3LAS (Three Level Authentication Scheme)
|
|
- Kelly Hoover
- 5 years ago
- Views:
Transcription
1 3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology, Computer Engineering, University of Mumbai, Maharashtra, India Abstract Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden camera,shouldersurfing,key loggers, spyware and brute force attack. Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder surfing and key loggers. Keywords-- Graphical password, Textual password, Password, Security I. INTRODUCTION In our day to day life, we happen to surf hundred of websites on internet. But website security and user privacy on internet has been a great concern. Every website we visit, normally the user logins by providing login credentials. But there are certain security concerns: 1. Someone standing behind or besides you can intentionally see the credentials (The Shoulder Surfing Problem). 2. There may be a key logger installed in the system, on which the login credentials are typed. The vulnerabilities of the textual password have been well known. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to shoulder-surfing, hidden camera,spyware,key loggers and brute force attack. Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder surfing and key loggers.there is a need for solving the above stated problem.in this paper, we propose a Three Phase Textual-Graphical Password Authentication scheme. This technique seamlessly integrates both graphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing, hidden-camera, spyware attacks, key loggers and brute force attack. It can replace or coexist with conventional textual password systems without changing existing user password profiles. The Scheme shows significant potential bridging the gap between conventional textual password and graphical password. The proposed scheme has an extremely wide scope as it can be used for banking application, ATM services and other such application where user interaction with private data is controlled by means of password authentication. II. LITERATURE REVIEW Textual passwords exist since From then, they have been a common mechanism to authenticate users. Applications that we use in our day to day life use textual passwords to authenticate users. The main motivation behind the graphical password is the fact that human can easily remember graphical password as compared to textual[1]. Graphical passwords tend to be more secure as compared to textual passwords. A system is designed by Blonder, where the system asks the user to click on different graphic in an image used for authentication [2].When creating a password, the user is asked to choose four images of human faces from a face database as their own password. In the authentication stage, users must click on the approximate areas of those locations. This method is considered as a more convenient password scheme than textual scheme, for the image can help users to recall their own passwords. Wiedenbeck, et al. [3] extended the approach and proposed a system called PassPoint. It allows users to click on any locations on the image to create the passwords. The system will calculate a tolerance around each pixel which has been chosen. The users must click within the tolerance of the chosen pixels. Instead of using alphanumeric password, the user chooses geometric art images out of a series of images. The user creates a portfolio of images by selecting p images out of a set of images given to him. While authenticating a user is presented with a challenge set of n images which contains m images out of the portfolio. The remaining n- m images are called as decoy images. The users have to identify the images of his portfolio as selected earlier [3]. Jansen [3-5] proposed a scheme of graphical password. In the scheme, a user will be requested to choose a theme which contains a set of pictures. The user needs to select some of the pictures from the ones that are available in that theme. He needs to choose the images in a particular sequence which will act as his password i.e. images in that sequence will authenticate the user. 103
2 Sobrado and Birget [6] developed a graphical password technique. In their scheme, the system first displays a number of 3 pass-objects (pre-selected by a user) among many other objects. To be authenticated, a user needs to recognize pass-objects and click inside the triangle formed by the 3 pass-objects. Huanyu Zhao and Xiaolin Li [7] designed an authentication system based on textual-graphical password scheme. In the proposed system user will be presented a screen of characters. His password will be presented in a form of invisible triangle i.e. the first three characters will form the corners of a invisible triangle, then starting from second character another invisible triangle is formed and so on. In each of the triangle user