Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.5.1235

A Study of Interpretation Effect of Passwords to Password Generation  

Kim, Seung-Yeon (Graduate school of Information, Yonsei University)
Kwon, Taekyoung (Graduate school of Information, Yonsei University)
Abstract
The purpose of this study was to find if the password composition of domestic users is affected by the different form of the word 'Password' in the interface of login or password change. In particular, 'Password', foreign notation, and 'Secret Number', notation translated by Korean, have a semantic difference. According to the survey of 200 students in S university, passwords made under the word 'Secret Number' are heavy on numbers than alphabet. Because these passwords make much smaller composition space than another case, they have bad security impact. We expect to make use of this paper as a base line data for study to find how improve domestic user's password security.
Keywords
Password; Secret Number; Number-oriented password;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Bonneau, "The science of guessing: analyzing an anonymized corpus of 70 million passwords," Proceedings of the 33th IEEE Symposium on Security and Privacy, pp. 538-552, May. 2012.
2 X.de.C.de Carnavalet, and M. Mannan, "From very weak to very strong: Analyzing password-strength meters," Proceedings of the Network and Distributed System Security Symposium, Feb. 2014.
3 A. Das and J. Bonneau, "The tangled web of password reuse," Proceedings of the Network and Distributed System Security Symposium, Feb. 2014.
4 M. Just and D. Aspinall, "Personal choice and challenge questions: a security and usability assessment," Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 8, July. 2009.
5 Jinkook Joo, "A Contrastive Semantic Analysis of English and Korean News Terminology," The Journal of translation studies, 12(3), pp. 263-279, Sep. 2011.
6 Jongki Kim and Dayeon Kang, "A Study on the Factors Affecting the Information Systems Security Effectiveness of Password," Asia Pacific Journal of Information Systems, 18(4), pp. 1-26, Dec. 2008.   DOI
7 Wonwoo Lee, Statistics clearly written, Pakyoungsa, pp. 157-172, Sep. 2009.
8 R. Shay, S. Komanduri, A.L. Durity, P. Huh, M.L. Mazurek, S.M. Segreti, B. Ur, L. Bauer, N. Christin, and F. Cranor "Can long passwords be secure and usable?," Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pp. 2927-2936, Apr. 2014.
9 R. Shay, S. Komanduri, P.G. Kelley, P.G. Leon, M.L. Mazurek, L. Bauer, N. Christin, and L.F. Cranor "Encountering stronger password requirements: user attitudes and behaviors," Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 2:1-2:20, July. 2010.
10 E. Stobert and R. Biddle, "The password life cycle: user behaviour in managing passwords," Proceedings of the Symposium on Usable Privacy and Security, pp. 243-255, July. 2014.
11 R. Veras, C. Collins, and J. Thorpe, "On the semantic patterns of passwords and their security impact," Proceedings of Network and Distributed System Security Symposium, Feb. 2014.
12 B. Ur, F. Noma, J. Bees, S.M. Seqreti, R. Shay, L. Bauer, N. Christin, and L.F. Cranor, ""I Added '!' at the End to Make It Secure":Observing Password Creation in the Lab," Proceeding of the 11th Annual Symposium on Usable Privacy and Security, pp. 123-140, July. 2015.