Optimising password security through key-pattern analysis

  • Authors:
  • Ravel Jabbour;Wes Masri;Ali El-Hajj

  • Affiliations:
  • Department of Computer and Communications Engineering, American University of Beirut, Beirut, Lebanon.;Computer Science Department, American University of Beirut, Beirut, Lebanon.;Department of Computer and Communications Engineering, American University of Beirut, Beirut, Lebanon

  • Venue:
  • International Journal of Internet Technology and Secured Transactions
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

No security mechanism has been deemed secure enough. Thus, the research into application security has ventured into the alternative technologies that consider the user aspects of implementation. In this paper, we present an enhanced approach to password security based on Key-Pattern Analysis (KPA). Our approach relies on its two focal pillars, inter and intra timing, which are stretched along the lines of increasing password entropy, trouncing the habit factor and finally, trimming down the error margin under an appropriate user-fitting technique. Other user optimisation techniques include token authentication and character-sound recognition. By serving notice as to the immense power of intra timing in reliable authentication, we amount to the development of beat-like passwords as a means of strengthening the overall KPA mechanism.