although inspired by the CRT, our method is not based on the CRT. CRT is only used in the security analysis of our method.
Journal of University of Human Development, 2016
Newly released researches disclose the need of canceling the incorrect opinion; security by Password (PW) is dead and proves that these believe has been hurtful. Moreover, recommended a campaign prioritize strategies of building PW. Considering the PW features such as costless, maturity and vast experiences, and usability PW continues to be the most used options in Information Security (IS), it is furthermore, consider most challengers to researchers and really needs further boosting. PWs control authentication mechanism of IS, requiring that individuals choose strong PW. The best advice to protect from hackers is randomly generating unique PW for every site and service, to apply this advice we need more techniques of easy to remember and hard to guess. This study proposed a bunch of easy to remember techniques for building a strong PW. Also, it exhibited the importance of similar strategy despite existing of many helpful PW managers. On the other hand, this paper compiled and analyzed today's data regarding authenticating secure systems via PW. Analyzed data showed some of common weakness in PW selection. Moreover, gathered information and evaluated data indicated the need of boosting PW. Proposed techniques and solutions enable individuals to select appropriate PW easily.
A Practical Scheme to Improve Memorability of System-assigned Random Password
Dhaka University Journal of Applied Science and Engineering, 2023
Most users follow common strategies and patterns while choosing passwords, which makes them easier to remember but often very weak in terms of security. System-assigned random passwords can be an answer to this problem. However, these random passwords are difficult to remember and hardly used by the users through their strong security guarantee. Recently researchers have been trying on devising techniques to remember random passwords. However, state-of-the-art methods have noticeable limitations such as-no upper case or special characters were considered, which is not practical for any good password. This paper proposes a novel scheme to aid users in remembering random passwords that do not suffer from these limitations. Users can select both graphical and text-based hints and associate them with systemassigned random passwords. Detailed user surveys were performed and the results showed that the proposed method can help users to remember random passwords with high accuracy. Using the proposed method, participants could recollect random passwords with an accuracy of 90.41% (average), which becomes 95% if case sensitivity is ignored.
Enhanced Textual Password Scheme for Better Security and Memorability
International Journal of Advanced Computer Science and Applications
Traditional textual password scheme provides a large number of password combinations but users generally use a small portion of available password space. Complex textual passwords are difficult to remember, therefore most users choose passwords with small length and contain dictionary words. Due to the use of small password length and dictionary words, textual passwords become easy to crack through offline guessability attacks. Traditional textual passwords scheme is also weak against keystroke logger attacks because alphanumeric characters are directly inserted into the password field. In this paper, enhancements are proposed in the registration and login screen of the traditional textual password scheme for improving security against offline guessability attacks and keystroke logger attacks. The proposed registration screen also improve memorability of traditional textual passwords through visual cues or patternbased approach. In the proposed login screen, passwords are indirectly inserted into the password field, to resist keystroke logger attacks. A comparative analysis between the passwords created in traditional and proposed pattern-based approach is presented. The testing results show that users create strong and high entropy passwords in the proposed pattern-based approach as compared to the traditional textual passwords approach.
A Study on Cyber Security for Password Generation
International Journal for Research in Applied Science and Engineering Technology IJRASET, 2020
Password-based authentication is the first of defense of most information systems. Password security enhances the security of the whole information system. Therefore, administrators will formulate the various password strategies to help users to improve security for authentication. To determine the password vulnerability and to enhance user privacy, strong password is must. This paper focuses generation of strong password. Also, we enhance the traditional password generation strategy based on Mnemonic Shape, X-Pass is proposed. X-Pass combines the characters generated by our mapping strategy to help users create a safe and strong password. We have designed a 4x4 matrix called X-Matrix that contains all the hex-digits in it. This hex-digits is converted to numerical digits through binary conversion and we lookup UNICODE character based on numerical digit. After, all numerical digits are processed and returned the characters are appended and then pre-processed to remove the non-printable characters and then finally returns the strong password with UNICODE encoding.
Challenges and Opportunities in Password Management: A Review of Current Solutions
Sri Lanka Journal of Social Sciences and Humanities
For over six decades, passwords have served as the primary authentication mechanism for almost all modern computer systems. However, password management is a challenging task for most computer users, and that has led users to many malpractices that open the door for most information security breaches over time. Despite many efforts, no alternative solution has ever succeeded in replacing passwords as the primary authentication mechanism. As a result, users are now heavily relying on password managers to alleviate the burden of manual password management. This paper addresses the topic of password management about different types of password managers and their inherent limitations. By evaluating the existing password management approaches and identifying potential improvements, this paper aims to signify an important research gap that exists in the study area; the need for fully automating the process of manual password management.
Survey on Awareness and Security Issues in Password Management Strategies
2010
communication via Internet travels across unsecured channels. This gives raise to security breaches. So user identification and authentication is needed to overcome these security breaches. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged. However, this survey shows that passwords are often compromised through the poor security and management practices of users. This paper also concentrates on user password composition and security practices for email accounts. The results of a survey that examines user practice in creating and using passwords are reported. Toward the end of this paper, we give some recommendation for the education of user in creating and maintaining their passwords.