SlideShare a Scribd company logo
1 of 6
Download to read offline
2011 Workshops of International Conference on Advanced Information Networking and Applications



                               IPAS: Implicit Password Authentication System


                       Sadiq Almuairfi                                     Parakash Veeraraghavan and Naveen Chilamkurti
  Dept. of Computer Science and Computer Engineering                       Dept. of Computer Science and Computer Engineering
    La Trobe University, 3086, Melbourne, Australia                          La Trobe University, 3086, Melbourne, Australia
            sadiqjafar@students.latrobe.edu.au                                    {p.veera, n.chilamkurti}@latrobe.edu.au



 Abstract— Authentication is the first line of defense against            present our proposal and discuss its strengths and
 compromising confidentiality and integrity. Though traditional           weaknesses compared with the existing schemes. Section 5
 login/password based schemes are easy to implement, they                 deals with conclusion and future directions.
 have been subjected to several attacks. As an alternative, token
 and biometric based authentication systems were introduced.                       II.   VARIOUS AUTHENTICATION SCHEMES
 However, they have not improved substantially to justify the
 investment. Thus, a variation to the login/password scheme,                  There are several authentication schemes available in the
 viz. graphical scheme was introduced. But it also suffered due           literature. They can be broadly classified as follows:
 to shoulder-surfing and screen dump attacks. In this paper, we
 introduce a framework of our proposed (IPAS) Implicit                       x    What you know
 Password Authentication System, which is immune to the                      x    What you have and
 common attacks suffered by other authentication schemes.                    x    What you are
   Keywords-Authentication; Graphical Password; Security;
                                                                              The traditional username/password or PIN based
 Mobile Banking.
                                                                          authentication scheme is an example of the “what you know
                                                                          type”. Smartcards or electronic tokens are examples of
                        I.    INTRODUCTION                                “what you have type of authentication” and finally
    Authentication is a process of determining whether a                  biometric based authentication schemes are examples of the
 particular individual or a device should be allowed to access            “what you are” type of authentication. Some authentication
 a system or an application or merely an object running in a              systems may use a combination of the above schemes. In
 device. This is an important process which assures the basic             this paper, we focus only on “what you know” types of
 security goals, viz. confidentiality and integrity. Also,                authentication.
 adequate authentication is the first line of defense for                    Although traditional alphanumeric passwords are used
 protecting any resource. It is important that the same                   widely, they have problems such as being hard to remember,
 authentication technique may not be used in every scenario.              vulnerable to guessing, dictionary attack, key-logger,
 For example, a less sophisticated approach may be used for               shoulder-surfing and social engineering [1]. In addition to
 accessing a “chat server” compared to accessing a                        these types of attacks, a user may tend to choose a weak
 corporate database. Most of the existing authentication                  password or record his password. This may further weaken
 schemes require processing both at the client and the server             the authentication schemes. As an alternative to the
 end. Thus, the acceptability of any authentication scheme                traditional password based scheme, the biometric system
 greatly depends on its robustness against attacks as well as             was introduced. This relies upon unique features unchanged
 its resource requirement both at the client and at the server            during the life time of a human, such as finger prints, iris
 end. The resource requirement has become a major factor                  etc. The major problem of biometric as an authentication
 due to the proliferation of mobile and hand-held devices.                scheme is the high cost of additional devices needed for
 Nowadays with the use of mobile phones, users can access                 identification process [2]. The false-positive and false-
 any information including banking and corporate database.                negative rate may also be high if the devices are not robust.
 In this paper, we specifically target the mobile banking                 Biometric systems are vulnerable to replay attack (by the
 domain and propose a new and intelligent authentication                  use of sticky residue left by finger on the devices), which
 scheme. However, our proposal can also be used in other                  reduces the security and usability levels. Thus, recent
 domains where confidentiality and integrity are the major                developments have attempted to overcome biometric
 security requirements.                                                   shortcomings by introducing token-based authentication
    The rest of the paper is organized as follows: Section 2              schemes.
 deals with various authentication schemes, and their                        Token based systems rely on the use of a physical device
 advantages and disadvantages. In section 3, we mention the               such as smartcards or electronic-key for authentication
 main problems of the existing schemes. In Section 4, we                  purpose. This may also be used in conjunction with the

