SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1611-1615
    Authentication Mechanisim For Session Passwords By Imposing
                          Color With Text
                       K.Nivetha1, M. Muthumeena2, R. Srinivasan3
         1,2
           PG Scholar, Dept of CSE, Vel Tech DR.RR & DR.SR Technical University, Avadi, Chennai-62.
   3
       Assistant Professor, Dept of CSE, Vel Tech DR.RR & DR.SR Technical University, Avadi, Chennai-62.


ABSTRACT
         The most common method used for                   (PDs) are being used by the people to store their
authentication is Textual passwords. But textual           personal and confidential information like
passwords are in risk to eves dropping,                    passwords and PIN numbers. Authentication
dictionary attacks, social engineering and                 should be provided for the usage of these devices.
shoulder surfing. Graphical passwords are                  In this paper, two new authentication schemes are
introduced as alternative techniques to textual            proposed for PDAs. These schemes authenticate
passwords. Most of the graphical schemes are               the user by session passwords. Session passwords
helpless to shoulder surfing. To address this              are passwords that are used only once. Once the
problem, text can be combined with images or               session is terminated, the session password is no
colors to generate session passwords for                   longer useful. For every login process, users input
authentication. Session passwords can be used              different passwords.       The session passwords
only once and every time a new password is                 provide better security against dictionary and brute
generated. In this paper, two techniques are               force attacks as password changes for every
proposed to generate session passwords using               session. The proposed authentication schemes use
text and colors which are resistant to shoulder            text and colors for generating session passwords.
surfing. These methods are suitable for Personal
Digital Assistants.                                        2. RELATED WORKS
                                                           Dhamija and Perrig proposed a graphical
Key words: Authentication, session passwords,              authentication scheme based on the Hash
shoulders surfing, Eves dropping.                          Visualization technique. In this system, the user
                                                           selects a certain number of images from a set of
1. INTRODUCTION                                            random pictures during registration. Later, during
          The most common method used for                  login the user has to identify the pre selected
authentication      is   textual   password.     The       images for authentication from a set of images as
vulnerabilities of this method like eves dropping,         shown in figure 1. Also, the process of selecting a
dictionary attack, social engineering and shoulder         set of pictures from the picture database can be
surfing are well known. Arbitrary and lengthy              tedious and time consuming for the user.
passwords can make the system secure. But the              Akula and Devisetty’s algorithm is similar to the
main problem is the difficulty of remembering              technique proposed by Dhamija and Perrig. The
those passwords. Studies have shown that users             difference is that by using hash function SHA-1,
tend to pick short passwords or passwords that are         which produces a 20 byte output, the authentication
easy to remember. Unfortunately, these passwords           is secure and require less memory. The authors
can be easily guessed or broken. The alternative           suggested a possible future improvement by
techniques are graphical passwords and biometrics.         providing persistent storage and this could be
But these two techniques have their own                    deployed on the Internet, cell phones and PDA's.
disadvantages. Biometrics, such as finger prints,
iris scan or facial recognition have been introduced
but not yet widely adopted. The major drawback
of this approach is that such systems can be
expensive and the identification process can be
slow. There are many graphical password schemes
that are proposed in the last decade. But most of
them suffer from shoulder surfing which is
becoming quite a big problem. There are graphical
passwords schemes that have been proposed which
are resistant to shoulder-surfing but they have their
own drawbacks like usability issues or taking more
time for user to login. Personal Digital Assistants



                                                                                              1611 | P a g e
K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1611-1615

Figure 1.Random images used by Dhamija and
Perrig.

“Pass face” is a technique developed by Real User           that people can recall human faces easier than other
Corporation the user will be asked to choose four           pictures.
images of human faces from a face database as
their future password. In the authentication stage,
the user sees a grid of nine faces, consisting of one
face previously chosen by the user and eight decoy
faces (Figure 2). The user recognizes and clicks
anywhere on the known face. This procedure is
repeated for several rounds. The user is
authenticated if he/she correctly identifies the four
faces. The technique is based on the assumption             Figure 2. An example of Pass faces.


