SlideShare una empresa de Scribd logo
1 de 18
An Analysis of the Alternatives to
Traditional Static Alphanumeric
Passwords
Mahmoud Abaza and Brent Hunter
School of Computing and Information Systems, Athabasca
University
mahmouda@athabascau.ca
Alphanumeric Passwords:
easy to implement, easy to use,
and versatile.
Weakness of Alphanumeric
Passwords: users use weak
passwords.
Example ideas to overcome weakness of
Alphanumeric Passwords:
•password haystacks system (Gibson)
•system of using 4 or more unrelated
dictionary words (Munroe)
An average person may have
to log in to 8 or more systems
over the course of a day, and
will probably use the same
password for more than one of
them
• Enhancements for traditional
alphanumeric passwords.
• Replacements for traditional
Alphanumeric Passwords.
Enhancements for traditional
alphanumeric passwords.
.• enhanced password creation
mechanisms,
• password storage and management
systems
• single sign on systems,
• secondary identity verification
Replacements for Traditional
Alphanumeric Passwords.
• one-time password systems
• Token-Based, and Tokenless (email, SMS)
• Certificate-based.
• Biometrics.
Enhancements for traditional alphanumeric passwords
& Replacements for traditional Alphanumeric
Passwords.
•How easy to use
•How easy to implement
•How secure
•How versatile.
Replacement: One-Time password
•Not Easy to use (requires a token)
•Not easy to implement(requires back-end
authentication infrastructure)
•Not easy to share.
Replacement: Certificate based (smart
cards and computer certificate)
•Not Easy to use (requires a smart card)
•Significantly more overhead.
•Less versatile (requires a reader).
Replacement: Biometrics.
•Difficult to implement (requires hw and
sw at endpoints)
•Once forged, it is not easy to re-issue.
•False negatives.
•Not versatile (require additional hw.)
Replacement: Non-alphanumeric.
•Graphical passwords are not easy to enter
•More difficult o implement (many require
backend authentication).
•Most require agent installed on each
machine.
•Other such difficulties.
Enhancement: Password creation
mechanism.
•Algorithms to derive passwords (slower).
•Not friendly.
Enhancement: Password storage and
management.
•Single point failure.
•Difficult to use (requires form filler on the
user’s side)
•More difficult to implement.
•Needs updating.
Enhancement: Single Sign On.
•Single point failure.
•Requires additional administrative work.
•Not versatile (Systems must provide
single sign on standard) .
Properly picked traditional alphanumeric
passwords currently work better than any
of the other available options?????
CONCLUSION
Properly picked traditional alphanumeric
passwords currently work better than any
of the other available options?????

Más contenido relacionado

Destacado

Oficina drupal - Temas Drupal (Theming)
Oficina drupal - Temas Drupal (Theming)Oficina drupal - Temas Drupal (Theming)
Oficina drupal - Temas Drupal (Theming)jolidog
 
Презентация по европейской интеграции
Презентация по европейской интеграцииПрезентация по европейской интеграции
Презентация по европейской интеграцииPiotr Klimaszewski
 
The selena's
The selena'sThe selena's
The selena'sgzorskas
 
Moonupdated
MoonupdatedMoonupdated
MoonupdatedChad
 
Drug Addiction NICE Guidelines
Drug Addiction NICE GuidelinesDrug Addiction NICE Guidelines
Drug Addiction NICE GuidelinesPk Doctors
 
Millat ibrahim - Abu Muhammad Maqdisi
Millat ibrahim - Abu Muhammad MaqdisiMillat ibrahim - Abu Muhammad Maqdisi
Millat ibrahim - Abu Muhammad Maqdisiguest647712b0
 
Poster printing
Poster printingPoster printing
Poster printingmoseleb
 

Destacado (11)

Oficina drupal - Temas Drupal (Theming)
Oficina drupal - Temas Drupal (Theming)Oficina drupal - Temas Drupal (Theming)
Oficina drupal - Temas Drupal (Theming)
 
Презентация по европейской интеграции
Презентация по европейской интеграцииПрезентация по европейской интеграции
Презентация по европейской интеграции
 
The selena's
The selena'sThe selena's
The selena's
 
Moonupdated
MoonupdatedMoonupdated
Moonupdated
 
Drug Addiction NICE Guidelines
Drug Addiction NICE GuidelinesDrug Addiction NICE Guidelines
Drug Addiction NICE Guidelines
 