978-0-7695-4338-3/11 $26.00 © 2011 IEEE                             430
DOI 10.1109/WAINA.2011.36
traditional password based system. Token based systems are             not completely secure. It needs several rounds of image
vulnerable to man-in-the middle attacks where an intruder              recognition for authentication to provide a reasonably large
intercepts the user’s session and records the credentials by           password space, which is tedious [7]. Also, it is obvious that
acting as a proxy between the user and the authentication              recognition based systems are vulnerable to replay attack
device without the knowledge of the user [3]. Thus as an               and mouse tracking because of the use of a fixed image as a
alternative, graphical based passwords are introduced to               password. Thus, we consider these drawbacks in our
resolve security and usability limitations mentioned in the            proposed system, which overcomes the problems of recall
above schemes.                                                         based schemes too.
   Graphical-based password techniques have been
                                                                       B. Recall-Based Systems
proposed as a potential alternative to text-based techniques,
supported partially by the fact that humans can remember                  In recall-based systems, the user is asked to reproduce
images better than text [4]. Psychologists have confirmed              something that he/she created or selected earlier during the
that in both recognition and recall scenarios, images are              registration phase. Recall based schemes can be broadly
more memorable than text [2]. Therefore, graphical-based               classified into two groups, viz: pure recall-based technique
authentication schemes have higher usability than other                and cued recall-based technique.
authentication techniques. On the other hand, it is also
difficult to break graphical passwords using normal attacks              1) Pure Recall-Based Techniques
such as dictionary attack, brute force and spyware which                 In this group, users need to reproduce their passwords
have been affecting text-based and token-based                         without any help or reminder by the system. Draw-A-Secret
authentication [5]. Thus, the security level of graphical-             technique [8], Grid selection [9], and Passdoodle [10] are
based authentication schemes is higher than other                      common examples of pure recall-based techniques.
authentication techniques.                                                In 1999, Jermyn et al. [8] proposed DAS (Draw-A-
   In general, the graphical password techniques can be                Secret) scheme, in which the password is a shape drawn on
classified into two categories: recognition-based and recall-          a two-dimensional grid of size G * G as in Figure 1. Each
based graphical techniques [4].                                        cell in this grid is represented by distinct rectangular
                                                                       coordinates (x, y). The values of touch grids are stored in
                                                                       temporal order of the drawing. If exact coordinates are
A. Reconition-Based Systems                                            crossed with the same registered sequence, then the user is
   In recognition-based systems, a group of images are                 authenticated. As with other pure recall-based techniques,
displayed to the user and an accepted authentication requires          DAS has many drawbacks. In 2002, Goldberg [11]
a correct image being clicked or touched in a particular               conducted a survey which concluded that most users forget
order. Some examples of recognition-based system are                   their stroke order and they can remember text passwords
Awase-E system [6], AuthentiGraph [3, 5], and Passfaces                easier than DAS. Also, the password chosen by users are
system [4].                                                            vulnerable to graphical dictionary attacks and replay attack.
   An image password called Awase-E [6] is a new system
which enables users to use their favorite image instead of a
text password for authentication purpose. Even though
Awase-E system has a higher usability, it is difficult to
implement due to the storage space needed for images and
also the system cannot tolerate replay attack. Adding to this,
a user may always tend to choose a well-known (or
associated with the user through some relation, like son,
wife or a place visited etc.) image which may be prone to
guessing attacks.
  Weinshall and Kirkpatrick [7] studied a recognition-based
scheme and concluded that users can still remember their
graphical password with 90% accuracy even after one or
two months. Their study supports the theory that human
remember images better than text. In addition for example,
                                                                                           Figure 1. Example of DAS
the commercial system Passfaces [4] uses images of human
faces. Davis, et al. [7] worked on such A scheme and
concluded that user’s password selection is affected by race
and gender. This makes the Passfaces’s password somewhat
predictable.
   Although a recognition-based graphical password seems
to be easy to remember, which increases the usability, it is



