DMCA
Password Hardening Based on Keystroke Dynamics (1999)
Cached
Download Links
Venue: | International Journal of Information Security |
Citations: | 145 - 8 self |
Citations
4841 |
Pattern classification and scene analysis
- Duda, Hart
- 1973
(Show Context)
Citation Context ... found values D and L that 4 This example also illustrates that the use of pattern classifiers that aim to separate a population given some similarity measure (e.g., linear discriminant analysis; see =-=[7]-=-) would not necessarily yield good results for our purposes. That is, in the example above the distinguishing feature for each account could be used by a classifier to perfectly separate the populatio... |
2576 | How to share a secret
- Shamir
- 1979
(Show Context)
Citation Context ...ction) from Sects. 5 and 6, but will return to this in Sect. 7. 5 An instance usingpolynomials In this section we describe an instance of the technique of Sect. 4 using Shamir’s secret sharing scheme =-=[31]-=-.s74 F. Monrose et al.: Password hardening based on keystroke dynamics In this scheme, hpwda is shared by choosing a random polynomial fa ∈ Zq[x] of degree m − 1 such that fa(0) = hpwda, whereq>2m + 1... |
344 | A Fuzzy Commitment Scheme
- Juels, Wattenberg
(Show Context)
Citation Context .... This makes the careful utilization of keystroke features critical in our setting, whereas in [6] the biometric data considered were presumed independent of the password chosen. Juels and Wattenberg =-=[14]-=- generalized and improved the Davida et al. scheme through a novel modification in the use of error-correcting codes, thereby shrinking the code size and achieving higher resilience. However, since th... |
342 | Improved decoding of Reed-Solomon and algebraic-geometry codes
- Guruswami, Sudan
- 1999
(Show Context)
Citation Context ...ch f. Asymptotically (i.e., as m grows arbitrarily large), it is known that the second case can be distinguished from the first in O(m2 )timeifd≤ (2 − √ 2)m ≈ 0.585m using error-correcting techniques =-=[11]-=-. These techniques do not attack our scheme directly, since our analysis in Sect. 8 suggests that for many reasonable values of k, d will typically be too large relative to m for these techniques to s... |
271 | Password security: A case history.
- Morris, Thompson
- 1979
(Show Context)
Citation Context .... Salting is a method in which the user’s password is prepended with a random number (the “salt”) of s bits in length before hashing the password and comparing the result to a previously stored value =-=[20, 26]-=-. As a result, the search space of an attacker is increased by a factor of 2 s if the attacker does not have access to the salts. However, the correct salt either must be stored in the system or found... |
167 | foiling the cracker” – A survey of, and improvements to, password security.
- Klein
- 1990
(Show Context)
Citation Context ...subset of all possible passwords. In one case study of 14 000 Unix™passwords, almost 25% of the passwords were found by searching for words from a carefully formed “dictionary” of only 3 × 10 6 words =-=[15]-=- (see also [9, 26, ∗ Correspondence to: M. Reiter, Carnegie Mellon University, Hamerschlag Hall D208, Pittsburgh, PA 15213, USA 33, 34]). This high success rate is not unusual despite the fact that th... |
148 |
On enabling secure applications through off-line biometric identification,”
- Davida, Frankel, et al.
- 1998
(Show Context)
Citation Context ...oach is not directly amenable to generating cryptographic keys from timing information. A different approach to generating a repeatable key based on biometric data is due to Davida, Frankel, and Matt =-=[6]-=-. In this scheme, a user carries a portable storage device containing: (1) error-correcting parameters to decode readings of biometric data (e.g., an iris scan) with a limited number of errors to a “c... |
117 | P.van Oorschot and A. Vanstone Handbook of Applied Cryptography - Menezes |
114 | Authentication via keystroke dynamics. - Monrose, Rubin - 1997 |
89 | Entropy measures and unconditional security in cryptography.
- Cachin
- 1997
(Show Context)
Citation Context ...s, because multiple accounts can map to the same total feature descriptor under C. So, in the example of the previous paragraph, all accounts can map to at most two such descriptors. Guessing entropy =-=[5, 21]-=- is a natural way to define the entropy of a cover. Let Img(C)={b |∃a ∈ A : C(a)= b}, and wC(b) =|{a ∈ A |C(a) =b}|/|A|. If we denote Img(C)={b1,... ,bl} such that wC(b1) ≥ wC(b2) ≥ ...≥ wC(bl), then ... |
73 |
CSI/FBI Computer Crime and Security Survey",
- Power
- 2001
(Show Context)
Citation Context ...available keyboard at which the user can type her password, which is the ideal situation for repeated generation of her hardened password. Moreover, with the alarming rate of laptop thefts (e.g., see =-=[28]-=-), these applications demand security better than that provided by traditional passwords. Although we study only the generation of hardened passwords using keystroke patterns in this paper, the techni... |
72 |
Authentication by keystroke timing: Some preliminary results,”
- Gaines
- 1980
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
69 | A real-world analysis of Kerberos password security - WU - 1999 |
59 |
Computer-Access Security Systems using Keystroke Dynamics”,
- Bleha, Slivinsky, et al.
