The Usability of Passphrases for Authentication: An Empirical Field Study
Author(s): Mark Keith, Benjamin Shao, Paul John Steinbart

Date: January 2007
Publication: International Journal of Human-Computer Studies, Vol 65, Issue 1
Page(s): 17 - 28
Publisher: Elsevier
Source 1: http://dx.doi.org/10.1016/j.ijhcs.2006.08.005 - Subscription or payment required
Source 2: http://aisel.aisnet.org/jais/vol10/iss2/2/ - Subscription or payment required

Abstract or Summary:
In developing password policies, IT managers must strike a balance between security and memorability. Rules that improve structural integrity against attacks may also result in passwords that are difficult to remember. Recent technologies have relaxed the 8-character password constraint to permit the creation of longer pass-“phrases” consisting of multiple words. Longer passphrases are attractive because they can improve security by increasing the difficulty of brute-force attacks and they might also be easy to remember. Yet, no empirical evidence concerning the actual usability of passphrases exists. This paper presents the results of a 12-week experiment that examines users’ experience and satisfaction with passphrases. Results indicate that passphrase users experienced a rate of unsuccessful logins due to memory recall failure similar to that of users of self-generated simple passwords and stringent passwords. However, passphrase users had more failed login attempts due to typographical errors than did users of either simple or highly secure passwords. Moreover, although the typographical errors disappeared over time, passphrase users’ initial problems negatively affected their end-of-experiment perceptions.



Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index





[Home] [About Us] [News] [Research]

Copyright © 2016 PasswordResearch.com