CUED CLICK POINT AUTH
NOUMAN BALOCH
Outline
1) Problem with Passwords
2) Importance of strong password
3) Broad view of methods of authentication
4) Graphical Passwords
a) Recognition Based
b) Recall Based
i) PassPoint
ii) Cued Click Point
5) Conclusion
Problem with passwords
Passwords are used to prove identity or access approval to gain access to a
resource.
But two conflicting requirements of passwords
1) Easy to remember
2) Hard to guess
But most of the people ignore the second
Requirement.
Why strong passwords are important
Broad view of methods of authentication
1) Token Based Authentication
a) Smart cards b) Key cards c) ATM
2) Biometric
a) Fingerprint b) iris scan c) Face recognition
3) Knowledge based authentication
a) Picture passwords
Graphical Passwords
Two most common techniques of graphical passwords are used.
1) Recognition Based
2) Recall Based
Recognition Based
A user is presented with a set of images for authentication he recognize and
identify the images he selected during the registration stage.
Recall Based
User is asked to reproduce something that he created or selected earlier
during registration.
Types of Recall Based Technique
1) PassPoint
User click on any place on the image to create password. In order to be
authenticated user must click with in the tolerances in correct sequence.
Disadvantage of PassPoint Technique
Hotspot problem different users tend to select similar click points as a part of
their passwords. attackers who yield the knowledge of these hotspots through
harvesting can build attack dictionaries.
Cued Click Point Technique
On the other hand cued click point is designed to reduce hotspot problem,
rather than five click points on a single image it takes five click points on five
different images.
Modules of Authentication using Cued Click Point
Modules
Image
Submission
Selecting
Click Points
Tolerance
Calculation
Authentication
College Book
Management
System
Conclusion
1. Graphical passwords are an alternative to textual alphanumeric
password.
2. It satisfies both conflicting requirements i.e it is easy to remember & it is
hard to guess.
3. Not yet widely used, current graphical password techniques are still
immature.
Thank You!

Cued Click Point Authentication

  • 1.
    CUED CLICK POINTAUTH NOUMAN BALOCH
  • 2.
    Outline 1) Problem withPasswords 2) Importance of strong password 3) Broad view of methods of authentication 4) Graphical Passwords a) Recognition Based b) Recall Based i) PassPoint ii) Cued Click Point 5) Conclusion
  • 3.
    Problem with passwords Passwordsare used to prove identity or access approval to gain access to a resource. But two conflicting requirements of passwords 1) Easy to remember 2) Hard to guess But most of the people ignore the second Requirement.
  • 4.
    Why strong passwordsare important
  • 5.
    Broad view ofmethods of authentication 1) Token Based Authentication a) Smart cards b) Key cards c) ATM 2) Biometric a) Fingerprint b) iris scan c) Face recognition 3) Knowledge based authentication a) Picture passwords
  • 6.
    Graphical Passwords Two mostcommon techniques of graphical passwords are used. 1) Recognition Based 2) Recall Based
  • 7.
    Recognition Based A useris presented with a set of images for authentication he recognize and identify the images he selected during the registration stage.
  • 8.
    Recall Based User isasked to reproduce something that he created or selected earlier during registration.
  • 9.
    Types of RecallBased Technique 1) PassPoint User click on any place on the image to create password. In order to be authenticated user must click with in the tolerances in correct sequence.
  • 10.
    Disadvantage of PassPointTechnique Hotspot problem different users tend to select similar click points as a part of their passwords. attackers who yield the knowledge of these hotspots through harvesting can build attack dictionaries.
  • 11.
    Cued Click PointTechnique On the other hand cued click point is designed to reduce hotspot problem, rather than five click points on a single image it takes five click points on five different images.
  • 12.
    Modules of Authenticationusing Cued Click Point Modules Image Submission Selecting Click Points Tolerance Calculation Authentication College Book Management System
  • 13.
    Conclusion 1. Graphical passwordsare an alternative to textual alphanumeric password. 2. It satisfies both conflicting requirements i.e it is easy to remember & it is hard to guess. 3. Not yet widely used, current graphical password techniques are still immature.
  • 14.