Graphical password authentication

  • 10,891 views
Uploaded on

 

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • thanks
    Are you sure you want to
    Your message goes here
  • suhas MIT Clg
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
10,891
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
921
Comments
2
Likes
8

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. PRESENTED BYAsim Kumar PathakCS-47/09
  • 2. IntroductionOverview of the Authentication MethodsText Password and drawbacks.Graphical Passwords.The surveyRecall Based TechniquesRecognition Based TechniquesDiscussionAdvantagesdisadvantagesConclusion
  • 3. What is PASSWORDThe term PASSWORD commonly refers to a secret used forauthentication. Passwords are the most commonly used method foridentifying users in computer and communication systems.PASSWORDS are used for: Logging into accounts. Retrieving emails. Accessing applications. Networks. Websites Databases workstations
  • 4. Token based authentication Key cards, bank cards, smart card, …Biometric based authentication Fingerprints, iris scan, facial recognition, …Knowledge based authentication Text-based passwords, picture-based passwords, … Most widely used authentication techniques
  • 5. Text PasswordText password is a secret word or string of characters that isused for user authentication to prove his identity and gain accessto resources.Drawback Difficulty of remembering passwords. easy to remember -> easy to guess hard to guess -> hard to remember Vulnerable to attacks like Dictionary attack, Brute forceattack .Many solutions have been proposed. Graphical password isone of the solutions.
  • 6.  Graphical passwords were originally described by BLONDERin 1996. A graphical password is an authentication system that worksby having the user select from images, in a specificorder, presented in a graphical user interface (GUI). For this reason, the graphical-password approach issometimes called graphical user authentication (GUA).
  • 7. Use of graphical password: Web log-in application. ATM machine. Mobile device.
  • 8. Recall Based TechniquesA user is asked to reproduce something that he created orselected earlier during the registration stageRecognition Based TechniquesA user is presented with a set of images and the user passes theauthentication by recognizing and identifying the images heselected during the registration stage
  • 9. Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of thegrids occupied by the picture are stored in the order of drawing. Redrawing has to touchthe same grids in thesame sequence inauthentication.
  • 10. Signature schemeHere authentication is conducted by having the user drawingtheir signature using a mouse.
  • 11. Pass Point SchemeUser click on any place on an image to create a password. Atolerance around each chosen pixel is calculated. In order to beauthenticated, user must click within the tolerances in thecorrect sequence.
  • 12.  Dhamija and Perrig SchemePick several pictures out of many choices, identify them laterin authentication.
  • 13.  Passface scheme:In this technique human faces are used as password.
  • 14.  Sobrado and Birget SchemeSystem display a number of pass-objects (pre-selected by user)among many other objects, user click inside the convex hullbounded by pass-objects.
  • 15. Advantages of Graphical password Graphical password schemes provide a way of making morehuman-friendly passwords . Here the security of the system is very high. Dictionary attacks and brute force search are infeasible.
  • 16.  Disadvantages of Graphical password Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing .- As the name implies, shoulder surfing is watching over peoplesshoulders as they process information.- Because of their graphic nature, nearly all graphical password schemesare quite vulnerable to shoulder surfing.
  • 17. Graphical passwords are an alternative to textual alphanumericpassword.It satisfies both conflicting requirements i.e. it is easy toremember & it is hard to guess.By the solution of the shoulder surfing problem, it becomes moresecure & easier password scheme.Not yet widely used, current graphical password techniques arestill immature.
  • 18. Thank You…