either has to click or has to use, the central character of the triangle, as session password. In this screen, Jack has to search for his password in the form of 3 x 3 matrices. First four password characters in this case myda, will appear as corners of Invisible Square. He will click on the chosen character. It is assumed that he chose center and left. So in first instance he will click on the central character ( _). After clicking on central character, Jack will successfully go to next instance which is represented as shown in Fig.2. III. 3LAS SYSTEM 3LAS extends the basic working of S3PAS [7]. There are minor differences. Instead of using triangle, 3LAS uses square. S3PAS had password appearing in single instance, whereas 3PAS has multiple instances. As the name suggests, 3LAS has three levels of authentication which can be used as per the needs of security level. The three levels are as follows: A. LEVEL 1: Random Character in Grid This is the first level of 3LAS. In this level, a screen with random characters will appear in front of user. This screen will also contain user s password as a part of random characters. User s password will be broken down into pieces; each piece will contain four characters of the user password. First instance will contain the first four characters as corners of 3 x 3 matrices (Invisible Square). Second instance will contain next four characters and so on. In order to go for next instance user will click on any of the possible characters within the square viz. north, south, east, west, or center. User cannot click on the corners of square as it represents his password characters, which will make this scheme to be more vulnerable. At the time of registration, user will be asked to define a pattern of clicking a character at different instance. In first instance user can click on central character, in next instance he can click on left character and so on as per the user s choice. These characters will form a session password, similar to S3PAS [7]. In this scheme, the 3 x 3 matrix will appear at random position at different instance. Moreover the screen of random characters will be different every time i.e. the character position will change at every instance. Also the characters appearing within the invisible square will be different at every instance. Consider an e.g. Jack wants to login. His password is mydad123. He ll first enter his id and then he ll get the following screen as shown in Fig.1. 1.Level 1 First Instance. Now, Jack has to search for next four characters of his password i.e. d123 in the screen following the same procedure as explained. 2. Level 1 Second Instance. After he clicks on western character, he is successfully logged in. If Jack clicks on any other character, he has to try again on new screen. In this case, session password _., Will authenticate Jack. This scheme is shoulder surfing resistant as the hacker won t be able to determine what the password is. 104
3 It is because, the square is appearing at different positions in the screen and the characters of session password are different at every instance. B. Level 2: Random Character in Grid with Session password Although Level -1 is shoulder surfing resistant, it is still vulnerable. A snap shot feature of key logger can be used to determine the password. Attacker will have multiple sessions snapshots, which if compared will lead to actual recognition of password and possibly the scheme too. In order to overcome the above vulnerability, another scheme can be used. This scheme proposes that, instead of clicking on the characters of session password, user will remember those characters, and at the end the user has to enter the session password which will lead to its authentication. Every time the user tries to log in, he will get a different session password. Thus the key logger snapshot won t be able to help the attacker in cracking the password. Considering same e.g. Jack with password mydad123 will follow the same procedure as that of Level 1. But now instead of clicking on the characters, Jack will now memorize those characters and after successfully completing the last instance he will be asked to enter the session password. The screen will appear as shown in Fig.3. After memorizing his session password character he ll click on the next button. Then he gets the next instance as shown in Fig Level 2 First Instance. User will be authorized with the help of session password, which will be generated from the actual password, keeping actual password intact. Here Jack has to enter the session password i.e. _K And thus he ll be authenticated. 