This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Memory-only selection of dictionary PINs

Martin Stanek
Department of Computer Science
Comenius University
stanek@dcs.fmph.uniba.sk
Abstract

We estimate the security of dictionary-based PINs (Personal Identification Numbers) that a user selects from his/her memory without any additional aids. The estimates take into account the distribution of words in source language. We use established security metrics, such as entropy, guesswork, marginal guesswork and marginal success rate. The metrics are evaluated for various scenarios – aimed at improving the security of the produced PINs. In general, plain and straightforward construction of memory-only dictionary PINs yields unsatisfactory results and more involved methods must be used to produce secure PINs.

1 Introduction

A PIN is frequently used form of user authentication. The PIN is a fixed-length string of digits, usually of length 4, 5 or 6. There are recommendations on how to choose and work with the PINs in secure manner, e.g. [11, 15, 6]. Other proposals try to devise methods for producing sufficiently secure PIN [7, 8]. Even though the users are often informed and aware of PIN security, several studies showed that the significant portion of the users choose weak, easily guessable PINs [2, 4]. Weaknesses can also lie in other aspects of using authentication secrets, e.g. partial password/PIN verification [1].

One possibility of choosing and memorizing the PIN is to use so-called dictionary PIN. Dictionary PIN is derived from a word with the mapping offered by numpads of ATMs, mobile phones or Point-of-Sale terminals. The most commonly used letter to digit mapping is the standard mapping shown in Figure 1.

Refer to caption
Figure 1: The standard mapping

Certainly, other mappings are possible, covering also digits 0 and 1. Recent study of dictionary PINs [12] analyzed the security of dictionary PINs with respect to various languages and dictionaries. It also described and assessed several methods of improving dictionary PINs selection. The assessment assumed uniform distribution of dictionary words, see [12]:

“Let us stress that the experiments treat the words in a dictionary as equally probable. This is certainly not true if a user chooses the word from his/her memory. The uniform distribution can be easily achieved with the aid of an application that offers random sets of words for the user to choose from.”

Nevertheless, sometimes it can be impractical to use an external application and some users can hesitate to use or they would not even trust such application for PIN selection. Therefore we focus on dictionary PINs that user selects from his/her memory, without any external aid. We address the question of the security of such user-generated dictionary PINs in this paper. The main findings of our experiments are the following:

  • -

    Considering uniform frequencies of dictionary words is inadequate for estimating the security of memory-only selection of dictionary PINs.

  • -

    The straightforward word to PIN translation yields unacceptable marginal success rates when frequencies are taken into account.

  • -

    Simple blacklisting, prefix, and two-dictionary methods offer only a moderate improvement in security metrics.

  • -

    A more demanding methods, such as morphing or combination of multiple methods, are needed to obtain significantly better results.

1.1 Quantifying the predictability of PIN

Let N=10nN=10^{n} be the size of an PIN space, for PIN length nn. Let XX be a random variable over the set {0,1,,9}n\{0,1,\dots,9\}^{n}. Let pip_{i} denotes the probability of choosing a particular PIN xix_{i}. Without loss of generality we assume that PINs are sorted in the descending order of their probabilities, i.e. p1p2pNp_{1}\geq p_{2}\geq\ldots\geq p_{N}.

Various measures for the PIN choices were proposed and studied, for details, discussions and relations among these metrics see [3, 4, 16]. The most important ones are defined in the following list.

  • -

    Shannon entropy, expressed in bits, measures the uncertainty in a random variable:

    H1(X)=i=1Npilog2pi.H_{1}(X)=-\sum_{i=1}^{N}p_{i}\log_{2}p_{i}.
  • -

    The guesswork measures the expected number of guesses needed to find a PIN, trying in descending order according their probability:

    G(X)=i=1Nipi.G(X)=\sum_{i=1}^{N}i\cdot p_{i}.
  • -

    The marginal guesswork measures the expected number of guesses needed to increase the success probability of finding the PIN to at least α\alpha (usually α=0.5\alpha=0.5):

    μα(X)=min{1kNi=1kpiα}.\mu_{\alpha}(X)=\min\{1\leq k\leq N\mid{\textstyle\sum\nolimits_{i=1}^{k}p_{i}}\geq\alpha\}.
  • -

    The marginal success rate measures the probability of guessing the PIN given β\beta attempts (β\beta is usually 33 or 66):

    λβ=i=1βpi.\lambda_{\beta}=\sum_{i=1}^{\beta}p_{i}.