- 1990
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
54 | UNIX password security – ten years later. - Feldmeier, Karn - 1990 |
46 | Noisy Polynomial Interpolation and Noisy Chinese Remaindering.
- Bleichenbacher, Nguyen
- 2000
(Show Context)
Citation Context ...me achieves a degree of resilience to forgotten answers. However, Bleichenbacher and Nguyen have shown that the Ellison et al. scheme is insecure, whereas our constructions appear to be much stronger =-=[2]-=-. In work subsequent to ours, a construction similar to that in Sects. 5.1 and 5.2 was used in the design of a forensic database, where a person’s medical record can be decrypted only once a DNA sampl... |
37 | Secure hash standard. Federal Information Processing Standards Publication 180-1 - FIPS - 1995 |
32 |
Verifying Identity via Keystroke Characteristics”,
- Leggett, Williams
- 1988
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
31 | A simple scheme to make passwords based on oneway functions much harder to crack. Computers and Security
- MANBER
- 1996
(Show Context)
Citation Context .... Salting is a method in which the user’s password is prepended with a random number (the “salt”) of s bits in length before hashing the password and comparing the result to a previously stored value =-=[20, 26]-=-. As a result, the search space of an attacker is increased by a factor of 2 s if the attacker does not have access to the salts. However, the correct salt either must be stored in the system or found... |
31 | Observations on Reusable Password Choices - Spafford - 1992 |
30 | CryptoLib: Cryptography in software. - Lacy, Mitchell, et al. - 1993 |
28 | UNIX password security-Ten years later - Feldmeier, Karn - 1989 |
13 |
Secure private key generation using a fingerprint
- Soutar, Tomko
- 1996
(Show Context)
Citation Context ...cations other than login, such as file encryption. The first work (that we are aware of) that previously proposed generating a repeatable key based on biometric information is due to Soutar and Tomko =-=[32]-=-. This work outlines a technique for using optical computing to generate a cryptographic key from a fingerprint pressed against a glass prism; products based on this technique are marketed by Mytec Te... |
8 |
Verification of user identity via keystroke characteristics
- Leggett, Williams, et al.
- 1989
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
7 |
Password authentication without using password table,” Inform.
- Horng
- 1995
(Show Context)
Citation Context ...the unauthorized modification of system information related to password authentication (e.g., the attacker adds a new account with a password it knows, or changes the password of an existing account) =-=[12, 16, 19]-=-. Here we do not focus on this threat model, although our hardened passwords can be directly combined with these techniques to also provide security against this type of attacker. 3 Preliminaries The ... |
7 | Oorschot PC, Vanstone SA - AJ, Van - 1996 |
4 |
Wetzel S (2001) Cryptographic key generation from voice (extended abstract
- Monrose, MK, et al.
(Show Context)
Citation Context ...omenon for which features can be measured can, in theory, be employed with our techniques to generate cryptographic secrets. Our continuing work, for example, has demonstrated this for voice patterns =-=[24, 25]-=-. 2 Related work The motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and diff... |
2 | Addition chains for large sets - Blelchenbacher |
2 | On enabhng secure ap- phcatmns through off-hne biometrlc identlfieatmn - Davida, Frankel, et al. - 1998 |
2 | Johnson Computers and Intractabzhty A Guide to the Theory of NP-Completeness W H Freeman and - Garey, S - 1979 |
2 | Improved decoding of Reed- Solomon and algebram-geometric codes - Guruswaml, Sudan - 1998 |
2 | Horng Password authentication without using a password table Informatzon Processing Letters 55 - unknown authors - 1995 |
2 | Identity authorization based on keystroke lateneies - Joyce, Gupta - 1990 |
2 | Pass- word authentmatlon using Newton's interpolating polynomials Informatzon Systems 16(1 - Lm - 1991 |
2 | D Umphress Vemfication of user identity via keystroke charactermtlcs Human Factors zn Man- agement Informatzon Systems - Leggett, iams - 1989 |
2 | Massey Guessing and entropy - L - 1994 |
2 | and M Hiron Optm~izmg digraph-latency based biometric typ- ist verification systems rater and mtra typists differences in di- graph latency distmbutions - Mahar, Napmr, et al. - 1995 |
2 | Password secumty A case history - Morms, Thompson - 1979 |
2 | Nash Rising laptop theft tacks on $150 a box ComputerWorld - S |
2 | Observations on reusable password chomes - Spafford |
2 | A real-world analysm of Kerberos password secumty - Wu - 1999 |
1 |
Jakobsson M, Srikwan S (2000) Cryptographic approaches to privacy in DNA databases
- Bohannon
(Show Context)
Citation Context ...to that in Sects. 5.1 and 5.2 was used in the design of a forensic database, where a person’s medical record can be decrypted only once a DNA sample of the person is obtained (e.g., at a crime scene) =-=[3]-=-. Our method of hardening user passwords has conceptual similarities to password “salting” for user logins. Salting is a method in which the user’s password is prepended with a random number (the “sal... |
1 |
Some ideal secret sharing schemes
- EF
- 1989
(Show Context)
Citation Context ...ed on vector spaces We first briefly present the secret sharing scheme based on vector spaces that we use in our construction. Vector-space secret sharing schemes have been studied extensively (e.g., =-=[4]-=-). The scheme presented here is based on similar ideas, though it is tuned for use in our application. For example, this sharing scheme requires no information other than the shares to reconstruct the... |
1 |
Schneier B (2000) Protecting secret keys with personal entropy. Future Gen Comput Syst 16:311–318
- Ellison, Hall, et al.
