TY - GEN
T1 - Quantitative analysis of PIN choices
T2 - 14th European Conference on Cyber Warfare and Security, ECCWS 2015
AU - Carvalho, José Carlos
AU - Sá, Vítor
AU - Magalhães, Maria José
AU - Magalhães, Sérgio Tenreiro de
N1 - Copyright:
Copyright 2015 Elsevier B.V., All rights reserved.
PY - 2015
Y1 - 2015
N2 - The authentication using a PIN number remains one of the most used ways to enter a system (mobile phone, ATM, etc.). Many people seem to dislike this form of authentication because they simply despise their use, placing unsafe PINs just because they have to put some. Some relevant results are the combination 1234, thecombinations using only one digit (example: 1111), or the central line of the numerical keypad. On the other hand there is some understanding because it is proven that remember strong passwords is a difficult task for humans, and the tendency is to choose the simplest ones. This research had a sample of 497 participants and aimed to understand the preferred choice of the participants in relation to the number of digits used for a PIN number (a choice between four and/or six digits) and realized the amount of times that each of the available digits was used. To this end it was developed a web-based tool for entering the data. This application was intended only to the data collection process, being the information processed further. Through this application, the user was asked to enter four and/or six-digit PINs. The method does not raise any doubt on the participants, which were informed about the anonymity and confidentiality of the data, and never they were asked to identify themselves. Participants were asked to use the PINs that they normally use in other contexts. With the analysis of the data it was possible to understand the distribution of digits per position in a PIN, check which digits is more/less used in each position, and check which digit is more/less used regardless of its position. Among the conclusions it appears that the layout of the numeric keypad of the system influence the PIN choice.
AB - The authentication using a PIN number remains one of the most used ways to enter a system (mobile phone, ATM, etc.). Many people seem to dislike this form of authentication because they simply despise their use, placing unsafe PINs just because they have to put some. Some relevant results are the combination 1234, thecombinations using only one digit (example: 1111), or the central line of the numerical keypad. On the other hand there is some understanding because it is proven that remember strong passwords is a difficult task for humans, and the tendency is to choose the simplest ones. This research had a sample of 497 participants and aimed to understand the preferred choice of the participants in relation to the number of digits used for a PIN number (a choice between four and/or six digits) and realized the amount of times that each of the available digits was used. To this end it was developed a web-based tool for entering the data. This application was intended only to the data collection process, being the information processed further. Through this application, the user was asked to enter four and/or six-digit PINs. The method does not raise any doubt on the participants, which were informed about the anonymity and confidentiality of the data, and never they were asked to identify themselves. Participants were asked to use the PINs that they normally use in other contexts. With the analysis of the data it was possible to understand the distribution of digits per position in a PIN, check which digits is more/less used in each position, and check which digit is more/less used regardless of its position. Among the conclusions it appears that the layout of the numeric keypad of the system influence the PIN choice.
KW - Authentication
KW - Digits
KW - Keypad
KW - PIN
KW - Security
KW - System
UR - http://www.scopus.com/inward/record.url?scp=84940734793&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84940734793
SN - 9781910810293
T3 - European Conference on Information Warfare and Security, ECCWS
SP - 35
EP - 41
BT - Proceedings of the 14th European Conference on Cyber Warfare and Security, ECCWS 2015
A2 - Abouzakhar, Nasser
PB - Curran Associates Inc.
Y2 - 2 July 2015 through 3 July 2015
ER -