SlideShare una empresa de Scribd logo
1 de 6
Picture PasswordPicture Password
- How strong or weak is it?- How strong or weak is it?
It could be as weak as the weakest textual
password and could be so strong as to
resist offline brute force attacks.
All depends on how it is operated.
5th January, 2016
Mnemonic Security, Inc., Japan/UK
Brute Force Attack & Picture PasswordBrute Force Attack & Picture Password
The picture password could be as weak as the weakestThe picture password could be as weak as the weakest
text password if operated carelessly or naively.text password if operated carelessly or naively.
So could an Expanded Password System that acceptsSo could an Expanded Password System that accepts
pictures as well as characters.pictures as well as characters.
When, however, operated with some tweaks, the pictureWhen, however, operated with some tweaks, the picture
password could provide the level of strength that canpassword could provide the level of strength that can
resist the offline brute force attacks without inflictingresist the offline brute force attacks without inflicting
heavy burdens on users.heavy burdens on users.
how?how?
Assuming that a 40-bit random dataAssuming that a 40-bit random data
(password-component) be allocated to(password-component) be allocated to
each image, picking up 4 or 6 imageseach image, picking up 4 or 6 images
from among the matrix would result infrom among the matrix would result in
a password of 160 or 240-bit entropy.a password of 160 or 240-bit entropy.
Produced from such materials, the hashed value would be large enoughProduced from such materials, the hashed value would be large enough
against the offline brute force attacks, particularly effective when theagainst the offline brute force attacks, particularly effective when the
password-components are stored separately from the rest of the data,password-components are stored separately from the rest of the data,
most preferably between the servers on the network and the devices inmost preferably between the servers on the network and the devices in
the users’ hands.the users’ hands.
andand
Criminals, who want to produce a rainbow-table for a shortcut attack,Criminals, who want to produce a rainbow-table for a shortcut attack,
would need to steal both of the two groups of data stored separately.would need to steal both of the two groups of data stored separately.
Should it happen, it could be no more than an isolated case. When theShould it happen, it could be no more than an isolated case. When the
criminals get to obtain more powerful computers, we could then makecriminals get to obtain more powerful computers, we could then make
password-components larger.password-components larger.
As for the online attack, we can thwart it by simply locking the accountAs for the online attack, we can thwart it by simply locking the account
when the numbers of failed attempts reach the pre-set threshold. Sowhen the numbers of failed attempts reach the pre-set threshold. So
we do not need to bother too much about the mathematical strengthwe do not need to bother too much about the mathematical strength
about online BF attacks, although it goes without saying that the higherabout online BF attacks, although it goes without saying that the higher
the better, i.e. it would be recommended to register more of the imagesthe better, i.e. it would be recommended to register more of the images
from among the larger matrix of images, where security, notfrom among the larger matrix of images, where security, not
convenience, matters more.convenience, matters more.
thereforetherefore
Coupled with the features of being hard-to-forget andCoupled with the features of being hard-to-forget and
removing the burden of remembering the relationsremoving the burden of remembering the relations
between the accounts and the corresponding passwords,between the accounts and the corresponding passwords,
Expanded Password System, when carefully operated,Expanded Password System, when carefully operated,
could hit the best possible balance between the securitycould hit the best possible balance between the security
and the convenience.and the convenience.
It could also make ID federation schemes more secure,It could also make ID federation schemes more secure,
multi-factor schemes yet more secure and biometricsmulti-factor schemes yet more secure and biometrics
schemes less insecure.schemes less insecure.
Thank youThank you
thereforetherefore
Coupled with the features of being hard-to-forget andCoupled with the features of being hard-to-forget and
removing the burden of remembering the relationsremoving the burden of remembering the relations
between the accounts and the corresponding passwords,between the accounts and the corresponding passwords,
Expanded Password System, when carefully operated,Expanded Password System, when carefully operated,
could hit the best possible balance between the securitycould hit the best possible balance between the security
and the convenience.and the convenience.
It could also make ID federation schemes more secure,It could also make ID federation schemes more secure,
multi-factor schemes yet more secure and biometricsmulti-factor schemes yet more secure and biometrics
schemes less insecure.schemes less insecure.
Thank youThank you

Más contenido relacionado

Destacado

RV-Heidelberg-Changing Mkt Profile
RV-Heidelberg-Changing Mkt ProfileRV-Heidelberg-Changing Mkt Profile
RV-Heidelberg-Changing Mkt Profile
Raghavendra Verma
 
Student Project MECH S
Student Project MECH SStudent Project MECH S
Student Project MECH S
Dalton Goodwin
 
Diapositiva nutricion
Diapositiva nutricionDiapositiva nutricion
Diapositiva nutricion
jessabell
 

Destacado (12)

Privacy and Security of Healthcare Wearable Apps
Privacy and Security of Healthcare Wearable AppsPrivacy and Security of Healthcare Wearable Apps
Privacy and Security of Healthcare Wearable Apps
 
Sales_Skills
Sales_SkillsSales_Skills
Sales_Skills
 
RV-Heidelberg-Changing Mkt Profile
RV-Heidelberg-Changing Mkt ProfileRV-Heidelberg-Changing Mkt Profile
RV-Heidelberg-Changing Mkt Profile
 
Student Project MECH S
Student Project MECH SStudent Project MECH S
Student Project MECH S
 
Entrepreneurs learn the power of the hashtag for your business
Entrepreneurs learn the power of the hashtag for your businessEntrepreneurs learn the power of the hashtag for your business
Entrepreneurs learn the power of the hashtag for your business
 
