graphical passwords
TRANSCRIPT
![Page 1: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/1.jpg)
Graphical Passwords
![Page 2: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/2.jpg)
Graphical Passwords
(1) Why graphical passwords? Pictures are easy to remember or recognized than text..
(2) Are graphical passwords as secure as text passwords?
(3) What are the major design and implementation issues for graphical passwords?
![Page 3: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/3.jpg)
Random Image
Based on hash visualization techniques.
![Page 4: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/4.jpg)
Passfaces
![Page 5: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/5.jpg)
Passlogix
![Page 6: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/6.jpg)
Pass Point
![Page 7: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/7.jpg)
Based on JPEG 2000
![Page 8: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/8.jpg)
Random Image
![Page 9: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/9.jpg)
Random Image
Based on hash visualization techniques.
![Page 10: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/10.jpg)
Draw-A-Secret (DAS)
![Page 11: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/11.jpg)
Drawing Grid
![Page 12: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/12.jpg)
Graphical Passwords Design
Recognition Based Techniques
Recall Based Techniques (1) Produce a drawing (2) Repeat a sequence of actions
![Page 13: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/13.jpg)
Attack on Graphical Passwords
(1) Brute force search (2) Dictionary attacks(3) Guessing * different person has different choice. * human have some common selections.(4) Spy ware(5) Shoulder surfing(6) Social engineering
![Page 14: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/14.jpg)
Research on Graphical Passwords
(1) Design a new graphical password scheme * can return a random length text password
(2) Use graphical password in public key cryptosystem. * User generate a big number from graphical password. * Convert the big number into a signing private key. * Get a certificate from CA with the generated key. * Embed graphical password into application such as webmail. * User log on webmail, generate his signing key without key file or smart card. * User sign his mail use javascript in the browser without his key exposed.
![Page 15: Graphical Passwords](https://reader034.vdocuments.us/reader034/viewer/2022052304/5583d166d8b42a82768b4de6/html5/thumbnails/15.jpg)
owHtWU1sJNld3yTAIYhDIiEhwaFc9tJtbVW1WBuPLLunep0ea7S0UD1o+TFTbldVetQededFZHu1hRkx50hcIJccc0E5RdyCFI4oHDkhhISQkLiCEMcc896r71fvs7o8O7H89+501fv+1f/7//7mt772wVe/8bMf/2Twix/+9O1X/v6Dr/zaP377q9/+9rNv/uApePD09S/7APdPjxAfAj1CfAj0CPEh0CPEh0CPEB8CPUJ8CPQI8SHQI8SHQI8Q