4. Level 2 Second Instance. C. Level 3: Random Character in Grid with Session password and grid variations Level 2 is highly secured. It is difficult to crack the user s password. If more secured environment is required then the next proposed scheme is highly suitable. It is similar to Level 2. Till now the size of grid was constant as 3 x 3. But in order to make it more complex, we can introduce a change in size of grid. At one instance, grid may be of size 3x3, in other it can be of 5 x 5 and so on. Even though the size of grid varies, the possible candidates for session password within the square will be 5 viz. north, south, east, west, or center. Considering the above e.g. Jack using his password mydad123, wants to log in. Following the same procedure of finding first four characters in the corners of Invisible Square continues, with the difference of variation in grid size. At first instance he gets the screen as shown in Fig. 5. He searches for his password characters in the screen and gets it in 5 x 5 grid. He memorizes the central character and clicks on next button. After that he get the next screen as shown in Fig 7. Here, Jack will search for next four password characters. He ll find it in 3 x 3 grid. And now he ll enter the session password and thus will be authenticated on correct entrance of session password. 105
4 PV: Position count which defines the different possible positions where the password can be present GV: Grid variations of various combinations N: Number of chances allowed to the user to enter the password. Probability of retrieving the password using brute force attack, Dictionary attack and Random Click Level -1: Random Character in Grid Probability of breaking password (P) is given by, 5. Level 3 First Instance. This scheme is highly secured to security attacks like shoulder surfing and key loggers. Level -2: Random Character in Grid with Session password Probability of breaking password (P) is given by, Level -3: Random Character in Grid with Session password and grid variations Probability of breaking password (P) is given by, P= 6. Level 3 Second Instance. IV. ANALYSIS AND DISCUSSION A. Shoulder Surfing Resistant Textual & Graphical passwords are vulnerable to shoulder surfing. But 3LAS system is shoulder surfing resistant as the attacker won't be able to guess what user is typing or clicking. And Level -3 makes it more complicated for attacker to crack the password. B. Random clicks, Brute force, & Dictionary attack resistant. Notations Used G: Grid corner positions L: Length of the password in letters. I: Instance number defined by I=L/G M: Matrix defined by m * n For example, Worst case checking of Level 3where password size is 8 characters is given by, Let M=8 * 10 (Grid size) PV=5 (LEFT, RIGHT, TOP,BOTTOM,CENTER) L=8(minimum length of password) G=4 (Grid corner positions possible in a square matrix) I=8/4=2 GV= 3 (3 X 3, 5 X 5, 7 x 7 matrix allowed for user to select) = e-9 Best case checking of Level 3 where password size is 16 characters is given by, Let M=8 * 10 (Grid size) PV=5 (LEFT,RIGHT,TOP,BOTTOM,CENTER) L=16(maximum length of password) G=4 (Grid corner positions possible in a square matrix) I=16/4=4 GV=3 (3 X 3, 5 X 5, 7 x 7 matrix allowed for user to select) 106
5 V. CONCLUSION = e-27 We proposed a three level authentication system.3las demonstrates desirable features of a secure authentication system being immune to shoulder surfing, hidden camera and spyware attacks. According to the system requirement, desired level of security can be achieved by using three proposed levels of authentication. REFERENCES [1] R. N. Shepard. Recognition memory for words, sentences and pictures. Journal of Verbal Learning and Verbal Behavior, 6: , [2] G. E. Blonder, "Graphical passwords," in United States Patent, vol , [3] W. Jansen, "Authenticating Mobile Device User Through Image Selection," in Data Security, [4] W. Jansen, "Authenticating Users on Handheld Devices," in Proceedings of Canadian Information Technology Security Symposium, [5] W. Jansen, S. Gavrila, and V. Korolev, "A Visual Login Technique for Mobile Devices," in National Institute of Standards and Technology Interagency Report NISTIR 7030, [6] L. Sobrado and J. C. Birget. Graphical passwords. The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research,4, [7] Huanyu Zhao and Xiaolin Li,"S3PAS:A Scalable Shoulder- Surfing Resistant Textual-Graphical Password Authentication Scheme,"in 21st International Conference Advanced Information Networking and Application Workshop,
A Hybrid Password Authentication Scheme Based on Shape and Text
JOURNAL OF COMPUTERS, VOL. 5, NO. 5, MAY 2010 765 A Hybrid Password Authentication Scheme Based on Shape and Text Ziran Zheng School of Management & Economics Shandong Normal University, Jinan, China Email:
More informationNETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION
NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION P.Kiruthika R.Tamilarasi Department of Computer Applications, Dr.Mahalingam College Of Engineering and Technology,
More informationMinimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme
Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme 1 Prof. S. K. Sonkar, 2 Prof. R. L. Paikrao Computer Engineering Dept. Amrutvahini College of engineering Sangamner,
More informationAuthentication schemes for session password using color and special characters
Authentication schemes for session password using color and special characters Rohit Jagtap1, a, Vaibhav Ahirrao2,b Vinayak Kadam3,c Nilesh Aher4 1.Department of Computer Engineering, 2 Department of Computer
More informationGraphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2
Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com
More informationSimple Text Based Colour Shuffling Graphical Password Scheme
Simple Text Based Colour Shuffling Graphical Password Scheme Nikita Parab 1, Ketan Gawde 2, Anshumaan Nalluri 3 1,2,3 Information Technology Dept., Universal College Of Engineering Vasai India, Abstract
More informationGraphical Password Authentication: Methods and Schemes
Graphical Password Authentication: Methods and Schemes Geeta M. Rane, Student (BE) of Computer Science and Engineering, Shri Sant Gadge Baba College of Engineering & Technology, Bhusawal, North Maharashtra
More informationSHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD
SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD Bagade Om, Sonawane Anuja, Patil Akash, Patil Yogita, Maurya Jagruti Department of Computer Engineering Shram sadhana trust s college of engineering
More informationUsable Privacy and Security, Fall 2011 Nov. 10, 2011
Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon (youngseok@cs.cmu.edu) Institute for Software Research School of Computer Science Carnegie Mellon University picture/photo based vs.
More informationA Multi-Grid Graphical Password Scheme
A Multi-Grid Graphical Password Scheme Konstantinos CHALKIAS, Anastasios ALEXIADIS, George STEPHANIDES Dept. of Applied Informatics, Macedonia University, 156 Egnatia str., 540 06 Thessaloniki, Greece
More informationUSING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS
USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS Dr. Mohammed A. Fadhil Al-Husainy Raghda Ahmed Malih Department of Computer Science, Faculty of Information Technology, Middle
More informationInnovative Graphical Passwords using Sequencing and Shuffling Together
Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology
More informationMULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION
MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate
More informationUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS Sreelatha Malempati Dept. of Computer Science & Engineering R.V.R. & J.C. College of Engineering Chowdavaram, Guntur, A.P lathamoturi@rediffmail.com
More informationRecall Based Authentication System- An Overview
Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer
More informationA Secure Graphical Password Authentication System
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 12, Number 2 (2016), pp. 197-201 Research India Publications http://www.ripublication.com A Secure Graphical Password
More informationA New Graphical Password: Combination of Recall & Recognition Based Approach
A New Graphical Password: Combination of Recall & Recognition Based Approach Md. Asraful Haque, Babbar Imam International Science Index, Computer and Information Engineering waset.org/publication/9997703
More informationSHOULDER SURFING RESISTANT GRAPHICAL PASSWORD
SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD Kruthi K 1, Kumuda B G 2, Nandhini N V 3, Mrs. R.Anitha 4 (Associate Professor) 1, 2, 3, 4 Department of Computer Science and Engineering, The National Institute
More informationNovel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.3, August 2012, pp. 163~170 ISSN: 2089-3299 163 Novel Shoulder-Surfing Resistant
More informationENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 395-402 TJPRC Pvt. Ltd. ENHANCEMENT OF SECURITY FEATURE IN
More informationA STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES
, pp.-04-08. Available online at http://www.bioinfo.in/contents.php?id=219 A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES ASHWINI FULKAR*, SUCHITA SAWLA, ZUBIN KHAN
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationGraphical password authentication using Pass faces
RESEARCH ARTICLE OPEN ACCESS Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information
More informationAn image edge based approach for image password encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5733 5745 Published online 16 January 2017 in Wiley Online Library (wileyonlinelibrary.com)..1732 RESEARCH ARTICLE An image edge based
More informationTowards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique
Second Asia International Conference on Modelling & Simulation Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Muhammad Daniel Hafiz