Parsing Natural Scenes and Natural Language with Recursive Neural Networks
Parsing Natural Scenes and Natural Language with Recursive Neural NetworksParsing Natural Scenes and Natural Language with Recursive Neural Networks
Parsing Natural Scenes and Natural Language with Recursive Neural Networks
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
La comida saludable
La comida saludableLa comida saludable
La comida saludable
 
Diapositiva nutricion
Diapositiva nutricionDiapositiva nutricion
Diapositiva nutricion
 
Presentacion de power point (la dieta saludable) elvimar salazar
Presentacion de power point (la dieta saludable) elvimar salazarPresentacion de power point (la dieta saludable) elvimar salazar
Presentacion de power point (la dieta saludable) elvimar salazar
 
Trading Up The Chain: How To Make National News in 3 Easy Steps (Excerpt from...
Trading Up The Chain: How To Make National News in 3 Easy Steps (Excerpt from...Trading Up The Chain: How To Make National News in 3 Easy Steps (Excerpt from...
Trading Up The Chain: How To Make National News in 3 Easy Steps (Excerpt from...
 
Four Revealing Insights into the Customer Support Industry for 2016
Four Revealing Insights into the Customer Support Industry for 2016Four Revealing Insights into the Customer Support Industry for 2016
Four Revealing Insights into the Customer Support Industry for 2016
 

Más de Hitoshi Kokumai

Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Hitoshi Kokumai
 

Más de Hitoshi Kokumai (16)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

How strong or weak is the picture password?

  • 1. Picture PasswordPicture Password - How strong or weak is it?- How strong or weak is it? It could be as weak as the weakest textual password and could be so strong as to resist offline brute force attacks. All depends on how it is operated. 5th January, 2016 Mnemonic Security, Inc., Japan/UK
  • 2. Brute Force Attack & Picture PasswordBrute Force Attack & Picture Password The picture password could be as weak as the weakestThe picture password could be as weak as the weakest text password if operated carelessly or naively.text password if operated carelessly or naively. So could an Expanded Password System that acceptsSo could an Expanded Password System that accepts pictures as well as characters.pictures as well as characters. When, however, operated with some tweaks, the pictureWhen, however, operated with some tweaks, the picture password could provide the level of strength that canpassword could provide the level of strength that can resist the offline brute force attacks without inflictingresist the offline brute force attacks without inflicting heavy burdens on users.heavy burdens on users.
  • 3. how?how? Assuming that a 40-bit random dataAssuming that a 40-bit random data (password-component) be allocated to(password-component) be allocated to each image, picking up 4 or 6 imageseach image, picking up 4 or 6 images from among the matrix would result infrom among the matrix would result in a password of 160 or 240-bit entropy.a password of 160 or 240-bit entropy. Produced from such materials, the hashed value would be large enoughProduced from such materials, the hashed value would be large enough against the offline brute force attacks, particularly effective when theagainst the offline brute force attacks, particularly effective when the password-components are stored separately from the rest of the data,password-components are stored separately from the rest of the data, most preferably between the servers on the network and the devices inmost preferably between the servers on the network and the devices in the users’ hands.the users’ hands.
  • 4. andand Criminals, who want to produce a rainbow-table for a shortcut attack,Criminals, who want to produce a rainbow-table for a shortcut attack, would need to steal both of the two groups of data stored separately.would need to steal both of the two groups of data stored separately. Should it happen, it could be no more than an isolated case. When theShould it happen, it could be no more than an isolated case. When the criminals get to obtain more powerful computers, we could then makecriminals get to obtain more powerful computers, we could then make password-components larger.password-components larger. As for the online attack, we can thwart it by simply locking the accountAs for the online attack, we can thwart it by simply locking the account when the numbers of failed attempts reach the pre-set threshold. Sowhen the numbers of failed attempts reach the pre-set threshold. So we do not need to bother too much about the mathematical strengthwe do not need to bother too much about the mathematical strength about online BF attacks, although it goes without saying that the higherabout online BF attacks, although it goes without saying that the higher the better, i.e. it would be recommended to register more of the imagesthe better, i.e. it would be recommended to register more of the images from among the larger matrix of images, where security, notfrom among the larger matrix of images, where security, not convenience, matters more.convenience, matters more.
  • 5. thereforetherefore Coupled with the features of being hard-to-forget andCoupled with the features of being hard-to-forget and removing the burden of remembering the relationsremoving the burden of remembering the relations between the accounts and the corresponding passwords,between the accounts and the corresponding passwords, Expanded Password System, when carefully operated,Expanded Password System, when carefully operated, could hit the best possible balance between the securitycould hit the best possible balance between the security and the convenience.and the convenience. It could also make ID federation schemes more secure,It could also make ID federation schemes more secure, multi-factor schemes yet more secure and biometricsmulti-factor schemes yet more secure and biometrics schemes less insecure.schemes less insecure. Thank youThank you
  • 6. thereforetherefore Coupled with the features of being hard-to-forget andCoupled with the features of being hard-to-forget and removing the burden of remembering the relationsremoving the burden of remembering the relations between the accounts and the corresponding passwords,between the accounts and the corresponding passwords, Expanded Password System, when carefully operated,Expanded Password System, when carefully operated, could hit the best possible balance between the securitycould hit the best possible balance between the security and the convenience.and the convenience. It could also make ID federation schemes more secure,It could also make ID federation schemes more secure, multi-factor schemes yet more secure and biometricsmulti-factor schemes yet more secure and biometrics schemes less insecure.schemes less insecure. Thank youThank you