                                                                 431
2) Cued Recall-Based Techniques
                                                                           In this technique, the system gives some hints which
                                                                       help users to reproduce their passwords with high accuracy.
                                                                       These hints will be presented as hot spots (regions) within
                                                                       an image. The user has to choose some of these regions to
                                                                       register as their password and they have to choose the same
                                                                       region following the same order to log into the system. The
                                                                       user must remember the “chosen click spots” and keep them
                                                                       secret. There are many implementations, such as Blonder
                                                                       algorithm [12] and PassPoint scheme [13].
            Figure 2. . Example of Grid Selection Model                    In 1996, Blonder [12] designed a method where a pre-
                                                                       determined image is shown to the user on a visual display
                                                                       and the user should “click” on some predefined positions on
   In 2004, the Grid selection technique was proposed by
                                                                       the image in a particular order to be authenticated as in
Thorpe and Van Oorschot [9] to enhance the password
                                                                       Figure 4. This method was later modified and presented as
space of DAS. Their study showed the impact of stroke-
                                                                       Passpoint [13].
count on DAS password space which decreases significantly
                                                                          In 2005, the PassPoint [13] scheme was created to be
with less strokes for a fixed password length. To improve
                                                                       similar to the Blonder's scheme while overcoming some of
the DAS security level, they suggested the "Grid Selection"
                                                                       its main limitations. In Passpoint, the image can be an
technique, where the selection grid is large at the beginning,
                                                                       arbitrary photograph or paintings with many clickable
A fine grained grid from which the person selects a drawing
                                                                       regions as shown in Figure 5. This will increase the
grid, a rectangular area to zoom in on, in which they may
                                                                       password space of Passpoint scheme which in turn will
enter their password as shown in Figure 2. This technique
                                                                       increase the security level. Another source of difference is
would increase the password space of DAS, which improves
                                                                       that there is no predefined click area with clear boundaries
the security level at the same time. Actually, this technique
                                                                       like the Blonder algorithm. The user password could
only improves the password space of DAS but still carries
                                                                       contain any chosen sequence of points in the image, which
over DAS weaknesses and drawbacks as mentioned above.
                                                                       increases the usability level of this scheme.
   Passdoodle [11], is a graphical password of handwritten
drawing or text, normally sketched with a stylus over a
touch sensitive screen as shown in Figure 3. In [11],
Goldberg et.al have shown that users were able to recognize
a complete doodle password as accurately as text-based
passwords. Unfortunately, the Passdoodle scheme has many
drawbacks. As mentioned in [9], users were fascinated by
other users' drawn doodles, and usually entered other users'
password merely to a different doodles from their own. In
[1], the authors concluded that the Passdoodle scheme is
vulnerable to several attacks such as guessing, spyware,
key-logger, and shoulder surfing.

