EN
A Dynamic Method and Program for Multiple Password Generation and Management
Abstract
Authentication is a process that users must do first to gain access to the websites/services they receive service from. Today, the most common method used for authentication is still text-based passwords. But, some difficulties/problems are encountered in the use of passwords for authentication. One of the difficulties is that users must use a separate and strong (cannot be guessed easily and hard to remember) password for each different website. Unfortunately, rather than using distinct passwords, users generally prefer to use the same password or similar passwords for different services. This leads to security vulnerabilities. Therefore, there is a need for a method/program that will enable easy and secure management of many strong passwords. In this study, a dynamic method and program is proposed to solve this problem. This method and program, inspired by the Chinese Remainders Theorem (CRT), simplifies the generation and management of multiple passwords. With this program, many individual passwords can be generated from a single unique password. Both the unique password and the individual passwords are not stored anywhere. The only thing users need to remember is the unique password, and in our method, long but easy-to-remember unique passwords can be used safely. Although inspired by the CRT, our method is not based on the CRT. CRT is only used in the security analysis of our method.
Keywords
References
- W. A. S. A. Alothman, “Evaluating Passwords User Behavior and the Psychology of Password Management”, International Journal of Engineering and Computer Science, 8(04), 24586–24602, 2019.
- E. Stobert, R. Biddle, “The password life cycle”, ACM Transactions on Privacy and Security (TOPS), 21(3), 1-32, 2018.
- P. Arias-Cabarcos, et. al., “Comparing password management software: toward usable and secure enterprise authentication”, IT Professional, 18(5), 34-40, 2016.
- Y. Y. Choong, “A cognitive-behavioral framework of user password management lifecycle”, In International Conference on Human Aspects of Information Security, Privacy, and Trust, Springer, Cham, 127-137, June 2014.
- E. Stobert, R. Biddle, “Expert password management”, In International Conference on Passwords, Springer, Cham, 3-20, December 2015.
- B. E. Ur, Supporting password-security decisions with data, PhD Thesis, Carnegie Mellon University, 2016.
- C. Shen, et. al., “User practice in password security: An empirical study of real-life passwords in the wild”, Computers & Security, 61, 130-141, 2016.
- A. H. Karp, Site-specific passwords, HP Laboratories, Palo Alto, Tech. Rep., May 2003.
Details
Primary Language
English
Subjects
Software Testing, Verification and Validation
Journal Section
Research Article
Publication Date
December 31, 2021
Submission Date
December 3, 2021
Acceptance Date
December 28, 2021
Published in Issue
Year 2021 Volume: 1 Number: 2
