SlideShare a Scribd company logo
GRAPHICAL
PASSWORD
APPROACH
PRESENTED BY
G. Ruchitha
CONTENTS
• What Is Graphical Password
• The Survey
• Recognition Based Technique
• Recall Based Technique
• Security Factors
• Implementation And Discussion
• Advantages
• Drawbacks
• Conclusion
WHAT IS GRAPHICAL PASSWORD?
• A graphical password is an authentication system that works by having the user select from
images, in A specific order, presented in A graphical user interface (GUI). For this reason, the
graphical-password approach is called graphical user authentication (GUA).
It can be used in:
• Web login application
• ATM machines
• Mobile devices
THE SURVEY: TWO CATEGORIES
• RECOGNITION BASED TECHNIQUE
USING RECOGNITION-BASED TECHNIQUES, A USER IS
PRESENTED WITH A SET OF IMAGES AND THE USER PASSES THE
AUTHENTICATION BY RECOGNIZING AND IDENTIFYING THE
IMAGES HE OR SHE SELECTED DURING THE REGISTRATION
STAGE.
• RECALL BASED TECHNIQUE
IN THESE TECHNIQUES, USER HAS TO RECALL
SOMETHING THAT HAS BEEN CREATED OR SELECTED
DURING REGISTRATION.
RECOGNITION BASED TECHNIQUE
SOBRADO AND BIRGET SCHEME
PASSFACE TECHNIQUE
RECALL BASED TECHNIQUE
• Pure recall based technique
• Pass doodle technique
• Signature technique
• Cued recall based technique
• Blonder technique
• Pass point technique
PURE RECALL BASED
• Here user is not provided a clue to recall a password.
PASS DOODLE TECHNIQUE
• Here some handwritten text/design is drawn by the user
on touch sensitive screen with stylus. During login user
has to redraw the same text.
SIGNATURE TECHNIQUE
• Here, during registration user has to register his own signature. For
authentication user has to draw the same signature with mouse.
CUED CLICK POINTS
• Cued click points (CCP) is a proposed alternative to pass points. In
CCP, users click one point on each of c =8 images rather than on five
points on one image.
BLONDER TECHNIQUE
• In this, for password registration a predetermined image with
predetermined tap regions are displayed to the user. The user has to
click inside those tap regions in a sequential manner. For
authentication, user has to click approximate areas of those tap
regions in a predefined sequence. Here image is a clue to recall a
password.
PASS POINT TECHNIQUE
SECURITY FACTORS
• Brute force
• Dictionary attacks
• Guessing
• Shoulder surfing
• Social engineering
IMPLEMENTATION AND DISCUSSION
• Graphical password can be implemented in authenticating several
systems and websites. The implementation has few focuses:
• Password: contain image as reference & encryption algorithm.
• Login: contains username, images, graphical password and related
methods.
• Ssr shield: contains shield for shoulder surfing.
• Grids: contains unique grid values and grid clicking related methods
ADVANTAGES
• Graphical password schemes provides a way of
making more human-friendly passwords.
• Here the security of the systems is very high.
• Here we use series of selectable images on
successive screen pages.
• Dictionary attacks are infeasible
DRAWBACKS
• Password registration and login process take too
long.
• Require much more storage space than text based
passwords.
• Because of their graphic nature, nearly all
graphical password scheme are quite vulnerable
to shoulder surfing
CONCLUSION
• Although the main use for graphical passwords is that
people are better at memorizing graphical passwords than
text-based passwords, the existing user studies are very
limited and there is not yet convincing evidence to
support this argument. Our preliminary analysis suggests
that it is more difficult to break graphical passwords
using the traditional attack methods such as brute force
search, dictionary attack, or spyware.
THANK YOU

More Related Content

Similar to Graphical password

3 d secure password
3 d secure password3 d secure password
3 d secure password
Jai Chaudhary
 