Davis, et al. Studied the graphical passwords               their unique password (figure 4). A user is asked to
created using the Pass face technique and found             draw a simple picture on a 2D grid. The
obvious patterns among these passwords. For                 coordinates of the grids occupied by the picture are
example, most users tend to choose faces of people          stored in the order of the drawing. During
from the same race. This makes the Pass face                authentication, the user is asked to re-draw the
password somewhat predictable. This problem may             picture. If the drawing touches the same grids in
be alleviated by arbitrarily assigning faces to users,      the same sequence, then the user is authenticated.
but doing so would make it hard for people to               This authentication scheme is vulnerable to
remember the password.                                      shoulder surfing.
Jermyn, et al. proposed a technique, called “Draw -
a - secret (DAS)”, which allows the user to draw




                                      Figure 4. (DAS) technique proposed by Jermyn.

                                                            3.  NEWEST     METHODS                        FOR
         To overcome shoulder-surfing challenge,            AUTHENTICATION
many methods have been proposed. One of such                          Authentication technique consists of 3
technique is designed by Man, et al[10].In this             phases: registration phase, login phase and
system, the user selects many portraits as the pass         verification phase. During registration, user enters
objects. Each pass object is allotted an inimitable         his password in first method or rates the colors in
code. During the verification process, the user has         the second method. During login phase, the user
to input those unique codes of the pass objects in          has to enter the password based on the interface
the login interfaces presented by the System.               displayed on the screen. The system verifies the
Though the scheme resists the hidden camera, the            password entered by comparing with content of the
user has to memorize all pass object codes. In this         password generated during registration.
way, many other graphical authentication schemes
and their drawbacks are presented in a latest survey        3.1. PAIR-BASED             AUTHENTICATION
paper                                                       METHOD


                                                                                               1612 | P a g e
K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1611-1615
During registration user submits his password.                  login phase, when the user enters his username an
Minimum length of the password is 8 and it can be               interface consisting of a grid is displayed. The grid
called as secret pass. The secret pass should contain           is of size 6 x 6 and it consists of alphabets and
even number of characters. Session passwords are                numbers. These are randomly placed on the grid
generated based on this secret pass. During the                 and the interface changes every time.




                                         Figure 5: Login interface.
Figure 5 shows the login interface. User has to           pairs. The session password consists of alphabets
enter the password depending upon the secret pass.        and digits.
User has to consider his secret pass in terms of




                                     Figure: 6 Intersection letter for the pair AN

          The first letter in the pair is used to select        3.2 HYBRID TEXTUAL AUTHENTICATION
the row and the second letter is used to select the             SCHEME
column. The intersection letter is part of the session                   During registration, user should rate colors
password. This is repeated for all pairs of secret              as shown in figure 7. The User should choose the
pass. Figure 6 shows that L is the intersection                 colors from 1 to 8 and they can remember it as
symbol for the pair “AN”. The password entered by               “RLYOBGIP”. Same rating can be given to
the user is verified by the server to authenticate the          different colors. During the login phase, when the
user. If the password is correct, the user is allowed           user enters his username an interface is displayed
to enter in to the system. The grid size can be                 based on the colors selected by the user. The login
increased to include special characters in the                  interface consists of grid of size 8×8. This grid
password.                                                       contains digits 1-8 placed randomly in grid cells.
                                                                The interface also contains strips of colors as
                                                                shown in figure 18. The color grid consists of 4
                                                                pairs of colors. Each pair of color represents the
                                                                row and the column of the grid.




