Graphical password authentication


Published on

Published in: Education, Technology
  • thanks
    Are you sure you want to  Yes  No
    Your message goes here
  • suhas MIT Clg
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Graphical password authentication

  1. 1. PRESENTED BYAsim Kumar PathakCS-47/09
  2. 2. IntroductionOverview of the Authentication MethodsText Password and drawbacks.Graphical Passwords.The surveyRecall Based TechniquesRecognition Based TechniquesDiscussionAdvantagesdisadvantagesConclusion
  3. 3. What is PASSWORDThe term PASSWORD commonly refers to a secret used forauthentication. Passwords are the most commonly used method foridentifying users in computer and communication systems.PASSWORDS are used for: Logging into accounts. Retrieving emails. Accessing applications. Networks. Websites Databases workstations
  4. 4. Token based authentication Key cards, bank cards, smart card, …Biometric based authentication Fingerprints, iris scan, facial recognition, …Knowledge based authentication Text-based passwords, picture-based passwords, … Most widely used authentication techniques
  5. 5. Text PasswordText password is a secret word or string of characters that isused for user authentication to prove his identity and gain accessto resources.Drawback Difficulty of remembering passwords. easy to remember -> easy to guess hard to guess -> hard to remember Vulnerable to attacks like Dictionary attack, Brute forceattack .Many solutions have been proposed. Graphical password isone of the solutions.
  6. 6.  Graphical passwords were originally described by BLONDERin 1996. A graphical password is an authentication system that worksby having the user select from images, in a specificorder, presented in a graphical user interface (GUI). For this reason, the graphical-password approach issometimes called graphical user authentication (GUA).
  7. 7. Use of graphical password: Web log-in application. ATM machine. Mobile device.
  8. 8. Recall Based TechniquesA user is asked to reproduce something that he created orselected earlier during the registration stageRecognition Based TechniquesA user is presented with a set of images and the user passes theauthentication by recognizing and identifying the images heselected during the registration stage
  9. 9. Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of thegrids occupied by the picture are stored in the order of drawing. Redrawing has to touchthe same grids in thesame sequence inauthentication.
  10. 10. Signature schemeHere authentication is conducted by having the user drawingtheir signature using a mouse.
  11. 11. Pass Point SchemeUser click on any place on an image to create a password. Atolerance around each chosen pixel is calculated. In order to beauthenticated, user must click within the tolerances in thecorrect sequence.
  12. 12.  Dhamija and Perrig SchemePick several pictures out of many choices, identify them laterin authentication.
  13. 13.  Passface scheme:In this technique human faces are used as password.
  14. 14.  Sobrado and Birget SchemeSystem display a number of pass-objects (pre-selected by user)among many other objects, user click inside the convex hullbounded by pass-objects.
  15. 15. Advantages of Graphical password Graphical password schemes provide a way of making morehuman-friendly passwords . Here the security of the system is very high. Dictionary attacks and brute force search are infeasible.
  16. 16.  Disadvantages of Graphical password Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing .- As the name implies, shoulder surfing is watching over peoplesshoulders as they process information.- Because of their graphic nature, nearly all graphical password schemesare quite vulnerable to shoulder surfing.
  17. 17. Graphical passwords are an alternative to textual alphanumericpassword.It satisfies both conflicting requirements i.e. it is easy toremember & it is hard to guess.By the solution of the shoulder surfing problem, it becomes moresecure & easier password scheme.Not yet widely used, current graphical password techniques arestill immature.
  18. 18. Thank You…
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.