Basic Information

Solution Name

CuedR: A Secure and Usable Authentication Scheme

Tagline:

Addressing usability-security tension in user authentication through incorporating context, culture, and language-centric memory cues for secure passwords in developing countries.

Pitch:

Traditional user-chosen textual passwords suffer from security problems because of predictable patterns, which becomes more of a concern for the people with low literacy in developing countries. So, we argue that the burden of password creation should be borne by the system, rather than users, especially for their high-security accounts with identity or financial information. Since system-assigned passwords suffer from poor memorability, we propose a novel password scheme, called CuedR that helps users with the memorization and recall of system-assigned secure passwords.

In CuedR, users are assigned a series of non-repeating keywords. Each keyword has a corresponding picture (graphical cue) and an interesting fact (verbal cue). For example, "Each zebra has a unique pattern of stripes" could be a verbal cue for the keyword: "Zebra". Users are presented with multiple portfolios each containing 16 total keywords, and randomly assigned one keyword from each portfolio. The keyword presented in a portfolio provides spatial cue, since its location in that portfolio remains fixed across registration and login sessions. Users are shown a single-character key for each keyword, and they need to enter that key-letter into a textfield to select that keyword. This key-letter for selecting a keyword, changes across login sessions to provide variant response, which provides higher resilience to shoulder-surfing attack and keystroke loggers, compared to a password system where same letters are entered during every login session.

CuedR offers incremental learning during registration process to incrementally break down the cognitive load, and guide users through a usable process of learning, where each keyword and its cues are introduced to the users in the following order: graphical cue with keyword (step-1), verbal cue (step-2), and spatial cue (steps-3 and-4). We have combined audio and visual information together by including audio cues (through audio-clips) in step-1 (reading the keyword aloud) and in step-2 (reading the verbal cue aloud). A successful authentication requires users to enter the correct key in each of the 'n' portfolios. For n=5 and n=14, CuedR provides 20 bits (resilient to online guessing attacks), and 56 bits of entropy (resilient to both online and offline guessing attacks), respectively. In both cases, we found ~98% login success rate in our lab and field studies conducted in USA.

In this project, we will implement CuedR in Bangladesh, a developing country in South Asia. We chose to use CuedR due to its security level, and its design based on the theories from cognitive psychology to reduce users’ cognitive load and leverage depth of processing effect through providing memory cues and incremental learning, which should be particularly helpful for the people with low literacy (~28% of population in Bangladesh) and limited technical efficacy. We will tailor CuedR to the context, culture, and language of Bangladesh, like using graphical and verbal cues that Bangladeshis are familiar with, and using 'Bangla' (native language) to present the keywords, verbal and audio cues. We will conduct human-subject studies to evaluate the usability and applicability of CuedR in Bangladesh, and further improve the scheme based on our findings. 

Elevator pitch:

Solution location:

Logan, UT, USA

Addresses usability-security tension in user authentication.

Solution's stage of development:

Prototype
About Your Solution

What makes the solution innovative:

Our system-assigned password scheme makes use of humans’ cognitive strengths, and accommodate users with different learning styles. To this end, we draw upon several prominent theories of cognitive psychology to design CuedR, which offers various memory cues to help users to memorize (at registration) and recognize (at login) the system-assigned keywords. Our scheme would be tailored to the culture, context, and language of targeted population (e.g., people in Bangladesh) through using graphical and verbal cues that Bangladeshis are familiar with, and using 'Bangla' (native language in Bangladesh) to present the keywords, verbal and audio cues.

How the solution demonstrates 'privacy by design':

In most systems, users are tasked with creating a password that should be both secure and memorable. For many users, this is a lot of work. So, they compromise with security, and create a weak but memorable password, which is more of a concern for the people with low literacy, who typically lack information on creating strong passwords. We thus, argue that the burden of password creation should be borne by a system, especially for the high-security accounts of users. In our proposed scheme, passwords are randomly assigned by the system, offering security and privacy to users' sensitive information stored in their accounts. With system-assigned passwords, users do not have to guess whether a password is secure, and the system can ensure that all passwords offer the desired level of security. While password reuse could pose a serious security threat, using system-assigned passwords ensures that users do not reuse a password (or modification thereof) already used on another account. Variant response feature in CuedR offers higher resilience to shoulder-surfing attack and keystroke loggers, compared to traditional text-based password scheme. In this way, security and privacy are incorporated into the design of our authentication system, demonstrating 'security and privacy by design'.

How the solution can be incorporated into digital identification systems:

CuedR would be incorporated into the digital identification system through our Server-side Class Package, CuedR Library (database of keywords, graphical, verbal, and audio cues), and User Interface (client). Memory cues corresponding to the system-assigned keywords would be presented at the client-end to help users with successful authentication. At the server-end, to ensure the secure storage of users’ authentication secrets, the system-assigned keywords for a user would be concatenated together with a salt and hashed using a slow hash function like bcrypt or PBKDF2. Previously, CuedR was implemented in a real-life setting for the purpose of months-long field studies in USA, and successfully recorded several thousands login instances during the entire period of our studies without any technical difficulty at the server end, where users reported high satisfaction with using the system in the exit survey, and did not mention about any technical issues at the client end. The findings from our lab studies were published in the proceedings of CHI 2015 and SOUPS 2015, while the results from our field studies are currently in submission. To note, all of these studies were conducted in USA.