Since the guesswork and the marginal guesswork are not directly comparable to Shannon entropy, the values of G(X)G(X) and μα(X)\mu_{\alpha}(X) are converted into bits using the following formulas [3]: G~(X)=log2(2G(X)1)\tilde{G}(X)=\log_{2}(2G(X)-1), μ~α(X)=log2(μα(X)/λμα)\tilde{\mu}_{\alpha}(X)=\log_{2}(\mu_{\alpha}(X)/\lambda_{\mu_{\alpha}}).

Since the standard mapping does not cover digits 0 and 1, the ideal security metrics have the following values for dictionary PINs (assuming uniform distribution of PINs) :

  • -

    PIN length 4: H1(X)=G~(X)=μ~0.5=12.00H_{1}(X)=\tilde{G}(X)=\tilde{\mu}_{0.5}=12.00 bits, λ6(X)=0.15%\lambda_{6}(X)=0.15\%,

  • -

    PIN length 5: H1(X)=G~(X)=μ~0.5=15.00H_{1}(X)=\tilde{G}(X)=\tilde{\mu}_{0.5}=15.00 bits, λ6(X)=0.02%\lambda_{6}(X)=0.02\%.

2 Estimating metrics for dictionary PIN selection

In order to model frequency distribution of words in a language we use frequency lists based on subtitles. This is a respected method for analyzing contemporary languages [5]. We use two frequency lists for English – a carefully prepared SUBTLEXus [13] containing 60,384 words with a frequency higher than 1, and the list compiled from subtitles available from opensubtitles.org [10], containing more than 450,000 words (even words with frequency 1). We will denote the results obtained using the first/second list with label “SUBTLEXus”/“opensub”, respectively.

2.1 Basic statistics

We compare the metrics for straightforward translation of words to PINs using the standard mapping, see Figure 1, with results obtained in [12]. We consider only the words with the length equal to the PIN length nn. The translation starts with stripping the diacritical marks, if they are present. Then, the word is mapped to PIN using the standard mapping, e.g. “love” and “hate” yield 5683 and 4283, respectively. The frequency of particular word contributes to the probability of resulting PIN.

The results for the PIN lengths 4 and 5 are shown in Table 1. The columns labeled “uniform” contain results for PINs derived from a large (spell-checker) English dictionary assuming uniform frequencies of words [12]. The columns labeled “RockYou” contains results for PINs derived from RockYou password database where frequencies of words (passwords) were taken into account. It is easy to notice a striking difference between scenarios that consider the frequencies of words and those that do not.

SUBTLEXus opensub uniform [12] RockYou [12]
n=4n=4 n=5n=5 n=4n=4 n=5n=5 n=4n=4 n=5n=5 n=4n=4 n=5n=5
H1H_{1} (bits) 7.237.23 8.428.42 7.427.42 8.888.88 11.2811.28 13.3713.37 - -
G~\tilde{G} (bits) 7.187.18 8.638.63 7.497.49 9.459.45 10.9410.94 13.0813.08 - -
μ~0.5\tilde{\mu}_{0.5} (bits) 5.525.52 6.586.58 5.645.64 6.926.92 10.6110.61 12.6812.68 9.209.20 10.7610.76
λ6\lambda_{6} (%) 23.9323.93 19.2419.24 22.8022.80 17.3417.34 0.850.85 0.330.33 10.8110.81 8.468.46
Table 1: Comparison of metrics for straightforward construction of dictionary PINs

A closer look at the most frequent dictionary PINs from SUBTLEXus and opensub reveals the following observations:

  • -

    PIN length 4: Top 7 PINs share the same spots in SUBTLEXus and opensub scenarios (the last three spots in top 10 are just permuted, i.e. the top 10 contains exactly the same set of PINs in both scenarios). The high marginal success rates are caused by the frequencies of the following PINs: 8428 (probability 6.65%6.65\% based on SUBTLEXus, e.g. produced from the word “that”), 9428 (4.64%4.64\%, “what”), 8447 (3.76%3.76\%, “this”), 4283 (3.14%3.14\%, “have”), 9687 (3.04%3.04\%, “your”), and 5669 (2.70%2.70\%, “know”).