More informationCued Click Point Technique for Graphical Password Authentication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More information3D PASSWORD AUTHENTICATION FOR WEB SECURITY
3D PASSWORD AUTHENTICATION FOR WEB SECURITY Sahana R.Gadagkar 1, Aditya Pawaskar 2, Mrs. Ranjeeta B. Pandhare 3 1,2 Department of Computer Science & Engineering, KIT s College of Engineering, Kolhapur,
More informationGraphical User Authentication Using Random Codes
Graphical User Authentication Using Random Codes Mr.D.S.Gawande 1, Manisha P. Thote 2, Madhavi M. Jangam 3, Payal P. Khonde 4, Payal R. Katre 5, Rohini V. Tiwade 6 1Assistant Professor, Computer Science
More informationPixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review
Australian Journal of Basic and Applied Sciences, 7(4): 688-695, 2013 ISSN 1991-8178 Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Mohd Afizi Bin Mohd Shukran, Mohd
More informationAuthentication Using Grid-Based Authentication Scheme and Graphical Password
Authentication Using Grid-Based Authentication Scheme and Graphical Password Vijayshri D. Vaidya 1 Department of Computer engineering SND COE & RC Yeola, India Imaran R. Shaikh 2 Department of Computer
More informationAN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM
AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM Safiyanu Ahmad (ahmadsafiyanu100@gmail.com) 1 ; Souley Boukari (bsouley2001@yahoo.com) 2 ; Samson Henry Dogo (dogojankasa@gmail.com) 1 and
More informationMULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE
MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE P.Shyam Sunder 1, Ballikonda Sai Chaitanya 2, D.Vijay Kumar 3, P.Satya Shekar Varma 4 1,2,4 Department of Computer Science
More informationA New Hybrid Graphical User Authentication Technique based on Drag and Drop Method
A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method Salim Istyaq, Khalid Saifullah Assistant Professor, Dept. of Computer Engineering, EES, University Polytechnic, Faculty
More informationGraphical Password to Increase the Capacity of Alphanumeric Password
Graphical Password to Increase the Capacity of Alphanumeric Password Gaddam Ramu Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer Science
More informationGraphical Password or Graphical User Authentication as Effective Password Provider
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2765-2769 Graphical Password or Graphical User Authentication as Effective
More informationDESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS
http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor
More informationDivide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Shah Zaman Nizamani Waqas Ali Sahito Shafique Awan Department of IT Department of IT Department of Computer
More informationInternational Journal of Advances in Engineering Research
GRAPHICAL PASSWORD AUTHENTICATION SYSTEM WITH INTEGRATED SOUND SIGNATURE 1 Anu Singh, 2 Kiran Kshirsagar, 3 Lipti Pradhan 1 Student, Department of Computer Engineering, Pune University 2 Student, Department
More informationGraphical Authentication System
Graphical Authentication System A Sivasankar Reddy 1, M Kusuma 2 1 Student, Dept. of MCA, EAIMS 2 Professor, Dept. of MCA, EAIMS, Tirupati, A.P. Abstract- This evolution brings great convenience but also
More informationImage Password Based Authentication in an Android System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationA Text based Authentication Scheme for Improving Security of Textual Passwords
A Text based Authentication Scheme for Improving Security of Textual Passwords Shah Zaman Nizamani Department of Information Technology Quaid-e-Awam University of Engineering, Science & Technology, Pakistan
More informationAddress for Correspondence 1 Associate Professor department o f Computer Engineering BVUCOE, Pune
Research Article THREE DIMENSIONAL VIRTUAL ENVIRONMENT FOR SECURED AND RELIABLE AUTHENTICATION 1 Gauri Rao, 2 Dr. S.H. Patil Address for Correspondence 1 Associate Professor department o f Computer Engineering
More informationSecuring Web Accounts Using Graphical Password Authentication through MD5 Algorithm
Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Siddheshwar A. Suratkar Rahul A. Udgirkar Pratik D. Kale Amit A. Shelke Mohsin H. Shaikh Prof. D. C. Dhanwani Prof. CSE,
More informationGraphical User Authentication
Graphical User Authentication LALZIRTIRA (211CS2058) under the guidance of Prof. SANJAY KUMAR JENA Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela 769
More informationCOMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationNew Era of authentication: 3-D Password
New Era of authentication: 3-D Password Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar Abstract Current authentication systems suffer from many weaknesses. Textual passwords are commonly used.
