Advanced SearchSearch Tips
Automatic Fortified Password Generator System Using Special Characters
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Automatic Fortified Password Generator System Using Special Characters
Jeong, Junho; Kim, Jung-Sook;
  PDF(new window)
The developed security scheme for user authentication, which uses both a password and the various devices, is always open by malicious user. In order to solve that problem, a keystroke dynamics is introduced. A person's keystroke has a unique pattern. That allows the use of keystroke dynamics to authenticate users. However, it has a problem to authenticate users because it has an accuracy problem. And many people use passwords, for which most of them use a simple word such as "password" or numbers such as "1234." Despite people already perceive that a simple password is not secure enough, they still use simple password because it is easy to use and to remember. And they have to use a secure password that includes special characters such as "#!()^". In this paper, we propose the automatic fortified password generator system which uses special characters and keystroke feature. At first, the keystroke feature is measured while user key in the password. After that, the feature of user's keystroke is classified. We measure the longest or the shortest interval time as user's keystroke feature. As that result, it is possible to change a simple password to a secure one simply by adding a special character to it according to the classified feature. This system is effective even when the cyber attacker knows the password.
Keystroke dynamics;User authentication;Fortified password;Special character;Delayed interval;
 Cited by
R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, "Authentication by keystroke timing: some preliminary results," Rand Corporation, Santa Monica, CA, Report No. RAND-R-2526-NSF, 1980.

M. Obaidat and S. Sadoun, "Verification of a computer user using keystroke dynamics," IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, vol. 27, no. 2, pp. 262-269, 1997. crossref(new window)

P. Kang, S. Park, S. Cho, S. S. Hwang, and H. J. Lee, "The effectiveness of artificial rhythms and cues in keystroke dynamics based user authentication," in Proceedings of International Workshop on Intelligence and Security Informatics, Singapore, 2006, pp. 161-162. 22

S. S. Hwang, S. Cho, and S. Park, "Keystroke dynamicsbased authentication for mobile devices," Computers & Security, vol. 28, no. 1, pp. 85-93, 2009. crossref(new window)

D. Gunetti and C. Picardi, "Keystroke analysis of free text," ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312-347, 2005. crossref(new window)

F. Monrose and A. D. Rubin, "Keystroke dynamics as a biometric for authentication," Future Generation Computer Systems, vol. 16, no. 4, pp. 351-359, 2000. crossref(new window)

D. Shanmugapriya and G. Padmavathi, "A survey of biometric keystroke dynamics: approaches, security and challenges," International Journal of Computer Science and Information Security, vol. 5, no. 1, pp. 115-119, 2009.

S. Hocquet, J. Y. Ramel, and H. Cardot, "User classification for keystroke dynamics authentication," in Advances in Biometrics, S. W. Lee and S. Z. Li, Eds. Berlin: Springer, 2007, pp. 531-539. 56

L. C. Araujo, L. H. Sucupira, M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-Uti, "User authentication through typing biometrics features," IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 851-855, 2005. crossref(new window)

P. Campisi, E. Maiorana, M. Lo Bosco, and A. Neri, "User authentication using keystroke dynamics for cellular phones," IET Signal Processing, vol. 3, no. 4, pp. 333-341, 2009. crossref(new window)

J. Jeong and J. S. Kim, "Development of the fortified automatic password generator system," Advanced Science and Technology Letters, vol. 58, pp. 63-66, 2014. crossref(new window)