Publication | Closed Access
Personal choice and challenge questions
97
Citations
13
References
2009
Year
Unknown Venue
EngineeringUsable SecurityBehavioral Decision MakingInformation SecurityChoice TheoryMainstream Authentication SolutionsCommunicationAutonomySocial SciencesHardware SecurityChoice ModelChoice-process DataDecision TheoryYouthful MemoriesBehavioral SciencesChallenge QuestionsIdentity-based SecurityUser ExperienceData PrivacyComputer ScienceData SecurityCryptographyPersonal ChoiceAttack ModelSoftware TestingSecuritySecurity Measurement
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This paper reports on an experimental investigation into user-chosen questions. We collected questions from a large cohort of students, in a way that encouraged participants to give realistic data. The questions allow us to consider possible modes of attack and to judge the relative effort needed to crack a question, according to an innovative model of the knowledge of the attacker. Using this model, we found that many participants were likely to have chosen questions with low entropy answers, yet they believed that their challenge questions would resist attacks from a stranger. Though by asking multiple questions, we are able to show a marked improvement in security for most users. In a second stage of our experiment, we applied existing metrics to measure the usability of the questions and answers. Despite having youthful memories and choosing their own questions, users made errors more frequently than desirable.
| Year | Citations | |
|---|---|---|
Page 1
Page 1