Abstract

Proactive password checkers have been widely used to persuade users to select stronger passwords by providing machine-generated strength ratings of passwords. If such ratings do not match human-generated ratings of human users, there can be a loss of trust in PPCs. In order to study the effectiven

Highlights

  • Passwords have been dominating user authentication for more than half a century and many researchers believe that they will continue to represent a key part of user authentication in the foreseeable future, many security and usability problems have been identified and a lot of new user authentication systems have been proposed over the years [1, 2].Security problems of passwords are often caused by insecure behaviors of human users [1, 3, 4]

  • As users’ trust can be important in predicting to what extent people rely on proactive password checkers (PPCs) to make decisions about password choices, our work focuses on the effect of trust on human decision-making in the context of password ratings

  • The results show that human-generated rating believers (P1) and balanced believers (P3) are more likely to select human-generated ratings over machinegenerated ratings compared to the disbelievers (P4)

Read more

Summary

Introduction

Security problems of passwords are often caused by insecure behaviors of human users [1, 3, 4]. To help users create stronger passwords, proactive password checkers (PPCs), called password (strength) meters by some researchers, have been widely used to encourage users to create stronger passwords by giving users real-time feedback on password strength [5]. All PPCs show a strength rating when a given password is entered by the user. Most widely used PPCs are based on simple heuristic approaches (i.e., password length and composition) to rate a password’s strength [6]. The strength rating is either a categorical value such as “weak”, “medium” or “strong” [8], or a numeric value such as an estimate of the password entropy [9], or the estimated guess number/time for the password being cracked [10]

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.