More informationInternational Journal of Pure and Applied Sciences and Technology
Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis
More informationA Graphical PIN Authentication Mechanism for Smart Cards and Low-Cost Devices
A Graphical PIN Authentication Mechanism for Smart Cards and Low-Cost Devices Luigi Catuogno Dipartimento di Informatica ed Applicazioni Università di Salerno - ITALY [luicat@dia.unisa.it] Clemente Galdi
More informationDEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abdul Rasheed. Sk 1 Asst. Professor Narasaraopeta Engineering College, Narasaraopet. rasheed4321@gmail.com
More informationPixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style
International Journal of Information and Communication Sciences 2018; 3(3): 104-109 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.14 ISSN: 2575-1700 (Print); ISSN: 2575-1719
More informationMODULE NO.28: Password Cracking
SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature
More informationA GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationA Survey on Different Graphical Password Authentication Techniques
A Survey on Different Graphical Password Authentication Techniques Saranya Ramanan 1, Bindhu J S 2 PG scholar, Department of Computer Science, College of Engineering, Perumon, Kerala, India 1 Associate
More informationDEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Chippy.T chippyrevathy@gmail.com Dhanalakshmi Srinivasan Engineering College R.Nagendran nanonagendran@gmail.com
More informationDesign & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique
Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique ABSTRACT: Many security primitives are based on hard mathematical problems. Using hard AI problems for
More informationM.Ashwini 1,K.C.Sreedhar 2
Improved Persuasive Cued Click Points For Knowledge-Based Authentication M.Ashwini 1,K.C.Sreedhar 2 1 M.Tech Student, Dept of CSE, QIS College of Engineering & technology, Ongole, Prakasam Dist, A.P, India
More informationThe Design and Implementation of Background Pass-Go Scheme Towards Security Threats
The Design and Implementation of Background Pass-Go Scheme Towards Security Threats L. Y. Por 1, X. T. Lim 2, M.T. Su 3, F. Kianoush 4 Faculty of Computer Science and Information Technology, University
More informationA Model to Restrict Online Password Guessing Attacks
A Model to Restrict Online Password Guessing Attacks Aqib Malik, Dr. Sanjay Jamwal Department of Computer Science, Baba Ghulam Shah Badshah University, Rajouri, J&K, India Abstract Passwords are a critical
More informationA Novel Approach for Software Implementation of Graphical Authentication Methodology
A Novel Approach for Software Implementation of Graphical Authentication Methodology Murtaza Alamshah School Of Information Technology Vellore Institute of Technology Vellore, India murtazaalamshah@gmail.com
More informationCARP: CAPTCHA as A Graphical Password Based Authentication Scheme
CARP: CAPTCHA as A Graphical Password Based Authentication Scheme Shraddha S. Banne 1, Prof. Kishor N. Shedge 2 Student, Dept. of Computer Engg, S.V.I.T, Chincholi, Sinnar, Nashik, India 1 Assistant Professor,
More informationA Survey On Resisting Shoulder Surfing Attack Using Graphical. password
A Survey On Resisting Shoulder Surfing Attack Using Graphical Password Mayuri Gawandi 1,Saloni Pate 2,Pokharkar Snehal 3,Prof.Said S.K. 4 Abstract Now a days India is moving towards a digital India while
More informationKNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS
http:// KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS G Anil Kumar 1, K Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor (CSE), Nalanda Institute of Engineering
More informationImplementing a Secure Authentication System
Implementing a Secure Authentication System BRUNO CARPENTIERI Dipartimento di Informatica Università di Salerno Via Giovanni Paolo II ITALY bc@dia.unisa.it Abstract: One of the most used techniques for
More informationImplementation of Color based Android Shuffling Pattern Lock
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationFORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM
FORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM V Anusha 1, T Lakshmi Priya 2 1 M.Tech Scholar (CSE), Nalanda Institute of Tech. (NIT), Siddharth Nagar, Guntur, A.P, (India) 2 Assistant
