Moving towards two dimensional passwords

Sohail Safdar*, Mohd Fadzil Hassan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The main objective of the research is to specify two dimensional passwords that can possess much more strength as compared to linear passwords. These passwords are strong enough to provide effective and secure authentication under certain alarming situations. The alarming situations are the situations where the possibility to breach the system security exists. The specification of the two dimensional nxn passwords has been provided based on NIST standards. The strength of nxn password has been calculated that has proven to be much more as compared to the linear passwords. It is proposed that these passwords should be used under alarming situations such as the protection requirement for some critical resource, special authentication when the system is in unsafe state or protection of sensitive data. Therefore it has been recommended to move from linear passwords to the passwords defined in two dimensional space, whenever some alarming situation arises.

Original languageEnglish
Title of host publicationProceedings of the 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages891-896
Number of pages6
Volume2
ISBN (Electronic)9781424467181
ISBN (Print)9781424467150
DOIs
Publication statusPublished - 2 Sept 2010
Event2010 International Symposium on Information Technology, ITSim'10 - Kuala Lumpur, Malaysia
Duration: 15 Jun 201017 Jun 2010

Publication series

NameProceedings 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10
PublisherIEEE
ISSN (Print)2155-8973
ISSN (Electronic)2155-899X

Conference

Conference2010 International Symposium on Information Technology, ITSim'10
Country/TerritoryMalaysia
CityKuala Lumpur
Period15/06/1017/06/10

Keywords

  • alarming situations
  • brute-force attacks
  • entropy
  • linear passwords
  • NIST standards
  • nxn passwords

Cite this