  • -

    PIN length 5: The sets of top 10 PINs differ in just two PINs, while the first 5 spots are exactly the same in SUBTLEXus and opensub scenarios. For SUBTLEXus scenario the most frequent PINs are: 84373 (5.12%5.12\%, e.g. produced from the word “there”), 74448 (3.95%3.95\%, “right”), 22688 (3.54%3.54\%, “about”), 84465 (2.62%2.62\%, “think”), 46464 (2.07%2.07\%, “going”), and 46662 (1.94%1.94\%, “gonna”).

We can conclude that considering uniform frequencies of dictionary words is inadequate for estimating the security of memory-only selection of dictionary PIN. The results show the deficiency of such PINs clearly – the marginal success rates are unacceptable. Moreover, it seems that this strategy is worse (in average) than strategies currently employed by users. In order to compare memory-only dictionary PINs with “common” PIN selection strategies, we present estimates of PIN metrics based on RockYou password database and iPhone unlock codes [4] in Table 2. On the other hand, the lack of digits 0 and 1 in the standard mapping ensures that these digits do not appear in the resulting PIN. Therefore the PINs that are often blacklisted, e.g. 0000, 1111 or 1234, or those the users are warned not to use, e.g. birthday or anniversary years, cannot be selected this way.

RockYou iPhone
H1H_{1} (bits) 10.7410.74 11.4211.42
G~\tilde{G} (bits) 11.5011.50 11.8311.83
μ~0.5\tilde{\mu}_{0.5} (bits) 9.119.11 10.3710.37
λ6\lambda_{6} (%) 12.2912.29 12.3912.39
Table 2: Estimation of PIN metrics (PIN length 4) [4]

We explore few possibilities for improving memory-only dictionary PINs in the following sections.

2.2 Blacklisting

Blacklisting is a common method for improving the security of user-selected PINs. Even if not strictly enforced (by forbidding the selection of some PINs), at least there are recommendations what PINs a user should not choose, e.g. see [15]:

“Select a PIN that cannot be easily guessed (i.e., do not use birth date, partial account numbers, sequential numbers like 1234, or repeated values such as 1111).”

There are two possibilities for blacklisting in dictionary PIN scenario: first, blacklisting the most frequent words; and second, blacklisting the most frequent PINs. The PIN blacklisting is easier to enforce in practice, and the values of security metrics are comparable for both approaches. Figure 2 shows the entropy and the marginal success rate (λ6\lambda_{6}) for PIN blacklisting (based on SUBTLELXus) ranging from 0 to 100100 blacklisted PINs. The results show only a moderate improvement in security metrics, therefore blacklisting alone is not a satisfactory method for improving memory-only dictionary PINs.

Refer to caption
Figure 2: The effect of PIN blacklisting on entropy and marginal success rate

2.3 Modifications of PIN construction

In order to improve the security metrics of resulting PIN, some natural modifications to basic translation of dictionary word to PIN were proposed in [12]. We evaluate these modifications when applied to our “frequency-aware” experiments:

  • -

    Stretched mapping – in order to cover digits 0 and 11, we can stretch the standard mapping. Our estimates for this modification use the following mapping: a, b 1\mapsto 1; c, d 2\mapsto 2; e, f 3\mapsto 3; g, h, i 4\mapsto 4; j, k, l 5\mapsto 5; m, n 6\mapsto 6; o, p, q 7\mapsto 7; r, s, t 8\mapsto 8; u, v, w 9\mapsto 9; x, y, z 0\mapsto 0.

  • -

    Prefix – instead of taking just words with the desired PIN length, i.e. nn, we use any word with the length greater or equal to nn and we use its prefix for translation to PIN.