                                                                                                    1613 | P a g e
K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1611-1615




                                     Figure 7: Choosing the colors by the user




                                                  Figure 10: Login interface

          Figure 8 shows the login interface having           DICTIONARY ATTACK
the color grid and number grid of 8 x 8 having                         These are attacks directed towards textual
numbers 1 to 8 randomly placed in the grid.                   passwords. Here in this attack, hacker uses the set
Depending on the ratings given to colors, we get              of dictionary words and authenticate by trying one
the session password. As discussed above, the first           word after one. The Dictionary attacks fails
color of every pair in color grid represents row and          towards our authentication systems because session
second represents column of the number grid. The              passwords are used for every login.
number in the intersection of the row and column                       Shoulder Surfing These techniques are
of the grid is part of the session password. Consider         Shoulder Surfing Resistant. In Pair based scheme,
the figure 9 ratings and figure 10 login interfaces           resistance is provided by the fact that secret pass
for demonstration. The first pair has red and yellow          created during registration phase remains.
colors. The red color rating is 1 and yellow color
rating is 3. So the first letter of session password is       5. CONCLUSION
1st row and 3rd column intersecting element i.e. 3.                     In this paper, two authentication
The same method is followed for other pairs of                techniques based on text and colors are proposed
colors. For figure 8 the password is “3573”. Instead          for PDAs. These techniques generate session
of digits, alphabets can be used. For every login,            passwords and are resistant to dictionary attack,
both the number grid and the color grid get                   brute force attack and shoulder-surfing. Both the
randomizes so the session password changes for                techniques use grid for session passwords
every session.                                                generation. Pair based technique requires no special
                                                              type of registration; during login time based on the
4. ANALYSIS FOR SECURITY                                      grid displayed a session password is generated. For
         As the interface changes every time, the             hybrid textual scheme, ratings should be given to
session password changes. This technique is                   colors, based on these ratings and the grid
resistant to shoulder surfing. Due to dynamic                 displayed during login, session passwords are
passwords, dictionary attack is not applicable.               generated. However these schemes are completely
Hidden camera attacks are not applicable to PDAs              new to the users and the proposed authentication
because it is difficult to capture the interface in the       techniques should be verified extensively for
PDAs.                                                         usability and effectiveness.

                                                                                                 1614 | P a g e
K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1611-1615
REFERENCES                                          [14] S. Man, D. Hong, and M. Mathews, "A
 [1]    R. Dhamija and A. Perrig. “Déjà Vu: A                 shoulder surfing resistant graphical
        User     Study      Using     Images     for          password scheme," in Proceedings of
        Authentication”. In 9th USENIX Security               International conference on security and
        Symposium, 2000.                                      management. Las Vegas, NV, 2003.
 [2]    Real User Corporation: Passfaces.              [15]   X. Suo, Y. Zhu and G. Owen, “Graphical
        www.passfaces.com                                     Passwords: A Survey”. In Proc.
 [3]    Jermyn, I., Mayer A., Monrose, F., Reiter,            ACSAC'05.
        M., and Rubin, “The design and analysis        [16]   Z. Zheng, X. Liu, L. Yin, Z. Liu “A
        of graphical passwords” in Proceedings of             Hybrid password authentication scheme
        USENIX Security Symposium, August                     based on shape and text” Journal of
        1999.                                                 Computers, vol.5, no.5 May 2010.
 [4]    A. F. Syukri, E. Okamoto, and M.               [17]   M. Sreelatha, M. Shashi , M. Anirudh
        Mambo, "A User Identification System                  ,MD Sultan Ahamer 1, Network Security
        Using Signature Written with Mouse," in               & Its Applications Vol.3, No.3, May
        Third Australasian Conference on                      2011.
        Information      Security and Privacy
        (ACISP): Springer- Verlag Lecture Notes
        in Computer Science (1438), 1998, pp.
        403-441.
 [5]    G. E. Blonder, "Graphical passwords," in
        Lucent Technologies, Inc., Murray Hill,
        NJ, U. S. Patent, Ed. United States, 1996.
 [6]    Passlogix, site http://www.passlogix.com.
 [7]    Haichang Gao, Zhongjie Ren, Xiuling
        Chang, Xiyang Liu Uwe Aickelin, “A
        New Graphical Password Scheme
        Resistant to Shoulder-Surfing
 [8]    S. Wiedenbeck, J. Waters, J.C. Birget, A.
        Brodskiy, N. Memon, “Design and
        longitudinal evaluation of a graphical
        password system”. International J. of
        Human-Computer Studies 63 (2005) 102-
        127.
 [9]    W. Jansen, "Authenticating Mobile
        Device User through Image Selection," in
        Data Security, 2004.
 [10]   W. Jansen, "Authenticating Users on
        Handheld Devices “in Proceedings of
        Canadian       Information       Technology
        Security Symposium, 2003.
 [11]    D. Weinshall and S. Kirkpatrick,
        "Passwords You’ll Never Forget, but
        Can’t Recall," in Proceedings of
        Conference on Human Factors in
        Computing Systems (CHI). Vienna,
        Austria: ACM, 2004, pp. 1399-1402.
 [12]   J. Goldberg, J. Hagman, V. Sazawal,
        "Doodling      Our      Way      to   Better
        Authentication", CHI '02 extended
        abstracts on Human Factors in Computer
        Systems, 2002.
 [13]   H. Zhao and X. Li, "S3PAS: A Scalable
        Shoulder-Surfing       Resistant    Textual-
        Graphical      Password       Authentication
        Scheme," in 21st International Conference
        on Advanced Information Networking and
        Applications Workshops (AINAW 07),
        vol. 2. Canada, 2007, pp. 467-472.