                                                                                      Figure 4. Example of Blinder Scheme




                 Figure 3. Example of Passdoodle




                                                                                     Figure 5 Example of PassPoint System




                                                                 432
The Passpoint system has a large password space, which               remotely. Since all the image based password schemes
improves the security level compared with other similar                 known to us use static passwords, the recorded movie may
systems. For example, five or six click points on an image              be replayed and with some human-interaction, the user’s
can produce more passwords than 8-character text-based                  password may be decoded.
passwords with standard 26-character alphabet [13]. For
more security, the Passpoint system stores the image
password in a hashed (encrypted) form in the password file.                IV.    IMPLICIT PASSWORD AUTHENTICATION SYSTEM
Moreover, hashing does not allow approximation e.g. two                     In this section, we propose our Implicit Password
passwords that are almost the same but not fully identical              Authentication System. IPAS is similar to the PassPoint
will be hashed differently. In order to be authenticated, the           scheme with some finer differences. In every “what you
user has to click close to the selected points, within some             know type” authentication scheme we are aware of, the
measured tolerance distance from the pass point.                        server requests the user to reproduce the fact given to the
   Wiedenbeck et al. [14] proposed the best tolerance                   server at the time of registration. This is also true in
around the click point in such an image. To log in, the user            graphical passwords such as PassPoint. In IPAS, we
should click with the tolerance of such a click point. In fact,         consider the password as a piece of information known to
a larger password space leads to a smaller tolerance size e.g.          the server at the time of registration and at the time of
2 to 5 mm2 around the chosen click point or pixel. For                  authentication, the user give this information in an implicit
example, an image of size 330 x 260 mm2 with tolerance                  form that can be understood only by the server. We explain
areas of size 6 x 6 mm2 gives more than 590 tolerance areas             this through a Mobile Banking case-study.
[14]. It is clear that password space depends on the tolerance
size or system choice. This enhancement makes the                       A. Study Case of IPAS (Mobile Banking)
Passpoint system more flexible, especially for people using                 In our case study, we consider mobile banking as our
mobile devices.                                                         domain. However, our proposed (IPAS) may also be
                                                                        implemented in any client-server environment, where we
                                                                        need to authenticate a human as a client (IPAS will not work
        III.   PROBLEMS WITH THE EXITING SCHEMES                        in machine-to-machine authentication). We also assume that
   Traditional alphanumeric passwords are always                        the server has enough hardware resources like RAM and
vulnerable to guessing and dictionary attack. There may                 CPU. This is not un-realistic as high-end servers are
even be a rogue program that may record the key strokes                 becoming cheaper day-by-day. The bank may have a
and publish it on a remote website. In order to overcome the            database of 100 to 200 standard questions. During the time
key logger based attacks, newer systems may show a                      of registration, a user should pick 10-20 questions from the
graphical keyboard and the user has to press the correct                database (depending upon the level of security required) and
password using “mouse clicks”. This may also be defeated                provide answers to the selected questions. For example, the
if the attacker uses a screen capture mechanism, rather than            user may choose the following questions:
using a key logger. Since new video-codec is providing
higher compression ratio, an attacker may use a screen                      x    The maker of your first car?
capture program and record a short video clip and send it to                x    The city you love to visit or visited?
a remote server for publishing. So, as an alternative, a token              x    Date of birth?
based authentication method may be used either as a stand-
alone authentication or used in addition to the traditional                For each question, the server may create an intelligent
alphanumeric password. But this technology is not                       authentication space using images, where the answers to the
pervasive. The user may have to carry a trusted token card              particular question for various users are implicitly
reader. With unknown token readers, a user may not be                   embedded into the images. During the time of
aware whether they are using a trusted legitimate reader or             authentication, the server may pick one or more questions
using an un-trusted one that may clone the token (similar to            selected by the users at the time of registration randomly
the recent ATM card scam).                                              (the number of questions depends on the level of service
   Although image based authentication systems reviewed in              requested). For each chosen question, the server may choose
our paper address most of the threats, still they suffer from           an image randomly from the authentication space and
the following attacks: replay, Shoulder-surfing, and                    present IT to the user as a challenge. Using the stylus or the
recording the screen.                                                   mouse, the user needs to navigate the image and click the
   One may argue that replay attack can be prevented using              right answer. For example, the server may present the user
encryption and tamper-proof time stamps, and physical                   with the picture of the Globe. The user should correlate to
shoulder-surfing may be known to the user as this process is            Question 2. If Sydney is the city the user loves to visit or
invasive. However, due to the availability of high-                     has visited, he needs to click on to Australia. It will then
bandwidth to mobile devices and light-weight, high-efficient            enlarge Australia. Then in the map, the user needs to click
video codecs, a rogue program may still capture and publish             Sydney as shown in Figure 6.