  • -

    Morphing – the standard word to PIN translation is enriched by random change of one character. Assuming that user can choose a random position in a word/PIN and a random digit, the resulting PIN is formed by replacing this position by the chosen digit. For example “this” can be translated to “t1is”/8147, “0his”/0447, “thi9”/8449, etc. Certainly, this method is more demanding than the straightforward use of dictionary words. Our estimates assume uniform distribution of positions and digits for this method.

The results for all above methods are presented in Table 3. The stretched mapping yields no improvement at all – the most frequent PINs changed their values, but their frequencies remained almost unchanged. The prefix method offers a moderate improvement in security metrics. Obviously, the morphing is the most successful approach by a wide margin.

Stretched map. Prefix Morphing
n=4n=4 n=5n=5 n=4n=4 n=5n=5 n=4n=4 n=5n=5
H1H_{1} (bits) 7.287.28 8.438.43 9.039.03 10.3610.36 11.0811.08 12.9612.96
G~\tilde{G} (bits) 7.287.28 8.678.67 8.898.89 10.3910.39 10.7310.73 12.8412.84
μ~0.5\tilde{\mu}_{0.5} (bits) 5.525.52 6.586.58 7.567.56 8.778.77 9.889.88 11.5311.53
λ6\lambda_{6} (%) 24.0424.04 19.3119.31 11.3011.30 8.018.01 2.772.77 2.172.17
Table 3: Modifications of PIN constructions – results based on SUBTLEXus

Comparing these results with the estimates from Table 2, we can notice that the prefix method for dictionary PINs offers slightly better marginal success rate but worse entropy, guesswork and marginal guesswork. An interesting observation is that the morphing offers much better marginal success rate while keeping other security metrics comparable to real-word estimates from Table 2.

Interestingly, the prefix method and the morphing yield better results than the estimates of PIN entropy by NIST [9]: 9 and 10 bits for PIN lengths 4 and 5, respectively. On the other hand, plain memory-only dictionary PINs offer less entropy than these estimates.

2.4 Blacklisting the prefix and the morphing methods

We expect that blacklisting of the most frequent PINs can further improve the security metrics of promising methods from the previous section (i.e. prefix and morphing methods). Indeed, our experiments confirm this expectation. Table 4 shows the values of the entropy and the marginal success rate for various sizes of the blacklist (0, 1010, and 2020).

Prefix Morphing
blacklist n=4n=4 n=5n=5 n=4n=4 n=5n=5
H1H_{1} (bits) 0 9.039.03 10.3610.36 11.0811.08 12.9612.96
10 9.379.37 10.6810.68 11.1511.15 13.0613.06
20 9.539.53 10.8210.82 11.1911.19 13.0913.09
λ6\lambda_{6} (%) 0 11.3011.30 8.018.01 2.772.77 2.172.17
10 6.626.62 4.284.28 1.741.74 0.970.97
20 4.694.69 2.952.95 1.561.56 0.850.85
Table 4: Combination of PIN blacklist and the prefix/morphing method

The blacklisting substantially improves the marginal success rate, but offers only a moderate improvement of the entropy. A disadvantage of the blacklisting is that it complicates the implementation of authentication.

2.5 Two-dictionary PINs

Many people know more than one language. In such case, it is easy to adopt a strategy where a user randomly choses a language and then (s)he selects a word for PIN construction. We expect obviously an improvement in security metrics values. In order to assess the improvement we use English and Dutch frequency dictionaries SUBTLEXus and SUBTLEXnl [14]. We use words with frequency above 1 in both dictionaries, and we assume that the user selects the dictionary with probability 1/21/2. The results for this two-dictionary scenario are shown in Table 5, where “basic” denotes the construction using words with the length nn, “prefix” denotes the prefix method, and “prefix (BL)” denotes the combination of the prefix method with the blacklist of the length 1010.

