Hash Visualization : a New Technique to improve Real-World Security

  title={Hash Visualization : a New Technique to improve Real-World Security},
  author={Adrian Perrig and Dawn SongDawn Song},
Current security systems su er from the fact that they fail to account for human factors. This paper considers two human limitations: First, people are slow and unreliable when comparing meaningless strings; and second, people have di culties in remembering strong passwords or PINs. We identify two applications where these human factors negatively a ect security: Validation of root keys in public-key infrastructures, and user authentication. Our approach to improve the security of these systems… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 260 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 176 extracted citations

Can Unicorns Help Users Compare Crypto Key Fingerprints?

CHI • 2017
View 6 Excerpts
Highly Influenced

Direct visualization of cryptographic keys for enhanced security

The Visual Computer • 2017
View 6 Excerpts
Highly Influenced

Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture

Lecture Notes in Computer Science • 2015
View 20 Excerpts
Highly Influenced

Genetic Hash Algorithm

2014 6th International Conference on Computer Science and Information Technology (CSIT) • 2014
View 5 Excerpts
Highly Influenced

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices

IEEE Transactions on Information Forensics and Security • 2013
View 7 Excerpts
Highly Influenced

The Security Analysis of Graphical Passwords

2010 International Conference on Communications and Intelligence Information Security • 2010
View 4 Excerpts
Highly Influenced

261 Citations

Citations per Year
Semantic Scholar estimates that this publication has 261 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 12 references

Gallery of random art

Andrej Bauer
WWW at http://www.cs.cmu.edu/~andrej/art/, • 1998
View 1 Excerpt

The Atomic Components of Thought

John R. Anderson, Christian Lebiere
Lawrence Erlbaum Associates, Inc., • 1998
View 1 Excerpt

Why Cryptosystems Fail

ACM Conference on Computer and Communications Security • 1993
View 1 Excerpt

Handbook of Perception and Human Performance

Kenneth R. Bo, Lloyd Kaufman, James P. Thomas
View 2 Excerpts

The model human processor

Stuart K. Card, Thomas P. Moran, Allen Newell
Handbook of Perception and Human Performance, • 1986
View 1 Excerpt

The e ect of background luminance and contrast upon visual search performance

R. M. Boynton, D. E. Boss
Illuminating Engineering, • 1971
View 1 Excerpt

The e ect of target speci cation on objects xated during visual search

L. G. Williams
Perception and Psychophysics, • 1966
View 1 Excerpt

Similar Papers

Loading similar papers…