(Show Context)
Citation Context ...t is unknown whether this technique is more applicable in our setting. Ellison et al. independently developed a method for generating a cryptographic key based on answers to questions posed to a user =-=[8]-=-. The work is premised on the assumption that questions can be posed that the legitimate user will answer one way but others attempting to impersonate the user will answer another way. Their construct... |
1 |
Identity authorization based on keystroke latencies. Comm ACM33:168–176
- Joyce, Gupta
- 1990
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
1 |
Password authentication using Newton’s interpolating polynomials. Inform Syst 16:97–102
- CH, CC, et al.
- 1991
(Show Context)
Citation Context ...the unauthorized modification of system information related to password authentication (e.g., the attacker adds a new account with a password it knows, or changes the password of an existing account) =-=[12, 16, 19]-=-. Here we do not focus on this threat model, although our hardened passwords can be directly combined with these techniques to also provide security against this type of attacker. 3 Preliminaries The ... |
1 |
Cryptographic authentication of time-invariant quantities
- RE, SM, et al.
- 1981
(Show Context)
Citation Context ...the unauthorized modification of system information related to password authentication (e.g., the attacker adds a new account with a password it knows, or changes the password of an existing account) =-=[12, 16, 19]-=-. Here we do not focus on this threat model, although our hardened passwords can be directly combined with these techniques to also provide security against this type of attacker. 3 Preliminaries The ... |
1 |
Guessing and entropy
- JL
- 1994
(Show Context)
Citation Context ...s, because multiple accounts can map to the same total feature descriptor under C. So, in the example of the previous paragraph, all accounts can map to at most two such descriptors. Guessing entropy =-=[5, 21]-=- is a natural way to define the entropy of a cover. Let Img(C)={b |∃a ∈ A : C(a)= b}, and wC(b) =|{a ∈ A |C(a) =b}|/|A|. If we denote Img(C)={b1,... ,bl} such that wC(b1) ≥ wC(b2) ≥ ...≥ wC(bl), then ... |
1 |
Wetzel S (2001) Using voice to generate cryptographic keys
- Monrose, MK, et al.
(Show Context)
Citation Context ...omenon for which features can be measured can, in theory, be employed with our techniques to generate cryptographic secrets. Our continuing work, for example, has demonstrated this for voice patterns =-=[24, 25]-=-. 2 Related work The motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and diff... |
1 |
User identification system based on biometrics for keystroke
- Omote, Okamoto
- 1999
(Show Context)
Citation Context ...uessing entropy is more sensitive to variations in D than in L. Thisisconsistentwith previous works that have found keystroke durations to be more variable among users than keystroke latencies (e.g., =-=[27]-=-). Fig. 5. Guessing entropy as a function of D and L We remind the reader that all of the foregoing analysis is based on a relatively small trial of our techniques: 20 users, 481 logins, and 1 passwor... |
1 |
Cryptography. In: van Leeuwen J (ed) Handbook of theoretical computer science
- RL
- 1990
(Show Context)
Citation Context ...impler variation and then extending it in Sect. 5.4 to be more secure. 5.1 Stored data structures and initialization Let G be a pseudorandom function family and P be a pseudorandom permutation family =-=[29]-=- such that for any key K, GK : Zq → Zq and PK : Z ∗ q → Z∗ q .1 There are three data structures stored in the system per account: 1. A randomly chosen element r ∈{0, 1} κ where κ is a security paramet... |
1 |
Computer user verification using login string keystroke dynamics
- JA, VM, et al.
- 1998
(Show Context)
Citation Context ... motivation for using keystroke features to harden passwords comes from years of research validating the hypothesis that user keystroke features are both highly repeatable and different between users =-=[1, 10, 13, 17, 18, 23, 30]-=-. Prior work has anticipated utilizing keystroke information in the user login process (e.g., [13]), and indeed products implementing this are being marketed today (e.g., see http://www.biopassword.co... |
1 | Authenttcation by keystroke tzmzng. Some prel=mznary results Rand report R-256-NSF Rand Corporation - Games, Lisowski, et al. - 1980 |
1 | C H Meyer Cryptographlc authentication of tlme-mvarlant quantities - Lennon, Matyas - 1981 |
1 | Rivest Cryptography - L - 1990 |
1 | A Chambers and C L MacKenzie Computer user vemfication using login string keystroke dynamics - Robinson, Llang, et al. - 1998 |
1 | Identity verificatmn through keyboard characteristics Internatsonal - Umphress, Williams - 1985 |