Vc pred
Vc predVc pred
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
GirishKA4
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
Nirzar Bhaidkar
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
Umesh Kumar
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
Snehal Wankhede
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
 
Review 1 (1) (1).pptx
Review 1 (1) (1).pptxReview 1 (1) (1).pptx
Review 1 (1) (1).pptx
Raghunandantomar1
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
PortalGuard dba PistolStar, Inc.
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
ChikaDavidAma
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
Malepati Prathibha
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
Ayisha M Kalburgi
 

Similar to Graphical password (20)

3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Vc pred
Vc predVc pred
Vc pred
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
3D Password
3D Password3D Password
3D Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Review 1 (1) (1).pptx
Review 1 (1) (1).pptxReview 1 (1) (1).pptx
Review 1 (1) (1).pptx
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Graphical password

  • 2. CONTENTS • What Is Graphical Password • The Survey • Recognition Based Technique • Recall Based Technique • Security Factors • Implementation And Discussion • Advantages • Drawbacks • Conclusion
  • 3. WHAT IS GRAPHICAL PASSWORD? • A graphical password is an authentication system that works by having the user select from images, in A specific order, presented in A graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). It can be used in: • Web login application • ATM machines • Mobile devices
  • 4. THE SURVEY: TWO CATEGORIES • RECOGNITION BASED TECHNIQUE USING RECOGNITION-BASED TECHNIQUES, A USER IS PRESENTED WITH A SET OF IMAGES AND THE USER PASSES THE AUTHENTICATION BY RECOGNIZING AND IDENTIFYING THE IMAGES HE OR SHE SELECTED DURING THE REGISTRATION STAGE. • RECALL BASED TECHNIQUE IN THESE TECHNIQUES, USER HAS TO RECALL SOMETHING THAT HAS BEEN CREATED OR SELECTED DURING REGISTRATION.
  • 8. RECALL BASED TECHNIQUE • Pure recall based technique • Pass doodle technique • Signature technique • Cued recall based technique • Blonder technique • Pass point technique
  • 9. PURE RECALL BASED • Here user is not provided a clue to recall a password.
  • 10. PASS DOODLE TECHNIQUE • Here some handwritten text/design is drawn by the user on touch sensitive screen with stylus. During login user has to redraw the same text.
  • 11. SIGNATURE TECHNIQUE • Here, during registration user has to register his own signature. For authentication user has to draw the same signature with mouse.
  • 12. CUED CLICK POINTS • Cued click points (CCP) is a proposed alternative to pass points. In CCP, users click one point on each of c =8 images rather than on five points on one image.
  • 13. BLONDER TECHNIQUE • In this, for password registration a predetermined image with predetermined tap regions are displayed to the user. The user has to click inside those tap regions in a sequential manner. For authentication, user has to click approximate areas of those tap regions in a predefined sequence. Here image is a clue to recall a password.
  • 15. SECURITY FACTORS • Brute force • Dictionary attacks • Guessing • Shoulder surfing • Social engineering
  • 16. IMPLEMENTATION AND DISCUSSION • Graphical password can be implemented in authenticating several systems and websites. The implementation has few focuses: • Password: contain image as reference & encryption algorithm. • Login: contains username, images, graphical password and related methods. • Ssr shield: contains shield for shoulder surfing. • Grids: contains unique grid values and grid clicking related methods
  • 17. ADVANTAGES • Graphical password schemes provides a way of making more human-friendly passwords. • Here the security of the systems is very high. • Here we use series of selectable images on successive screen pages. • Dictionary attacks are infeasible
  • 18. DRAWBACKS • Password registration and login process take too long. • Require much more storage space than text based passwords. • Because of their graphic nature, nearly all graphical password scheme are quite vulnerable to shoulder surfing
  • 19. CONCLUSION • Although the main use for graphical passwords is that people are better at memorizing graphical passwords than text-based passwords, the existing user studies are very limited and there is not yet convincing evidence to support this argument. Our preliminary analysis suggests that it is more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack, or spyware.