Cognitive password

A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity. Cognitive password systems have been researched for many years and are currently commonly used as a form of secondary access. They were developed to overcome the common memorability vs. strength problem that exists with the traditional password. Cognitive passwords, when compared to other password systems, can be measured through the usage of a memorability vs. guessability ratio.[1]

History

Research on passwords as an authentification method has struggled between memorability and strong security.[2] Passwords that are easily remembered are easily cracked by attackers. On the other hand strong passwords are difficult to crack but also difficult to remember.[3] When passwords are difficult to remember, users may write them down, and the secrecy of the password is compromised.[4] Early research into this tradeoff between security and usability aimed to develop a password system that utilized easily remembered personal facts and encouraged user participation. This line of research resulted in the concept of the associative password, a password system based on user selected cues and responses.[5] This concept of associative passwords was extended to a pre-specified set of questions and answers that users would be expected to know and could easily recall.[6]

Cognitive questions

At the core of a cognitive password system lies the questions. These questions were designed to be more memorable than the standard username/password authentication method. As such, a measure of the strength of a cognitive password is the memorability/guessability ratio.[7]

Question Development

Questions developed for cognitive password systems are classified as being either fact or opinion based. Fact based systems have questions with answers that are considered independent of an individual's feelings such as "What is the name of the high school you attended?". Opinion based questions are the opposite and, as the name implies, have answers based on personal opinions such as, "What is your favorite color?"[2] Later research developed a set of criteria for question selection which included generalized answerability, number of potential answers, and generalized lack of ambiguity. The first criteria suggested that questions should be answerable by all (i.e. not asking "When did you purchase your first home?" because not all users may have purchased homes). The second criteria recommended selecting questions with a sufficiently large set of potential answers (i.e. not asking "How many children do you have?" because a majority of people would answer 0, 1 or 2). The final criteria looked for questions that were as unambiguous as possible (i.e. not asking "How many family members do you have?" as there may be some confusion as to who would be included in that count).[8]

Memorability vs. guessability

A user's ability to correctly recall their password is expected to decrease as time progresses.[9] However, the memorability of cognitive passwords remains relatively stable over time with recall rates significantly higher than traditional passwords.[10][11] When fact and opinion-based questions are compared, the fact-based questions are more likely to be correctly remembered than opinion-based questions, but still far more likely than traditional passwords.[10] Cognitive questions, with a group averaged as a whole, show relatively high guessability, much higher than traditional passwords but when analyzed individually, certain questions have been shown to have acceptable memorability/guessability ratios.[10]

Examples

The following are some typical cognitive password questions:

References

  1. Shon Harris (2002). "2". Mike Meyers' CISSP(R) Certification Passport. Mike Meyers' certification passport Passport Series (illustrated ed.). McGraw-Hill Professional. p. 36. ISBN 978-0-07-222578-5.
  2. 1 2 (Zviran and Haga, 1990a, p. 724)
  3. (Zviran and Elrich, 2006, p. 93)
  4. (Zviran and Haga, 1999, p. 173)
  5. (Smith, 1987)
  6. (Zviran and Haga, 1990a, p.723)
  7. (Bunnell et. al, 1997, p. 631)
  8. (Bunnell et. al, 1997, p. 633)
  9. (Brown et al., 2004, p. 642)
  10. 1 2 3 (Bunnell et. al, 1997, p. 635)
  11. (Zviran and Haga, 1990a, p.728)

Works cited

External links

This article is issued from Wikipedia - version of the Tuesday, December 15, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.