RECALLABILITY VERSUS SECURITY TRADE OFF IN AUTHENTICATION SYSTEMS

Authors

  • Sukhjeet Singh Assistant Professor, Postgraduate Department of Computer Science and Applications, Trai Shatabdi Sri Guru Gobind Singh Khalsa College, Amritsar, Punjab, India. Author

Keywords:

Recallability, Security, Tradeoff, Authentication System

Abstract

Recallability and security has been main concerns of any authentication system. It has been seen that if authentication system is simple then it provides good recallability but it can be easily vulnerable and vice versa if system is more secure then it is hard to recall. This paper provides very interesting pros. and cons. of both attributes and results that there is almost tradeoff between both features.

References

Dhamija, R and A Perrig (2000) Déjà Vu: A User Study. Using Images for Authentication, Proceedings of the 9th USENIX Security Symposium, August: Denver, Colorado.

US Social Security Administration, “Social Security, Privacy, and Customer Service in the Electronic Age,” 1997, http://www.ssa.gov/reports/service/

R. Morris, K. Thompson, “Password security: A case history,” Comm. ACM , Vol. 22, no. 11, Nov. 1979, pp. 594-597.

B. L. Riddle, M. S. Miron, J. A. Semo, “Passwords in use in a university timesharing environment,” Computers and Security, Vol. 8, no. 7, 1989, pp. 569-579.

D. L. Jobusch, A. E. Oldehoeft, “A survey of password mechanisms: Weaknesses and potential improvements,” Computers and Security, Vol. 8, no. 8, 1989, pp. 675-689.

D.C. Feldmeier and P.R. Karn, “UNIX password security – ten years later,” Advances in Cryptology – CRYPTO ‟89 Proceedings, Springer-Verlag, 1990, pp. 44-63.

J. Bunnell, J. Podd, R. Henderson, R. Napier, J. Kennedy-Moffat, “Cognitive, associative, and conventional passwords: Recall and guessing rates,” Computers and Security, Vol. 16, no. 7, 1997, pp. 645-657.

S. M. Furnell, P. S. Dowland, H. M. Illingworth, P. L. Reynolds, “Authentication and supervision: A survey of user attitudes,” Computers and Security, Vol. 19, no. 6, 2000, pp. 529-539.

Published

2016-02-16

How to Cite

Sukhjeet Singh. (2016). RECALLABILITY VERSUS SECURITY TRADE OFF IN AUTHENTICATION SYSTEMS. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 4(1), 50-54. http://ijrcait.com/index.php/home/article/view/IJRCAIT_04_01_006