How the solution is 'user-friendly':

CuedR could be incorporated into the digital identification system in a user-friendly way, through leveraging our Server-side Class Package, CuedR Library (for keywords and cues), and User Interface (client). In CuedR, system-assigned keywords for a user are concatenated together with a salt and hashed using a slow hash function; So an existing system using traditional textual password should be able to integrate CuedR without any major upgrade at server end. While many real-life systems store passwords in plaintext, we recommend to use salt and hash while storing users' authentication secrets in CuedR, to protect their credentials against offline guessing attacks.

How the solution ensures interoperability:

Currently, our CuedR prototype does not have an open API. In this regard, CuedR could be integrated to an existing system through our server-side class package, CuedR Library (database of keywords, graphical, verbal, and audio cues), and User Interface (client). In CuedR, system-assigned keywords for a user are concatenated together with a salt and hashed using a slow hash function; So an existing system using traditional textual password should be able to integrate CuedR without any major upgrade at server end.

How the solution accounts for low connectivity environments and for users with low literacy and numeracy levels:

It is a challenging task, especially for the people with low literacy in developing countries, to understand the requirements and strategies of creating strong passwords. To reduce this burden from users, we propose a system-assigned password scheme so that people do not have to worry about the strength of a password to protect their digital information. We implement incremental learning technique during registration to ease the password learning process of low-literate people, and provide them with their culture, context, and language-centric memory cues that they could easily relate and understand, and so on, leverage to memorize the system-assigned passwords.

Vision over the next three to five years to implement or grow the solution to affect the lives of more people:

CuedR is designed for high-security accounts that contain sensitive information of users. We aim to scale our solution to the security and privacy sensitive accounts of users, especially the ones containing financial and identity information. With helping the people in remembering secure passwords, we aim to gain users' trust in protecting their digital information. Consequently, over the period of next three to five years, our proposed scheme should contribute to increase the use of Internet among people in developing countries in a secure and privacy-preserving way, especially among the ones with low literacy and limited technical efficacy.

About Your Team

How the solution team is organized:

Academia/Research

Solution lead:

Academic/Researcher

Solution leadership:

N/A

How many people work on the solution:

1-5

Solution age:

5-10 years

The organizations applicants are currently working with:

Dr. Al-Ameen and Dr. Ahmed are Assistant Professor at Utah State University and University of Toronto, respectively. Sharifa Sultana is a PhD student at Cornell University. We have partnered with Rural Reconstruction Foundation (RRF) in Bangladesh, a non-governmental, non-profit, non-political and non-sectarian, voluntary development organization, established in 1982 aiming to promote socio-economic emancipation of the underprivileged population. Our project aligns with the broader interest of this NGO, who would support us with resources at the field level for the evaluation and implementation of our proposed authentication scheme, with offering us access to both rural and urban underprivileged population in Bangladesh.

Applicant skills that can attract the different resources needed to succeed and make an impact:

Multi-disciplinary skills and experiences are the strength of this team. Dr. Al-Ameen has specialized in Usable Security and Privacy, who has led the development and evaluation of CuedR scheme in USA. Dr. Ahmed and Sharifa Sultana's works focus on sustainable development and Human-computer Interaction (HCI) in Global South, including Bangladesh. All of the researchers in this team are Bangladeshi, by born, and have access to the users and organizations in Bangladesh to implement and evaluate their scheme. For example, we have already partnered with Rural Reconstruction Foundation (RRF), an NGO in Bangladesh to get access to the underprivileged population.

Revenue model:

Our solution addresses the usability-security tension in user authentication, which remains one of the most challenging research problems for decades, to protect users' digital information. With its proposed design feature to fit in the culture, context, and language of the targeted population, CuedR scheme aims to provide both security and usability for the people in developing countries while protecting their sensitive digital information. In CuedR, system-assigned keywords for a user are concatenated together with a salt and hashed using a slow hash function; So an existing system using traditional textual password should be able to integrate CuedR without any major upgrade at server end. Thus, we strongly believe that CuedR scheme would offer long-term sustainability, and expansion in Bangladesh to protect privacy-sensitive digital information of users, including for the people with low literacy and limited technical efficacy.

Partnership Potential

Reason for applying to the Mission Billion Challenge:

We aim to improve the security and privacy of digital systems in developing countries, with a particular focus on Bangladesh. We evaluated our proposed authentication scheme in USA, and found high login success rate in lab and field studies. We now, plan to tailor this scheme to the context, culture, and language of Bangladesh, so that local people, especially the ones with low literacy could easily leverage memory cues to memorize strong passwords, and so on, secure their sensitive digital information. We strongly believe, our participation in Mission Billion Challenge would contribute to successfully implement our project plan in Bangladesh.

Key barriers to the solution:

Due to novelty effect, it generally takes a while for users to adopt a new system, which may present a challenge at the initial stage of implementing our solution in Bangladesh. However, with the regular use of a system, people overcome the novelty effect, and their performance in using that system improves over time because of training effect. The findings from our field study in USA confirm the positive impact of training effect on our scheme. Also, the careful implementation of culture, context, and language-centric memory cues should help the people in Bangladesh to overcome their novelty effect with CuedR.

Solution Team

 
    Back
to Top