                                                                  433
the correct “clickable area”. Then based on the function f(I),
                                                                       the image I and the area the user clicked, the client will then
                                                                       generate a key K. The function f(I) is chosen in such a way
                                                                       that S(Qi) = K if and only if the user and the server has
                                                                       exactly the same area of interest in the image. The user then
                                                                       decrypts S(Qi)[p] to get the random number. He then
                                                                       transmits p+1 to the server for authentication and to the next
                                                                       level. In this way, the user is authenticated implicitly and
                                                                       no confidential information is exchanged over the network.
                                                                       When the server is executing the last question in the
                                                                       authentication process, instead of encrypting a pseudo
                  Figure 6. Example of an IPAS                         random number, it will pick a session key and encrypt with
                                                                       the derived key. When the client decrypts it, he gets an
                                                                       implicit message from the server to use this session key for
   Next time, if the same question is chosen by the server,            transmission. This procedure not only authenticates a user
the same scenario may not be presented. For the next time,             implicitly, this will also exchange a session key implicitly.
the server may show an image containing all famous                        It is up to the application developer and the organization
buildings and monuments. The user needs to click on the                to decide on what to do when a user gives an incorrect
“Sydney Opera house” to implicitly convey his answer.                  answer to one or more of the questions.
Since every time the server uses a different scenario and the
answers are given implicitly, our proposed system is
immune to screen capture attack. Also, except for the server           C. Strength of IPAS
and the legitimate user, for others, the answers may look                 As one can easily see, IPAS is immune to shoulder
fuzzy. For example, if the user click “Opera house”, it may            surfing and screen-dump attacks. Also, the authentication
even mean the “type of music user is interested to listen”, or         information is presented to the user in an implicit form that
may represent his “place of birth”, or “current residency”             can be understood and decoded only by the legitimate end-
and so on.                                                             user. Traditional password based authentication schemes
                                                                       and PassPoint are special cases of IPAS. The strength of
B. IPAS Implementation Framework                                       IPAS depends greatly on how effectively the authentication
                                                                       information is embedded implicitly in an image and it
   The bank will have a set of 100 to 200 questions. Every             should be easy to decrypt for a legitimate user and highly-
user selects a set of 10 to 20 questions at the time of                fuzzy for a non-legitimate user.
registration and provides their individual answer. For each               One of the weaknesses of implementing this scheme is
question, the system then either creates an authentication             that the system may simply ask the user an alphanumeric
space (the space that represents implicit answers for the              question given during the time of registration process and
questions using images) if it is not available or add the new          ask the user to input the answer through a graphical
user’s answer to the existing authentication space. Once the           keyboard
authentication space is created, the system is ready for
authenticating a user.                                                         V.    CONCLUSION AND FUTURE DIRECTIONS
   First, a user may request access to the system by
                                                                          In this paper, we have proposed a new Implicit Password
presenting his user name and the level of access required.
                                                                       Authentication System where the authentication information
This may be sent as a plain text. Depending on the level of
                                                                       is implicitly presented to the user. If the user “clicks” the
access required, the system might choose one or more
                                                                       same grid-of-interest compared with the server, the user is
questions registered by the user during the time of
                                                                       implicitly authenticated. No password information is
registration process. For each question, the server may
                                                                       exchanged between the client and the server in IPAS. Since
choose a random scenario from the authentication space that
                                                                       the authentication information is conveyed implicitly, IPAS
represents the correct answer. The chosen scenario will have
                                                                       can tolerate shoulder-surfing and screen dump attack, which
one or more “clickable” points that represent the answer to
                                                                       none of the existing schemes can tolerate. The strength of
the question provided by the particular user. Similar to
                                                                       IPAS lies in creating a good authentication space with a
PassPoint, the IPAS considers the image as a grid and the
                                                                       sufficiently large collection of images to avoid short
answers represent a clickable area.
                                                                       repeating cycles. Compared to other methods reviewed in
   Similar to Kerberos, a session key S(Qi) is derived from
                                                                       our paper, IPAS may require human-interaction and careful
the correct clickable area through a function f(I). The server
                                                                       selection of images and “click” regions. IPAS may also
will choose a random number p and then encrypt p with the
                                                                       need user training. Once this is done, IPAS can be more
session key S(Qi) and transmit <Image, S(Qi)[p], f(I)> to the
                                                                       robust. In our subsequent papers, we present various steps
mobile device. The client application then displays the
image. Using the stylus or a mouse, the user needs to choose