Patinatge
PatinatgePatinatge
Patinatge
 
Kingdom nomics book-131205
Kingdom nomics book-131205Kingdom nomics book-131205
Kingdom nomics book-131205
 
Millat ibrahim - Abu Muhammad Maqdisi
Millat ibrahim - Abu Muhammad MaqdisiMillat ibrahim - Abu Muhammad Maqdisi
Millat ibrahim - Abu Muhammad Maqdisi
 
Poster printing
Poster printingPoster printing
Poster printing
 
P1111338292
P1111338292P1111338292
P1111338292
 
P1111410320
P1111410320P1111410320
P1111410320
 

Similar a P1141218183

CNIT 129S - Ch 6a: Attacking Authentication
CNIT 129S - Ch 6a: Attacking AuthenticationCNIT 129S - Ch 6a: Attacking Authentication
CNIT 129S - Ch 6a: Attacking AuthenticationSam Bowne
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applicationsAmit Kejriwal
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Cloud patterns forwardjs April Ottawa 2019
Cloud patterns forwardjs April Ottawa 2019Cloud patterns forwardjs April Ottawa 2019
Cloud patterns forwardjs April Ottawa 2019Taswar Bhatti
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.pptajajkhan16
 
Cloud Design Patterns - Hong Kong Codeaholics
Cloud Design Patterns - Hong Kong CodeaholicsCloud Design Patterns - Hong Kong Codeaholics
Cloud Design Patterns - Hong Kong CodeaholicsTaswar Bhatti
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
Static Analysis Primer
Static Analysis PrimerStatic Analysis Primer
Static Analysis PrimerCoverity
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resourcesmamboxena
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationSam Bowne
 
474 Password Not Found
474 Password Not Found474 Password Not Found
474 Password Not FoundCodemotion
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaOlajide Kuku
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 

Similar a P1141218183 (20)

CNIT 129S - Ch 6a: Attacking Authentication
CNIT 129S - Ch 6a: Attacking AuthenticationCNIT 129S - Ch 6a: Attacking Authentication
CNIT 129S - Ch 6a: Attacking Authentication
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Cloud patterns forwardjs April Ottawa 2019
Cloud patterns forwardjs April Ottawa 2019Cloud patterns forwardjs April Ottawa 2019
Cloud patterns forwardjs April Ottawa 2019
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
 
Cloud Design Patterns - Hong Kong Codeaholics
Cloud Design Patterns - Hong Kong CodeaholicsCloud Design Patterns - Hong Kong Codeaholics
Cloud Design Patterns - Hong Kong Codeaholics
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Static Analysis Primer
Static Analysis PrimerStatic Analysis Primer
Static Analysis Primer
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resources
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking Authentication
 
474 Password Not Found
474 Password Not Found474 Password Not Found
474 Password Not Found
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
zzzzzzzz
zzzzzzzzzzzzzzzz
zzzzzzzz
 
Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthautha
 
Continuous Platformization
Continuous PlatformizationContinuous Platformization
Continuous Platformization
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 

Más de Ashraf Aboshosha (20)

P1151351311
P1151351311P1151351311
P1151351311
 
P1151345302
P1151345302P1151345302
P1151345302
 
P1121352313
P1121352313P1121352313
P1121352313
 
P1121340296
P1121340296P1121340296
P1121340296
 
P1121340294
P1121340294P1121340294
P1121340294
 
P1151442348
P1151442348P1151442348
P1151442348
 
P1151442347
P1151442347P1151442347
P1151442347
 
P1151439345
P1151439345P1151439345
P1151439345
 
P1151424332
P1151424332P1151424332
P1151424332
 
P1151423331
P1151423331P1151423331
P1151423331
 
P1151420328
P1151420328P1151420328
P1151420328
 
P1151418327
P1151418327P1151418327
P1151418327
 
P1151404314
P1151404314P1151404314
P1151404314
 
P1111351312
P1111351312P1111351312
P1111351312
 
P1111444352
P1111444352P1111444352
P1111444352
 
P1111440346
P1111440346P1111440346
P1111440346
 
P1111431335
P1111431335P1111431335
P1111431335
 
P1111410321
P1111410321P1111410321
P1111410321
 
P1111350310
P1111350310P1111350310
P1111350310
 
P1111348307
P1111348307P1111348307
P1111348307
 

P1141218183