SEMINAR
ON
GRAPHICAL PASSWORD AUTHENTICATION
1
CONTENTS
 Introduction
o Text Password
 Advantages And Disadvantages of text password
 Graphical password
 Use of graphical password
 Over View Of The Authentication Methods
 Comparison between Graphical password and
Alphanumeric password
 Advantages and Disadvantages of graphical password
 Conclusion
2
INTRODUCTION
 Graphical password authentication is a form of
authentication that requires the recall and selection of an
image or points in an image inputted during the registration
stage in a graphical user interface.
 A graphical based password is one promising alternatives
of textual passwords.
 The most common computer authentication method in use
today is alphanumerical usernames and passwords.
3
TEXT PASSWORD
 Text password is a secret word or string of characters that is
used for user authentication to prove his identity and gain
access to resources.
 With this text password, the user has no longer remember,
so this graphical password is used.
 Text password is a problem to the users for remembering
long time.
4
ADAVNTAGES &DISADVANTAGES
OF TEXT PASSWORD
Advantages:
 Simple to use
 Simple to deploy—since the operating system provides the user
accounts and password, almost no extra configuration is
needed.
Disadvantages:
 Security is entirely based on confidentiality and the strength of
the password.
 Does not provide strong identity check.
:
5
GRAPHICAL PASSWORD
 A graphical password is an authentication system that works
by having the user select from images, in a specific order,
presented in a graphical user interface (GUI).
 For this reason, the graphical-password approach is
sometimes called graphical user authentication (GUA).
 A graphical password is easier than a text-based password for
most people to remember.
 Graphical passwords were originally implemented in vb.net.6
PASSWORD ARE USED IN:
.
o Logging into accounts.
o Retrieving emails.
o Accessing Applications.
o Networks.
o Websites.
o Databases.
o Workstations.
.
7
OVER VIEW OF
AUTHENTICATION METHODS
 Token based authentication
 Biometric based authentication
 Knowledge based authentication
8
TOKEN BASED AUTHENTICATION
 It is based on “What You Possess”. For example
 Smart Cards.
 A driver’s license
 Credit card
 A university ID card etc.
 Many token based authentication systems also use
knowledge based techniques to enhance security.
9
BIOMETRIC BASED AUTHENTICATION
 Biometrics is the study of automated methods for uniquely
recognizing humans based upon one or more physical or
behavioral .
 It uses physiological or behavioral characteristics like
fingerprint or facial scans and iris or voice recognition to
identify users.
 A biometric scanning device takes a user's biometric data,
such as an iris pattern or fingerprint scan, and converts it into
digital information a computer can interpret and verify.
10
KNOWLEDGE BASED AUTHENTICATION
 Knowledge Based Authentication (KBA) is based on using
“What You Know” to identify you. For example; a Personal
Identification Number (PIN), .
 It is an authentication scheme in which the user is asked to
answer at least one "secret" question.
 Knowledge based techniques are the most widely used
authentication techniques and include both text-based and
picture-based passwords.
 The picture-based techniques can be further divided into two
categories:
11
CONT…
Two Categories:
 Recall Based Techniques
A user is asked to reproduce something that he created or
selected earlier during the registration stage.
 Recognition Based Techniques
A user is presented with a set of images and the user
passes the authentication by recognizing and identifying
the images he selected during the registration stage.
12
COMPARISON B/W ALPHA-NUMERIC AND
GRAPHICAL PASSWORDS
Commonly used guidelines for alpha-numeric passwords
are:
 The password should be at least 8 characters long.
 The password should be easy to relate to the user(e.g., last
name, birth date).
 Ideally, the user should combine upper and lower case
letters and digits.
Graphical passwords
 The password consists of some actions that the user
performs on an image.
 Such passwords are easier to remember & hard to guess.13
ADVANTAGES OF GRAPHICAL
PASSWORD
 A graphical password authentication system is relatively
inexpensive to implement
 Graphical passwords provide a way of making user friendly
passwords.
 Graphical passwords are not vulnerable to dictionary
attacks.
 It is less convenient for a user to give away graphical
passwords to another person.
14
DISADVANTAGES OF GRAPHICAL
PASSWORD
 Password registration and login process takes too
long login process is slow .
 Most users are not familiar with the graphical
passwords, they often find graphical passwords less
convenient and time consuming.
 Graphical passwords are prone to shoulder surfing.
This is because of their graphic nature, nearly all
graphical password scheme are prone to shoulder
surfing.
