Survey of user authentication mechanisms

Approved for public release; distribution is unlimited === The use of a password as the only traditional user authentication mechanism has been criticized for its weakness in computer security. One problem is for the user to select short, easy to remember passwords. Another problem is the selection...

Full description

Bibliographic Details
Main Author: Magno, Marianna B.
Other Authors: Haga, William J.
Language:en_US
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/9046
Description
Summary:Approved for public release; distribution is unlimited === The use of a password as the only traditional user authentication mechanism has been criticized for its weakness in computer security. One problem is for the user to select short, easy to remember passwords. Another problem is the selection of a password that is too long which the user tends to forget. Long passwords tend to be written down carelessly somewhere in the work space. Such practices can create serious security loopholes. Consequently, this is a survey of alternative password mechanisms and other improved devices that are now available in the marketplace to enhance computer security. It taxonomizes the existing inventory of user authentication mechanisms such as biometrics, challenge/response, password, smart card and token. The use of a password as the only traditional user authentication mechanism has been criticized for its weakness in computer security. One problem is for the user to select short, easy to remember passwords. Another problem is the selection of a password that is too long which the user tends to forget. Long passwords tend to be written down carelessly somewhere in the work space. Such practices can create serious security loopholes. Consequently, this is a survey of alternative password mechanisms and other improved devices that are now available in the marketplace to enhance computer security. It taxonomizes the existing inventory of user authentication mechanisms such as biometrics, challenge/response, password, smart card and token