                                                                                      1615 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 

Was ist angesagt? (19)

3d passwords
3d passwords 3d passwords
3d passwords
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
3 d password
3 d password3 d password
3 d password
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3d password
3d password3d password
3d password
 
3D password
3D password 3D password
3D password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D password
3D password3D password
3D password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D - password
3D - password3D - password
3D - password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 

Ähnlich wie Authentication using color-coded text passwords

graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 

Ähnlich wie Authentication using color-coded text passwords (20)

graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 

Authentication using color-coded text passwords

  • 1. K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1611-1615 Authentication Mechanisim For Session Passwords By Imposing Color With Text K.Nivetha1, M. Muthumeena2, R. Srinivasan3 1,2 PG Scholar, Dept of CSE, Vel Tech DR.RR & DR.SR Technical University, Avadi, Chennai-62. 3 Assistant Professor, Dept of CSE, Vel Tech DR.RR & DR.SR Technical University, Avadi, Chennai-62. ABSTRACT The most common method used for (PDs) are being used by the people to store their authentication is Textual passwords. But textual personal and confidential information like passwords are in risk to eves dropping, passwords and PIN numbers. Authentication dictionary attacks, social engineering and should be provided for the usage of these devices. shoulder surfing. Graphical passwords are In this paper, two new authentication schemes are introduced as alternative techniques to textual proposed for PDAs. These schemes authenticate passwords. Most of the graphical schemes are the user by session passwords. Session passwords helpless to shoulder surfing. To address this are passwords that are used only once. Once the problem, text can be combined with images or session is terminated, the session password is no colors to generate session passwords for longer useful. For every login process, users input authentication. Session passwords can be used different passwords. The session passwords only once and every time a new password is provide better security against dictionary and brute generated. In this paper, two techniques are force attacks as password changes for every proposed to generate session passwords using session. The proposed authentication schemes use text and colors which are resistant to shoulder text and colors for generating session passwords. surfing. These methods are suitable for Personal Digital Assistants. 2. RELATED WORKS Dhamija and Perrig proposed a graphical Key words: Authentication, session passwords, authentication scheme based on the Hash shoulders surfing, Eves dropping. Visualization technique. In this system, the user selects a certain number of images from a set of 1. INTRODUCTION random pictures during registration. Later, during The most common method used for login the user has to identify the pre selected authentication is textual password. The images for authentication from a set of images as vulnerabilities of this method like eves dropping, shown in figure 1. Also, the process of selecting a dictionary attack, social engineering and shoulder set of pictures from the picture database can be surfing are well known. Arbitrary and lengthy tedious and time consuming for the user. passwords can make the system secure. But the Akula and Devisetty’s algorithm is similar to the main problem is the difficulty of remembering technique proposed by Dhamija and Perrig. The those passwords. Studies have shown that users difference is that by using hash function SHA-1, tend to pick short passwords or passwords that are which produces a 20 byte output, the authentication easy to remember. Unfortunately, these passwords is secure and require less memory. The authors can be easily guessed or broken. The alternative suggested a possible future improvement by techniques are graphical passwords and biometrics. providing persistent storage and this could be But these two techniques have their own deployed on the Internet, cell phones and PDA's. disadvantages. Biometrics, such as finger prints, iris scan or facial recognition have been introduced but not yet widely adopted. The major drawback of this approach is that such systems can be expensive and the identification process can be slow. There are many graphical password schemes that are proposed in the last decade. But most of them suffer from shoulder surfing which is becoming quite a big problem. There are graphical passwords schemes that have been proposed which are resistant to shoulder-surfing but they have their own drawbacks like usability issues or taking more time for user to login. Personal Digital Assistants 1611 | P a g e