                                                                 434
involved in creating a robust authentication space for every                                symposium on Usable privacy and security. Pittsburgh, Pennsylvania,
question.                                                                                   ACM.
                                                                                     [8]    Wei-Chi, K. and T. Maw-Jinn (2005). “A Remote User
                                                                                            Authentication Scheme Using Strong Graphical Passwords”, Local
                                                                                            Computer Networks, 2005. 30th Anniversary.
                              REFERENCES
                                                                                     [9]    Lashkari, A. H., F. Towhidi, et al. (2009). “A Complete Comparison
                                                                                            on Pure and Cued Recall-Based Graphical User Authentication
[1]    Sabzevar, A.P. & Stavrou, A., 2008,”          Universal Multi-Factor                 Algorithms”, Computer and Electrical Engineering, 2009. ICCEE '09.
      Authentication Using Graphical Passwords”, IEEE International                         Second International Conference.
      Conference on Signal Image Technology and Internet Based Systems               [10]   Renaud, K. (2009)."On user involvement in production of images
      (SITIS).                                                                              used in visual authentication." J. Vis. Lang. Comput. 20(1): 1-15.
[2]   Haichang, G., L. Xiyang, et al. (2009). “Design and Analysis of a              [11]   Masrom, M., F. Towhidi, et al. (2009). “Pure and cued recall-based
      Graphical Password Scheme”, Innovative Computing, Information                         graphical user authentication”, Application of Information and
      and Control (ICICIC), 2009 Fourth International Conference on                         Communication Technologies, 2009. AICT 2009. International
      Graphical Passwords.                                                                  Conference.
[3]   Pierce JD, Jason G. Wells, Matthew J. Warren, & David R. Mackay.               [12]    Birget, J. C., H. Dawei, et al. (2006). "Graphical passwords based on
      (2003). “A Conceptual Model for Graphical Authentication”, 1st                        robust discretization", Information Forensics and Security, IEEE
      Australian Information security Management Conference, 24 Sept.                       Transactions on 1(3): 395-399.
      Perth, Western Australia, paper 16.
                                                                                     [13]   S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon,
[4]   Xiaoyuan, S., Z. Ying, et al. (2005). “Graphical passwords: a survey”,                ``PassPoints: Design and longitudinal evaluation of a graphical
      Computer Security Applications Conference, 21st Annual.                               password system'', International J. of Human-Computer Studies
[5]   Wells, Jason; Hutchinson, Damien; and Pierce, Justin, "Enhanced                       (Special Issue on HCI Research in Privacy and Security), 63 (2005)
      Security for Preventing Man-in-the-Middle Attacks in Authentication,                  102-127.
      formation Security Management Conference. Paper 58.                            [14]   S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N.
[6]   Takada, T. and H. Koike (2003). “Awase-E: Image-Based                                 Memon, ``Authentication using graphical passwords: Effects of
      Authentication for Mobile Phones Using User’s Favorite Images”,                       tolerance and image choice'', Symposium on Usable Privacy and
      Human-Computer Interaction with Mobile Devices and Services,                          Security (SOUPS), 6-8 July 2005, at Carnegie-Mellon Univ.,
      Springer Berlin / Heidelberg. 2795: 347-351.                                          Pittsburgh.
[7]   Dirik, A. E., N. Memon, et al. (2007). “Modeling user choice in the
      PassPoints graphical password scheme”, Proceedings of the 3rd




