219 research outputs found
Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features
AbstractGraphical password can be used as an alternative to text based (alphanumeric) password in which users click on images to set their passwords. Text based password uses username and password. So recalling of password is necessary which may be a difficult one. Images are generally easier to be remembered than text and in Graphical password; user can set images as their password. Therefore graphical password has been proposed by many researchers as an alternative to text based password Graphical passwords can be applied to workstation, web log-in applications, ATM machines, mobile devices etc. This paper presents implementation of Cued click point (CCP) graphical password which uses circular tolerance. Then it is found that CCP with circular tolerance is better as compared to CCP with rectangular tolerance
Implementation of Captcha as Graphical Passwords For Multi Security
To validate human users, passwords play a vital role in computer security. Graphical passwords offer more security than text-based passwords, this is due to the reason that the user replies on graphical passwords. Normal users choose regular or unforgettable passwords which can be easy to guess and are prone to Artificial Intelligence problems. Many harder to guess passwords involve more mathematical or computational complications. To counter these hard AI problems a new Captcha technology known as, Captcha as Graphical Password (CaRP), from a novel family of graphical password systems has been developed. CaRP is both a Captcha and graphical password scheme in one. CaRP mainly helps in hard AI problems and security issues like online guess attacks, relay attacks, and shoulder-surfing attacks if combined with dual view technologies. Pass-points, a new methodology from CaRP, addresses the image hotspot problem in graphical password systems which lead to weak passwords. CaRP also implements a combination of images or colors with text which generates session passwords, that helps in authentication because with session passwords every time a new password is generated and is used only once. To counter shoulder surfing, CaRP provides cheap security and usability and thus improves online security. CaRP is not a panacea; however, it gives protection and usability to some online applications for improving online security
Quantifying the Security of Recognition Passwords: Gestures and Signatures
Gesture and signature passwords are two-dimensional figures created by
drawing on the surface of a touchscreen with one or more fingers. Prior results
about their security have used resilience to either shoulder surfing, a human
observation attack, or dictionary attacks. These evaluations restrict
generalizability since the results are: non-comparable to other password
systems (e.g. PINs), harder to reproduce, and attacker-dependent. Strong
statements about the security of a password system use an analysis of the
statistical distribution of the password space, which models a best-case
attacker who guesses passwords in order of most likely to least likely.
Estimating the distribution of recognition passwords is challenging because
many different trials need to map to one password. In this paper, we solve this
difficult problem by: (1) representing a recognition password of continuous
data as a discrete alphabet set, and (2) estimating the password distribution
through modeling the unseen passwords. We use Symbolic Aggregate approXimation
(SAX) to represent time series data as symbols and develop Markov chains to
model recognition passwords. We use a partial guessing metric, which
demonstrates how many guesses an attacker needs to crack a percentage of the
entire space, to compare the security of the distributions for gestures,
signatures, and Android unlock patterns. We found the lower bounds of the
partial guessing metric of gestures and signatures are much higher than the
upper bound of the partial guessing metric of Android unlock patterns
Attribute Based Secure Data Retrieval System for Decentralized Disruption Tolerant Military Networks
There are partitions in military environments such as a battlefield or a hostile region.They are likely to suffer from intermittent network connectivity.They having frequent partitions. Disruption-tolerant network DTN technologies are is a true and easy solutions.DTN is a Disruption-tolerant network.It allow devices which are wireless and carried by peoples in a military to interact with each other.These devices access the confidential information or command reliably by exploiting external storage nodes. In these networking environments DTN is very successful technology. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the intermediate nodes for a large amount of time until the connection would be correctly established.one of the challenching approach is a ABE.that is attribute-based encryption which fulfills the requirements for secure data retrieval in DTNs. The another concept is Cipher text Policy ABE (CP-ABE).it gives a appropriate way of encryption of data. the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text.hence, Many users can be allowed to decrypt different parts of data according to the security policy
Enhanced Security for Preventing Man-in-the-Middle Attacks in Authentication, DataEntry and Transaction Verification
There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later replayed for financial gain. This ultimately results in loss of monetary funds for affected victims. As technological advances continue to influence the way society makes payment for goods and services, the requirement for more advanced security approaches for transaction verification in the online environment increases. This paper has three main purposes. The first is to detail the current threats and vulnerabilities to online financial systems and in particular online banking, from the selected literature. The second is to present the known prevention techniques for protecting against these attacks. The third is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the design adds another layer of security to existing methods to either prevent a MitM attack or to make the procedure of capturing and reassembling customer log on and transaction details more computationally and time intensive than what it is worth to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph
- …