Graphical Passwords
Graphical Passwords

(1) Why graphical passwords?

 Pictures are easy to remember or recognized
than text..

(2) Are graph...
Random Image




   Based on hash visualization techniques.
Passfaces
Passlogix
Pass Point
Based on JPEG
2000
Random Image
Random Image




   Based on hash visualization techniques.
Draw-A-Secret (DAS)
Drawing Grid
Graphical Passwords Design

Recognition Based Techniques

Recall Based Techniques
(1) Produce a drawing
(2) Repeat a seque...
Attack on Graphical Passwords

(1) Brute force search
(2) Dictionary attacks
(3) Guessing

 * dierent person has dierent c...
Research on Graphical Passwords

(1) Design a new graphical password scheme

 * can return a random length text password

...
owHtWU1sJNld3yTAIYhDIiEhwaFc9tJtbVW1WBuPLLunep0ea7S0UD1o+TFTbldV
etQededFZHu1hRkx50hcIJccc0E5RdyCFI4oHDkhhISQkLiCEMcc896r7...
Upcoming SlideShare
Loading in...5
×

Graphical Passwords

5,344

Published on

Published in: Technology
1 Comment
1 Like
Statistics
Notes
  • pls provide more ppts on graphical passwords
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
5,344
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
470
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Graphical Passwords

  1. 1. Graphical Passwords
  2. 2. Graphical Passwords (1) Why graphical passwords? Pictures are easy to remember or recognized than text.. (2) Are graphical passwords as secure as text passwords? (3) What are the major design and implementation issues for graphical passwords?
  3. 3. Random Image Based on hash visualization techniques.
  4. 4. Passfaces
  5. 5. Passlogix
  6. 6. Pass Point
  7. 7. Based on JPEG 2000
  8. 8. Random Image
  9. 9. Random Image Based on hash visualization techniques.
  10. 10. Draw-A-Secret (DAS)
  11. 11. Drawing Grid
  12. 12. Graphical Passwords Design Recognition Based Techniques Recall Based Techniques (1) Produce a drawing (2) Repeat a sequence of actions
  13. 13. Attack on Graphical Passwords (1) Brute force search (2) Dictionary attacks (3) Guessing * dierent person has dierent choice. * human have some common selections. (4) Spy ware (5) Shoulder surfing (6) Social engineering
  14. 14. Research on Graphical Passwords (1) Design a new graphical password scheme * can return a random length text password (2) Use graphical password in public key cryptosystem. * User generate a big number from graphical password. * Convert the big number into a signing private key. * Get a certificate from CA with the generated key. * Embed graphical password into application such as webmail. * User log on webmail, generate his signing key
  15. 15. owHtWU1sJNld3yTAIYhDIiEhwaFc9tJtbVW1WBuPLLunep0ea7S0UD1o+TFTbldV etQededFZHu1hRkx50hcIJccc0E5RdyCFI4oHDkhhISQkLiCEMcc896r71fvs7o8 O7H89+501fv+1f/7//7mt772wVe/8bMf/2Twix/+9O1X/v6Dr/zaP377q9/+9rNv /uApePD09S/7APdPjxAfAj1CfAj0CPEh0CPEh0CPEB8CPUJ8CPQI8SHQI8SHQI8Q
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×