  • 2. K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1611-1615 Figure 1.Random images used by Dhamija and Perrig. “Pass face” is a technique developed by Real User that people can recall human faces easier than other Corporation the user will be asked to choose four pictures. images of human faces from a face database as their future password. In the authentication stage, the user sees a grid of nine faces, consisting of one face previously chosen by the user and eight decoy faces (Figure 2). The user recognizes and clicks anywhere on the known face. This procedure is repeated for several rounds. The user is authenticated if he/she correctly identifies the four faces. The technique is based on the assumption Figure 2. An example of Pass faces. Davis, et al. Studied the graphical passwords their unique password (figure 4). A user is asked to created using the Pass face technique and found draw a simple picture on a 2D grid. The obvious patterns among these passwords. For coordinates of the grids occupied by the picture are example, most users tend to choose faces of people stored in the order of the drawing. During from the same race. This makes the Pass face authentication, the user is asked to re-draw the password somewhat predictable. This problem may picture. If the drawing touches the same grids in be alleviated by arbitrarily assigning faces to users, the same sequence, then the user is authenticated. but doing so would make it hard for people to This authentication scheme is vulnerable to remember the password. shoulder surfing. Jermyn, et al. proposed a technique, called “Draw - a - secret (DAS)”, which allows the user to draw Figure 4. (DAS) technique proposed by Jermyn. 3. NEWEST METHODS FOR To overcome shoulder-surfing challenge, AUTHENTICATION many methods have been proposed. One of such Authentication technique consists of 3 technique is designed by Man, et al[10].In this phases: registration phase, login phase and system, the user selects many portraits as the pass verification phase. During registration, user enters objects. Each pass object is allotted an inimitable his password in first method or rates the colors in code. During the verification process, the user has the second method. During login phase, the user to input those unique codes of the pass objects in has to enter the password based on the interface the login interfaces presented by the System. displayed on the screen. The system verifies the Though the scheme resists the hidden camera, the password entered by comparing with content of the user has to memorize all pass object codes. In this password generated during registration. way, many other graphical authentication schemes and their drawbacks are presented in a latest survey 3.1. PAIR-BASED AUTHENTICATION paper METHOD 1612 | P a g e
  • 3. K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1611-1615 During registration user submits his password. login phase, when the user enters his username an Minimum length of the password is 8 and it can be interface consisting of a grid is displayed. The grid called as secret pass. The secret pass should contain is of size 6 x 6 and it consists of alphabets and even number of characters. Session passwords are numbers. These are randomly placed on the grid generated based on this secret pass. During the and the interface changes every time. Figure 5: Login interface. Figure 5 shows the login interface. User has to pairs. The session password consists of alphabets enter the password depending upon the secret pass. and digits. User has to consider his secret pass in terms of Figure: 6 Intersection letter for the pair AN The first letter in the pair is used to select 3.2 HYBRID TEXTUAL AUTHENTICATION the row and the second letter is used to select the SCHEME column. The intersection letter is part of the session During registration, user should rate colors password. This is repeated for all pairs of secret as shown in figure 7. The User should choose the pass. Figure 6 shows that L is the intersection colors from 1 to 8 and they can remember it as symbol for the pair “AN”. The password entered by “RLYOBGIP”. Same rating can be given to the user is verified by the server to authenticate the different colors. During the login phase, when the user. If the password is correct, the user is allowed user enters his username an interface is displayed to enter in to the system. The grid size can be based on the colors selected by the user. The login increased to include special characters in the interface consists of grid of size 8×8. This grid password. contains digits 1-8 placed randomly in grid cells. The interface also contains strips of colors as shown in figure 18. The color grid consists of 4 pairs of colors. Each pair of color represents the row and the column of the grid. 1613 | P a g e