                                                                               435

More Related Content

What's hot

Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsidescitation
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 

What's hot (18)

Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 

Similar to Ipas implicit password_authentication_system

Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxSarvaniShettigar
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass facesIJERA Editor
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanAsad Zaman
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 

Similar to Ipas implicit password_authentication_system (20)

Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass faces
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
3D Password
3D Password3D Password
3D Password
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 

Ipas implicit password_authentication_system

  • 1. 2011 Workshops of International Conference on Advanced Information Networking and Applications IPAS: Implicit Password Authentication System Sadiq Almuairfi Parakash Veeraraghavan and Naveen Chilamkurti Dept. of Computer Science and Computer Engineering Dept. of Computer Science and Computer Engineering La Trobe University, 3086, Melbourne, Australia La Trobe University, 3086, Melbourne, Australia sadiqjafar@students.latrobe.edu.au {p.veera, n.chilamkurti}@latrobe.edu.au Abstract— Authentication is the first line of defense against present our proposal and discuss its strengths and compromising confidentiality and integrity. Though traditional weaknesses compared with the existing schemes. Section 5 login/password based schemes are easy to implement, they deals with conclusion and future directions. have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. II. VARIOUS AUTHENTICATION SCHEMES However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, There are several authentication schemes available in the viz. graphical scheme was introduced. But it also suffered due literature. They can be broadly classified as follows: to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit x What you know Password Authentication System, which is immune to the x What you have and common attacks suffered by other authentication schemes. x What you are Keywords-Authentication; Graphical Password; Security; The traditional username/password or PIN based Mobile Banking. authentication scheme is an example of the “what you know type”. Smartcards or electronic tokens are examples of I. INTRODUCTION “what you have type of authentication” and finally Authentication is a process of determining whether a biometric based authentication schemes are examples of the particular individual or a device should be allowed to access “what you are” type of authentication. Some authentication a system or an application or merely an object running in a systems may use a combination of the above schemes. In device. This is an important process which assures the basic this paper, we focus only on “what you know” types of security goals, viz. confidentiality and integrity. Also, authentication. adequate authentication is the first line of defense for Although traditional alphanumeric passwords are used protecting any resource. It is important that the same widely, they have problems such as being hard to remember, authentication technique may not be used in every scenario. vulnerable to guessing, dictionary attack, key-logger, For example, a less sophisticated approach may be used for shoulder-surfing and social engineering [1]. In addition to accessing a “chat server” compared to accessing a these types of attacks, a user may tend to choose a weak corporate database. Most of the existing authentication password or record his password. This may further weaken schemes require processing both at the client and the server the authentication schemes. As an alternative to the end. Thus, the acceptability of any authentication scheme traditional password based scheme, the biometric system greatly depends on its robustness against attacks as well as was introduced. This relies upon unique features unchanged its resource requirement both at the client and at the server during the life time of a human, such as finger prints, iris end. The resource requirement has become a major factor etc. The major problem of biometric as an authentication due to the proliferation of mobile and hand-held devices. scheme is the high cost of additional devices needed for Nowadays with the use of mobile phones, users can access identification process [2]. The false-positive and false- any information including banking and corporate database. negative rate may also be high if the devices are not robust. In this paper, we specifically target the mobile banking Biometric systems are vulnerable to replay attack (by the domain and propose a new and intelligent authentication use of sticky residue left by finger on the devices), which scheme. However, our proposal can also be used in other reduces the security and usability levels. Thus, recent domains where confidentiality and integrity are the major developments have attempted to overcome biometric security requirements. shortcomings by introducing token-based authentication The rest of the paper is organized as follows: Section 2 schemes. deals with various authentication schemes, and their Token based systems rely on the use of a physical device advantages and disadvantages. In section 3, we mention the such as smartcards or electronic-key for authentication main problems of the existing schemes. In Section 4, we purpose. This may also be used in conjunction with the 978-0-7695-4338-3/11 $26.00 © 2011 IEEE 430 DOI 10.1109/WAINA.2011.36
