The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Information Security Applications of Natural Language Processing Techniques

Author

Umut Topkara

Tech report number

CERIAS TR 2007-39

Entry type

phdthesis

Abstract

In this thesis we investigate applications of natural language processing (NLP) techniques to information security problems. We present our results in this direction for two important areas: password authentication, and information hiding in natural language text. We have limited this thesis to the realm of language engineering, i.e., our emphasis is on adapting the existing NLP techniques for our purposes, rather than in developing new NLP techniques. Our password mnemonics system helps users to remember random passwords, hence making it possible to implement organizational policies that mandate strong password choices by users. Moreover, in our system password changes do not necessitate a new mnemonic, thereby further easing the users' task of memorizing their respective mnemonics. Our robust natural language text watermarking system can avoid the removal of the watermark text by an automated adversary, in the same way used by authentication systems to avoid an automated adversary's compromise of the password string hidden within the password mnemonic. We have also laid the groundwork for followup research in this area.

Date

2007 – 08

Key alpha

Information Security Applications, Natural Language, Processing Techniques

School

Purdue University

Bibdate

2007

Publication Date

2007-08-01

Contents

1. Introduction 2. Template-based Mnemonic Generation 3. Secure and Re-usable Multiple Password Mnemonics 4. Accesible Authentication Through Secure Mnemonic-based Passwords 5. Another Application: NL Watermarking 6. Summary and Conclusions

Keywords

Information Security Applications of Natural Language Processing Techniques

Language

English

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.