Windows 8 security takes on different strokes

Powered by SC Magazine
 

Line beats circle, circle beats dot.

Windows 8 has been outfitted with a password gesture log-in platform that Microsoft says is tough to crack.

Zack Pace

The scheme uses circles, lines and dots defined by users and mapped on images as a replacement for text passwords.

Microsoft said the patterns were easier for users to memorise and more complex than text passwords.

The minimum three gestures required could produce a billion possible unique combinations compared to a three digit “complex” password that could generate 81 thousand combinations, Microsoft program manager Zach Pace said.

And the numbers scale. A gesture password that includes five shapes could produce 398 trillion combinations while a five character complex password would produce 183 million combinations.

A combination is authenticated if the inputted gestures are 90 per cent accurate.

Gesture accuracy score

Lines had more combinations than circles, while dots had the least.

Microsoft binned plans to allow free form design which would introduce more entropy because field tests revealed users stuggled to duplicate gestures.

They also spent too long attempting to pefecting mimic gestures instead of faster swipes used in the current system.

The system can be set to accept text passwords and will fail over to the format after five incorrect gesture guesses.

While the numbers look impressive, it raises the possibility that attackers could watch users input gestures from “points of interest” – like noses, eyes and hands.

But Pace said mimicking “points of interest” does not work in practice.

“The areas people chose and the kind of gestures they drew upon them correlated very poorly in the lab,” he said.

“Assuming the average image has 10 points of interest, and a gesture sequence length of three, there are 8 million possible combinations, making the prospect of guessing the correct sequence within five tries fairly remote.”

Following smudge marks for touchscreen devices fails too. Even in perfect conditions where only password smudges remain, each gesture could be swiped differently.

Copyright © SC Magazine, Australia


Windows 8 security takes on different strokes
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Pass on carbon tax savings, warns ACCC
Jul 24, 2014
The ACCC is warning businesses that supply "regulated goods" to pass on any cost savings ...
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1079

Vote