More informationKeywords security model, online banking, authentication, biometric, variable tokens
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication
More informationInternational Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015
Persuasive Cued Click Point Authentication Mechanism with Sound Signature MOUNESHWAR KANAMADI 1,AMIT SAWANT 2,JAMDADE MARUTI 3,4 MEGHARANI BAMBUGADE, 5 ROKADE KOMAL 1 Department of CSE, Ashokrao Mane Group
More informationRandomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 04 September 2015 ISSN (online): 2349-6010 Randomized Image Passwords and A QR Code based Circumnavigation Mechanism
More informationIssues, Threats and Future Trend for GSP
Issues, Threats and Future Trend for GSP L. Y. POR 1, X. T. LIM 2 Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur, MALAYSIA porlip@um.edu.my 1, emilylim1986@hotmail.com
More informationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati 1 and Shashi Mogalla 2 1 Department of Computer Science and Engineering RVR & JC College of Engineering, Guntur, A.P. e-mail:
More informationA Survey on Graphical Passwords in Providing Security
A Survey on Graphical Passwords in Providing Security Mrs. Anuradha. V #, Mr.M.Nagesh *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering & Technology, JNTU Hyderabad
More informationEnhancing CAPTCHA based Image Authentication for ID and Password
ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Enhancing CAPTCHA based Image Authentication for E-mail ID and Password 1MACHARLA
More informationChoCD: Usable and Secure Graphical Password Authentication Scheme
Indian Journal of Science and Technology, Vol 10(4), DOI: 10.17485/ijst/2017/v10i4/110885, January 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 ChoCD: Usable and Secure Graphical Password Authentication
More informationSecure Usable Authentication Using Strong Pass text Passwords
I. J. Computer Network and Information Security, 2015, 3, 57-64 Published Online February 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2015.03.08 Secure Usable Authentication Using Strong
More informationA Password Authentication Method Tolerant to Video-recording Attacks analyzing Multiple Authentication Operations
A Password Authentication Method Tolerant to Video-recording Attacks analyzing Multiple Authentication Operations Yutaka Hirakawa, Yutaro Kogure, and Kazuo Ohzeki Abstract User authentication is widely
More informationSummary
The Imperva Application Defense Center (ADC) ADC White Paper Summary In December 2009, a major password breach occurred that led to the release of 32 million passwords 1. Further, the hacker posted to
More informationColorDots: An Intersection Analysis Resistant Graphical Password Scheme for the Prevention of Shoulder-surfing Attack
UNF Digital Commons UNF Theses and Dissertations Student Scholarship 2012 ColorDots: An Intersection Analysis Resistant Graphical Password Scheme for the Prevention of Shoulder-surfing Attack Jim Littleton
More informationISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Survey on Recall-Based Graphical User Authentications Algorithms
A Survey on Recall-Based Graphical User Authentications Algorithms D.Aarthi 1, Dr.K.Elangovan 2 1 School of Computer Science and Engineering, Bharathidasan University, Trichy, India 2 School of Computer
More informationEnhanced Textual Password Scheme for Better Security and Memorability
Enhanced Textual Password Scheme for Better Security and Memorability Hina Bhanbhro Department of Computer Syst. Eng. Faculty of Electrical, Electronics & Computer Systems Engineering Shaheed Benazir Bhutto
More informationA PIN Entry Scheme Resistant to Recording-based Shoulder-Surfing
2009 Third International Conference on Emerging Security Information, Systems and Technologies A PIN Entry Scheme Resistant to Recording-based Shoulder-Surfing Peipei Shi, Bo Zhu, and Amr Youssef Concordia
More informationPresented By: Miss Samya Ashraf Want Student ID
Paper: Haichang Gao, Xiyang Liu, Sidong Wang and Honggang Liu, Ruyi Dai, Design and Analysis of a Graphical Password Scheme, Fourth International Conference on Innovative Computing, Information and Control,
More informationComputer security experts often tell us not to choose an easy to guess word as a password. For example, the user name or date of birth.