15
CONCLUSION
Graphical passwords are an alternative to
textual alphanumeric password. It satisfies both
conflicting requirements i.e it is easy to remember and
it is hard to guess. By the solution off the shoulder
surfing problem,it becomes more secure and easier
password scheme.Not yet widely used,current
graphical password techniques are still immature.
16
ANY QUERIES?
17
18

Graphical Password Authentication

  • 1.
  • 2.
    CONTENTS  Introduction o TextPassword  Advantages And Disadvantages of text password  Graphical password  Use of graphical password  Over View Of The Authentication Methods  Comparison between Graphical password and Alphanumeric password  Advantages and Disadvantages of graphical password  Conclusion 2
  • 3.
    INTRODUCTION  Graphical passwordauthentication is a form of authentication that requires the recall and selection of an image or points in an image inputted during the registration stage in a graphical user interface.  A graphical based password is one promising alternatives of textual passwords.  The most common computer authentication method in use today is alphanumerical usernames and passwords. 3
  • 4.
    TEXT PASSWORD  Textpassword is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  With this text password, the user has no longer remember, so this graphical password is used.  Text password is a problem to the users for remembering long time. 4
  • 5.
    ADAVNTAGES &DISADVANTAGES OF TEXTPASSWORD Advantages:  Simple to use  Simple to deploy—since the operating system provides the user accounts and password, almost no extra configuration is needed. Disadvantages:  Security is entirely based on confidentiality and the strength of the password.  Does not provide strong identity check. : 5
  • 6.
    GRAPHICAL PASSWORD  Agraphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).  For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).  A graphical password is easier than a text-based password for most people to remember.  Graphical passwords were originally implemented in vb.net.6
  • 7.
    PASSWORD ARE USEDIN: . o Logging into accounts. o Retrieving emails. o Accessing Applications. o Networks. o Websites. o Databases. o Workstations. . 7
  • 8.
    OVER VIEW OF AUTHENTICATIONMETHODS  Token based authentication  Biometric based authentication  Knowledge based authentication 8
  • 9.
    TOKEN BASED AUTHENTICATION It is based on “What You Possess”. For example  Smart Cards.  A driver’s license  Credit card  A university ID card etc.  Many token based authentication systems also use knowledge based techniques to enhance security. 9
  • 10.
    BIOMETRIC BASED AUTHENTICATION Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more physical or behavioral .  It uses physiological or behavioral characteristics like fingerprint or facial scans and iris or voice recognition to identify users.  A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. 10
  • 11.
    KNOWLEDGE BASED AUTHENTICATION Knowledge Based Authentication (KBA) is based on using “What You Know” to identify you. For example; a Personal Identification Number (PIN), .  It is an authentication scheme in which the user is asked to answer at least one "secret" question.  Knowledge based techniques are the most widely used authentication techniques and include both text-based and picture-based passwords.  The picture-based techniques can be further divided into two categories: 11
  • 12.
    CONT… Two Categories:  RecallBased Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage.  Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. 12
  • 13.
    COMPARISON B/W ALPHA-NUMERICAND GRAPHICAL PASSWORDS Commonly used guidelines for alpha-numeric passwords are:  The password should be at least 8 characters long.  The password should be easy to relate to the user(e.g., last name, birth date).  Ideally, the user should combine upper and lower case letters and digits. Graphical passwords  The password consists of some actions that the user performs on an image.  Such passwords are easier to remember & hard to guess.13
  • 14.
    ADVANTAGES OF GRAPHICAL PASSWORD A graphical password authentication system is relatively inexpensive to implement  Graphical passwords provide a way of making user friendly passwords.  Graphical passwords are not vulnerable to dictionary attacks.  It is less convenient for a user to give away graphical passwords to another person. 14
  • 15.
    DISADVANTAGES OF GRAPHICAL PASSWORD Password registration and login process takes too long login process is slow .  Most users are not familiar with the graphical passwords, they often find graphical passwords less convenient and time consuming.  Graphical passwords are prone to shoulder surfing. This is because of their graphic nature, nearly all graphical password scheme are prone to shoulder surfing. 15
  • 16.
    CONCLUSION Graphical passwords arean alternative to textual alphanumeric password. It satisfies both conflicting requirements i.e it is easy to remember and it is hard to guess. By the solution off the shoulder surfing problem,it becomes more secure and easier password scheme.Not yet widely used,current graphical password techniques are still immature. 16
  • 17.
  • 18.