gpa-140708103144-phpapp02.pptx

17
Graphical Password Authentication Seminar On.. Submitted By: Achal S. Khawale. Guided By: Prof.S.N.Khandare. Department Of (M.C.A.3 rd ) H.V.P.M. Amravati. 2013-2014

Upload: shashankraghav

Post on 07-Sep-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Graphical Password Authentication

Graphical PasswordAuthenticationSeminar On..Submitted By: Achal S. Khawale.Guided By: Prof.S.N.Khandare.Department Of (M.C.A.3rd)H.V.P.M. Amravati.2013-2014

Contents: Introduction Graphical Password Advantages of Graphical Password Drawbacks Solution to Shoulder Surfing Problem Usability Conclusion

Introduction: Most common computer authentication method (Text-Based Passwords). Difficulty of remembering passwords. Easy to remember => Easy to guess Hard to guess => Hard to remember Users tend to write passwords down or use the same passwords for different accounts. An alternative: Graphical Passwords. Psychological studies: Human can remember pictures better than text.

Graphical Password: An authentication system that works by having the user selectfrom images, in a specific order, presented in a graphical user interface (GUI).

The graphical-password approach is sometimes called graphicaluser authentication (GUI).

Classification Techniques: Recognition Based Techniques: A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.

Recall Based Techniques: A user is asked to reproduce something that he created or selected earlier during the registration stage.

Classification Techniques: Recognition Based Techniques: A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.

Recall Based Techniques: A user is asked to reproduce something that he created or selected earlier during the registration stage.

Recognition Based Techniques: Dhamija & Perring Scheme: Pick several pictures out of manychoices, identify later inauthentication. Take longer to create graphicalpasswords. Sobrado & Birget Scheme: Systems display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull ounded by pass-objects.

Recognition Based Techniques: Other Schemes:

Using human faces as password Select a sequence of images as password

Recall Based techniques: Draw-A-Secret (DAS) Scheme: User draws a simple picture on 2D grid, the co ordinates of the grids occupied by the picture are stored in the order of drawing.

Redrawing has to touch thesame grids in the samesequences in authentication.

Advantages of Graphical Passwords: Provide a way of making more human-friendly passwords while increasing the level of security.

On averagemillions of years to break into the system.

Dictionary attacks are infeasible.

Drawbacks: The shoulder surfing problem: As the name implies, shoulder is watching over peoples shoulders as they process information. Example includes observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.

Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing. Most of the existing schemes simple circumvent the problem by stating the graphical passwords should only be used with handheld devices or workstation set up in such a way that only one person can see the screen at the time of login.However, it is possible to create schemes to counter shoulder surfing problem.

Solution of Shoulder surfing problem:Triangle Scheme:Movable Frame Scheme:

Usability: Pictures are easier to remember than text strings. Password registration and login process take too long. Require much more storage space than text based passwords.

Conclusion: Main argument for Graphical Password: Satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. More difficult to break graphical passwords from traditional attack methods: Brute Force Search Dictionary Attack Spyware Not yet widely used, current graphical password techniques are still immature. By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.

Reference www.searchsecurity.teachtarget.com www.acsac.org www.ieexplorer.ieee.org

QUESTIONS

Thank You.!!!