Graphical Passwords: Computer security experts often tell us not to choose an easy to guess word as a password. For example, the user name or date of birth. The Graphical Passwords team have been working
More informationHumanAUT Secure Human Identification Protocols
HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University What is HumanAUT?! HumanAUT stands for Human AUThentication " Authentication:
More informationA SURVEY ON IMPROVEMENT OF A PIN- ENTRYMETHOD RESILIENT TO SHOULDER- SURFING ANDRECORDING ATTACKS
A SURVEY ON IMPROVEMENT OF A PIN- ENTRYMETHOD RESILIENT TO SHOULDER- SURFING ANDRECORDING ATTACKS MAYUR SHINDE 1, ADITYA KULKARNI 2, HRUSHIKESH DOLAS 3,PALLAVI TEKE 4 1 Dept. of Computer Engineering, Sinhgad
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 12, December-2013 13 Analysis Of Three-Dimensional Password Scheme Chaitali A. Kurjekar, Shital D. Tatale, Sachin M. Inzalkar
More informationSECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationMIBA: Multitouch Image-Based Authentication on Smartphones
MIBA: Multitouch Image-Based Authentication on Smartphones Daniel Ritter daniel.ritter@uni-ulm.de Florian Schaub florian.schaub@uni-ulm.de Marcel Walch marcel.walch@uni-ulm.de Michael Weber michael.weber@uni-ulm.de
More informationA Tabular Steganography Scheme for Graphical Password Authentication
UDC 004.738.5, DOI:10.2298/CSIS081223028L A Tabular Steganography Scheme for Graphical Password Authentication Tsung-Hung Lin 1, Cheng-Chi Lee 2,4, Chwei-Shyong Tsai 3, and Shin-Dong Guo 4 1 Department
More informationSumy State University Department of Computer Science
Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are
More informationNovel Security Method Using Captcha as Graphical Password
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 2, February 2015, PP 18-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Novel Security Method Using Captcha as
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationAlgorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers
Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers Mohammed Farik, ABM Shawkat Ali Abstract: Issues of weak login passwords arising from default passwords in wired and wireless
More informationCaptcha as Textual Passwords with Click Points to Protect Information
Captcha as Textual Passwords with Click Points to Protect Information Sandeep Kumar Vengala Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer
More informationGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence Muhammad Ahsan 1, Yugang Li 2 1Student, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China 2School of Computer
More informationUser Authentication. Daniel Halperin Tadayoshi Kohno
CSE 484 / CSE M 584 (Autumn 2011) User Authentication Daniel Halperin Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others
More informationCARP-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.12
More information5-899 / Usable Privacy and Security Text Passwords Lecture by Sasha Romanosky Scribe notes by Ponnurangam K March 30, 2006
5-899 / 17-500 Usable Privacy and Security Text Passwords Lecture by Sasha Romanosky Scribe notes by Ponnurangam K March 30, 2006 1 Topics covered Authentication and authorization Pass-sentences, pass-phrases
More informationSecurity server using CAPTCHA. Introduction to CAPTCHA
Security server using CAPTCHA Introduction to CAPTCHA A key area in security research and practice is authentication, the determination of whether a user should be allowed to access to a given system or
More informationAvailable Online through
D. Saravanan*et al. /International Journal of Pharmacy & Technology Available Online through ISSN: 0975-766X CODEN: IJPTFI Research Article www.ijptonline.com VALIDATION OF SECRET CODE USING IMAGE BASED
More information