27,845 research outputs found

    Authentication for the System by using Graphical Region and Alphanumeric Password

    Get PDF
    Security in the computer is largely supported by the passwords for authentication process. The common computer authentication method is to use alphanumerical usernames and passwords. However, users have complexity remembering a password that is long and random appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and more secure. The graphical password provides a promising alternative to traditional alphanumeric passwords. In this paper, graphical passwords have been introduced as an alternative to authentication schemes. Though the graphical password scheme helps in generating more user friendly passwords, they are still weak to shoulder surfing. To address this issue, text along with image can be combined to generate more secure password. In this paper we developed a design of graphical region and alphanumeric password system as to click on image along with text and select the region rather than type only alphanumeric characters. DOI: 10.17762/ijritcc2321-8169.15050

    Authentication System Using Text Passwords Along With Persuasive Cued Click Points

    Get PDF
    This paper presents an implementation of a two level authentication using a combination of text passwords and persuasive cued click points on three or five images. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are vulnerable to eavesdropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords have been introduced as an alternative to textual passwords. But same as textual passwords, shoulder surfing attacks make most of the graphical schemes vulnerable. To address this problem, textual passwords can be combined with graphical schemes in what gives a two level security without the use of additional hardware. This paper also presents an evaluation of the text based passwords and graphical password schemes which have been tested previously but failed, including usability and security evaluations

    INTEGRATION OF AUDIO IN IMAGE PASSWORD PROTECTION SYSTEM

    Get PDF
    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. There for, this work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method

    Graphical Password: Usable Graphical Password Prototype

    Full text link
    Recently, graphical passwords have become a viable alternative to the conventional passwords due to their security and USAbility features. However, there are very limited researches in classifying, analyzing and development of the graphical password techniques. In this paper, we will propose a new USAble graphical password prototype of the recognition base graphical password. In this design we will focus on the USAbility features of the system to give new USAble graphical password system.Ă‚ Graphical passwords schemes are an alternative authentication method of the conventional password scheme in which users click on images to authenticate themselves rather than type the conventional passwords as letters or numbers or mixed. This research aims to design and come out with a new USAble graphical password prototype with the major important USAbility features. In this paper we will focus on implementation of the USAbility features on the new graphical password prototype design. This USAbility set includes the easy of use, memorize, creation, learning and satisfaction. Moreover, this work proposes to build a new system of graphical password system that provides promising USAbility features

    Pico: No More Passwords!

    Get PDF
    Abstract. From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for implementers, for users they are increasingly unmanageable. The demands placed on users (passwords that are unguessable, all different, regularly changed and never written down) are no longer reasonable now that each person has to manage dozens of passwords. Yet we can’t abandon passwords until we come up with an alternative method of user authentication that is both usable and secure. We present an alternative design based on a hardware token called Pico that relieves the user from having to remember passwords and PINs. Unlike most alternatives, Pico doesn’t merely address the case of web passwords: it also applies to all the other contexts in which users must at present remember passwords, passphrases and PINs. Besides relieving the user from memorization efforts, the Pico solution scales to thousands of credentials, provides “continuous authentication ” and is resistant to brute force guessing, dictionary attacks, phishing and keylogging. 1 Why users are right to be fed up Remembering an unguessable and un-brute-force-able password was a manageable task twenty or thirty years ago, when each of us had to use only one or two. Since then, though, two trends in computing have made this endeavour much harder. First, computing power has grown by several orders of magnitude: once upon a time, eight characters were considered safe from brute force 1; nowadays, passwords that are truly safe from brute force and from advanced guessing attacks 2 typically exceed the ability of ordinary users to remember them 3 4. Second, and most important, the number of computer-based services with which It’s OK to skip all these gazillions of footnotes

    Should the FTC Kill the Password? The Case for Better Authentication

    Get PDF
    Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authentication is the use of passwords, but passwords are a severely flawed means of authentication. People are being asked to do a nearly impossible task – create unique, long, and complex passwords for each of the numerous accounts they hold, change them frequently, and remember them all. People do very poorly in following these practices, and even if they manage to do so, hackers and phishers can readily trick people into revealing their passwords. There is widespread consensus about the problems with passwords. Better alternative authentication techniques exist, such as two factor authentication, yet organizations have been slow to move to these alternatives. In this essay we argue that in certain circumstances, the FTC should start requiring better methods of authentication than passwords alone. We explore the foundation in current FTC jurisprudence for such action, and suggest how the FTC should start making the push toward improved authentication
    • …
    corecore