Академический Документы
Профессиональный Документы
Культура Документы
Introduction
Password is a secret word or string of characters that is used for user authentication to prove ones identity and gain access to resources. Difficulty of remembering text based passwords.
easy to remember easy to guess. hard to guess hard to remember.
According to human psychological studies it has been revealed that human brain recognizes and remembers the images more easily and for longer period than the strings of numbers and letter. Graphical password as an alternative to text based password.
Objective:
Conduct a comprehensive survey of the existing graphical password techniques. Security analysis of the concerned technique. Application of Graphical password. Discuss the strengths and limitations of the concerned method. Point out to future scopes.
Authentication
It is basically a process of confirmation of an individuals identity.
Types:
Token Based. Numeric password, pin no., smart card, band cards etc. Bio-metric Based. Finger print, facial & voice recognition, dynamic signature verification, iris & retinal scan. Knowledge Based. Recognition based system, Recall based system, Cued recall based system. o Recognition based systems i.e. texts and picture based passwords are most widely used authentication techniques.
Graphical Password
A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).
An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
Signature scheme
o Here authentication is conducted by having the user drawing their signature using a mouse.
Other Schemes
B-DAS Scheme
o password space: N!/K! (N-K)! ( N-total number of pictures; K-number of pictures selected as passwords)
(pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
Security:
Some graphical password techniques are very resistive towards phishing attacks like DAS scheme. Brute force search / Dictionary attacks:
The attacking programs need to automatically generate accurate mouse motion to imitate human input, which is more difficult compared to text passwords.
APPLICATION:
Workstation. Web Log-in Application. ATM Machines. Mobile Devices. Logging Into Accounts. Retrieving Emails. Online Banking. Social Networking. Websites. Databases.
Advantages
Graphical password schemes provide a way of making more human friendly passwords while increasing the level of security.
With confident image shield, one can create one time authentication code for each transaction or online session.
Drawbacks
In the Grid based methods It is really hard to remember the exact coordinates of the grid.
DAS scheme has some limitations like it is vulnerable to shoulder surfing attack if a user accesses the system in public environments . Password registration and log-in process take too long.
CONCLUSION
People are better at memorizing graphical passwords than text-based passwords. It is more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack or spyware. Not yet widely used, current graphical password techniques are still immature enough for efficient implementation and hence require more research in this field.
SCOPE
Development of some graphical password schemes that are resistant to shoulder surfing. Development of A password scheme strongly resistant to spyware. Implementation of more user friendly Grid Based Authentication Technique.