  • 4. K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1611-1615 Figure 7: Choosing the colors by the user Figure 10: Login interface Figure 8 shows the login interface having DICTIONARY ATTACK the color grid and number grid of 8 x 8 having These are attacks directed towards textual numbers 1 to 8 randomly placed in the grid. passwords. Here in this attack, hacker uses the set Depending on the ratings given to colors, we get of dictionary words and authenticate by trying one the session password. As discussed above, the first word after one. The Dictionary attacks fails color of every pair in color grid represents row and towards our authentication systems because session second represents column of the number grid. The passwords are used for every login. number in the intersection of the row and column Shoulder Surfing These techniques are of the grid is part of the session password. Consider Shoulder Surfing Resistant. In Pair based scheme, the figure 9 ratings and figure 10 login interfaces resistance is provided by the fact that secret pass for demonstration. The first pair has red and yellow created during registration phase remains. colors. The red color rating is 1 and yellow color rating is 3. So the first letter of session password is 5. CONCLUSION 1st row and 3rd column intersecting element i.e. 3. In this paper, two authentication The same method is followed for other pairs of techniques based on text and colors are proposed colors. For figure 8 the password is “3573”. Instead for PDAs. These techniques generate session of digits, alphabets can be used. For every login, passwords and are resistant to dictionary attack, both the number grid and the color grid get brute force attack and shoulder-surfing. Both the randomizes so the session password changes for techniques use grid for session passwords every session. generation. Pair based technique requires no special type of registration; during login time based on the 4. ANALYSIS FOR SECURITY grid displayed a session password is generated. For As the interface changes every time, the hybrid textual scheme, ratings should be given to session password changes. This technique is colors, based on these ratings and the grid resistant to shoulder surfing. Due to dynamic displayed during login, session passwords are passwords, dictionary attack is not applicable. generated. However these schemes are completely Hidden camera attacks are not applicable to PDAs new to the users and the proposed authentication because it is difficult to capture the interface in the techniques should be verified extensively for PDAs. usability and effectiveness. 1614 | P a g e
  • 5. K.Nivetha, M. Muthumeena, R. Srinivasan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1611-1615 REFERENCES [14] S. Man, D. Hong, and M. Mathews, "A [1] R. Dhamija and A. Perrig. “Déjà Vu: A shoulder surfing resistant graphical User Study Using Images for password scheme," in Proceedings of Authentication”. In 9th USENIX Security International conference on security and Symposium, 2000. management. Las Vegas, NV, 2003. [2] Real User Corporation: Passfaces. [15] X. Suo, Y. Zhu and G. Owen, “Graphical www.passfaces.com Passwords: A Survey”. In Proc. [3] Jermyn, I., Mayer A., Monrose, F., Reiter, ACSAC'05. M., and Rubin, “The design and analysis [16] Z. Zheng, X. Liu, L. Yin, Z. Liu “A of graphical passwords” in Proceedings of Hybrid password authentication scheme USENIX Security Symposium, August based on shape and text” Journal of 1999. Computers, vol.5, no.5 May 2010. [4] A. F. Syukri, E. Okamoto, and M. [17] M. Sreelatha, M. Shashi , M. Anirudh Mambo, "A User Identification System ,MD Sultan Ahamer 1, Network Security Using Signature Written with Mouse," in & Its Applications Vol.3, No.3, May Third Australasian Conference on 2011. Information Security and Privacy (ACISP): Springer- Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441. [5] G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996. [6] Passlogix, site http://www.passlogix.com. [7] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing [8] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, “Design and longitudinal evaluation of a graphical password system”. International J. of Human-Computer Studies 63 (2005) 102- 127. [9] W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004. [10] W. Jansen, "Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium, 2003. [11] D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402. [12] J. Goldberg, J. Hagman, V. Sazawal, "Doodling Our Way to Better Authentication", CHI '02 extended abstracts on Human Factors in Computer Systems, 2002. [13] H. Zhao and X. Li, "S3PAS: A Scalable Shoulder-Surfing Resistant Textual- Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472. 1615 | P a g e