Password rules push repeats
New research suggests complex passwords are not always best.
Experts have investigated how users react to increasingly complex password requirements and whether those rules compromise password security. They found that complex password restrictions often leave users frustrated and lead to poor passwords.
“Our results confirm that the tougher the constraints of creating the passwords the safer users feel with their information,” said James Cook University researcher Dr Roberto Dillon.
“However, the results show that a large number of restrictions can frustrate users.”
Dr Dillon said this frustration led to 75 per cent of participants using strategies to remember their passwords, including strategies that compromise their security.
“The most popular strategy was using the same password for multiple sites,” he said.
Dr Dillon and his team conducted a survey where users were asked to create a password following an increasing number of restrictions, ranging from “passwords must contain at least eight characters” to “passwords must be different from the latest five passwords.”
Participants were also asked if they used any strategies to remember their passwords, as well as the situations where they would be tempted to use those strategies.
“Websites often require passwords that include a combination of special characters, numbers, upper- and lower-case letters, and more,” he said.
“This makes passwords less likely to be compromised by hackers, but harder for users to invent a password and to remember it.”
While measures such as password managers and two-factor authentication protocols offer solutions to password management and securing privacy, Dr Dillon said they still suffer from usability issues and demonstrate inconvenience to users.
He suggests a better approach was to ask users to create a long but meaningful password phrase.
“This is easy to remember but long enough to hinder brute-force hacking attacks,” he said. “At the same time, providers should avoid adding several restrictions as it makes it more likely for users to resort to workarounds that compromise security.”