Basic Prefix Prefix (BL 10)
n=4n=4 n=5n=5 n=4n=4 n=5n=5 n=4n=4 n=5n=5
H1H_{1} (bits) 7.847.84 9.359.35 9.629.62 11.2111.21 9.849.84 11.3711.37
G~\tilde{G} (bits) 7.727.72 9.419.41 9.379.37 11.0911.09 9.509.50 11.1711.17
μ~0.5\tilde{\mu}_{0.5} (bits) 6.246.24 7.637.63 8.278.27 9.689.68 8.558.55 9.859.85
λ6\lambda_{6} (%) 18.0018.00 11.0711.07 7.787.78 4.374.37 4.094.09 2.322.32
Table 5: Security metrics for two-dictionary scenario

As expected, the results are better than results for corresponding single-dictionary scenario methods. However, even with the blacklisting the results cannot match the morphing method results for single dictionary.

3 Conclusion

We analyzed the security of memory-only selection of dictionary PINs. The results show that plain construction of dictionary PINs is unsatisfactory and more involved methods should be used for improved security metrics.

Acknowledgment

The author acknowledges support by VEGA 1/0259/13.

References

  • [1] Aspinall D, Just M. “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks. In:Proceedings of 17th International Conference on Financial Cryptography and Data Security (FC 2013). LNCS 7859. Springer; 2013.
  • [2] Berry N. PIN analysis. DataGenetics; 2012.
    Available at www.datagenetics.com/blog/september32012/index.html [accessed 31 March 2014].
  • [3] Bonneau J, Just M, Matthews G. What’s in name? Evaluating statistical attacks against personal knowledge questions. In: Proceedings of the 14th International Conference on Financial Cryptography and Data Security. LNCS 6052. Springer; 2010, pp. 98–113.
  • [4] Bonneau J, Preibusch S, Anderson R. A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security. LNCS 7397. Springer; 2012, pp. 25–40.
  • [5] Brysbaert M, New B. Moving beyond Kučera and Francis: A critical evaluation of current word frequency norms and the introduction of a new and improved word frequency measure for American English. Behavior Research Methods, 41(1):977–990, Springer-Verlag; 2009.
  • [6] International Organization for Standardization. Financial services – Personal Identification Number (PIN) management and security, Part 1: Basic principles and requirements for PINs in card-based systems, ISO 9564-1; 2011.
  • [7] Jakobsson M, Liu D. Bootstrapping Mobile PINs Using Passwords. W2SP 2011: Web 2.0 Security and Privacy; 2011.
    Available at w2spconf.com/2011/papers/mobilePIN.pdf [accessed 31 March 2014].
  • [8] Jakobsson M, Liu D. Your Password is Your New PIN. SpringerBriefs in Computer Science 2013, pp 25-36, Springer; 2013.
  • [9] NIST. Electronic Authentication Guideline. Special Publication 800-63-1; 2011.
  • [10] Frequency Word Lists. 2012.
    Available at http://invokeit.wordpress.com/frequency-word-lists/ [accessed 31 March 2014].
  • [11] PCI Security Standards Council. Payment Card Industry PIN Security Requirements. Version 1.0; 2011.
    Available at www.pcisecuritystandards.org/security_standards [accessed 31 March 2014].
  • [12] Staneková L, Stanek M: Analysis of dictionary methods for PIN selection. Computers & Security, Volume 39, Part B, Elsevier, 2013, pp. 289-298.
    http://dx.doi.org/10.1016/j.cose.2013.08.006.
  • [13] SUBTLEXus, Word Frequency American English, Ghent University, 2009.
    Available at http://expsy.ugent.be/subtlexus/ [accessed 31 March 2014]
  • [14] SUBTLEXnl, Database of Dutch Word Frequencies, 2010.
    Available at http://crr.ugent.be/programs-data/subtitle-frequencies/subtlex-nl [accessed 31 March 2014]
  • [15] VISA. Issuer PIN Security Guidelines; 2010.
    Available at https://usa.visa.com/download/merchants/visa-issuer-pin-security-guideline.pdf [accessed 31 March 2014].
  • [16] Weir M, Aggarwal S, Collins M, Stern H. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. In: Proceedings of the 17th ACM conference on Computer and Communications Security, CCS’10, ACM; 2010. pp. 162–175.