  • 2. traditional password based system. Token based systems are not completely secure. It needs several rounds of image vulnerable to man-in-the middle attacks where an intruder recognition for authentication to provide a reasonably large intercepts the user’s session and records the credentials by password space, which is tedious [7]. Also, it is obvious that acting as a proxy between the user and the authentication recognition based systems are vulnerable to replay attack device without the knowledge of the user [3]. Thus as an and mouse tracking because of the use of a fixed image as a alternative, graphical based passwords are introduced to password. Thus, we consider these drawbacks in our resolve security and usability limitations mentioned in the proposed system, which overcomes the problems of recall above schemes. based schemes too. Graphical-based password techniques have been B. Recall-Based Systems proposed as a potential alternative to text-based techniques, supported partially by the fact that humans can remember In recall-based systems, the user is asked to reproduce images better than text [4]. Psychologists have confirmed something that he/she created or selected earlier during the that in both recognition and recall scenarios, images are registration phase. Recall based schemes can be broadly more memorable than text [2]. Therefore, graphical-based classified into two groups, viz: pure recall-based technique authentication schemes have higher usability than other and cued recall-based technique. authentication techniques. On the other hand, it is also difficult to break graphical passwords using normal attacks 1) Pure Recall-Based Techniques such as dictionary attack, brute force and spyware which In this group, users need to reproduce their passwords have been affecting text-based and token-based without any help or reminder by the system. Draw-A-Secret authentication [5]. Thus, the security level of graphical- technique [8], Grid selection [9], and Passdoodle [10] are based authentication schemes is higher than other common examples of pure recall-based techniques. authentication techniques. In 1999, Jermyn et al. [8] proposed DAS (Draw-A- In general, the graphical password techniques can be Secret) scheme, in which the password is a shape drawn on classified into two categories: recognition-based and recall- a two-dimensional grid of size G * G as in Figure 1. Each based graphical techniques [4]. cell in this grid is represented by distinct rectangular coordinates (x, y). The values of touch grids are stored in temporal order of the drawing. If exact coordinates are A. Reconition-Based Systems crossed with the same registered sequence, then the user is In recognition-based systems, a group of images are authenticated. As with other pure recall-based techniques, displayed to the user and an accepted authentication requires DAS has many drawbacks. In 2002, Goldberg [11] a correct image being clicked or touched in a particular conducted a survey which concluded that most users forget order. Some examples of recognition-based system are their stroke order and they can remember text passwords Awase-E system [6], AuthentiGraph [3, 5], and Passfaces easier than DAS. Also, the password chosen by users are system [4]. vulnerable to graphical dictionary attacks and replay attack. An image password called Awase-E [6] is a new system which enables users to use their favorite image instead of a text password for authentication purpose. Even though Awase-E system has a higher usability, it is difficult to implement due to the storage space needed for images and also the system cannot tolerate replay attack. Adding to this, a user may always tend to choose a well-known (or associated with the user through some relation, like son, wife or a place visited etc.) image which may be prone to guessing attacks. Weinshall and Kirkpatrick [7] studied a recognition-based scheme and concluded that users can still remember their graphical password with 90% accuracy even after one or two months. Their study supports the theory that human remember images better than text. In addition for example, Figure 1. Example of DAS the commercial system Passfaces [4] uses images of human faces. Davis, et al. [7] worked on such A scheme and concluded that user’s password selection is affected by race and gender. This makes the Passfaces’s password somewhat predictable. Although a recognition-based graphical password seems to be easy to remember, which increases the usability, it is 431
  • 3. 2) Cued Recall-Based Techniques In this technique, the system gives some hints which help users to reproduce their passwords with high accuracy. These hints will be presented as hot spots (regions) within an image. The user has to choose some of these regions to register as their password and they have to choose the same region following the same order to log into the system. The user must remember the “chosen click spots” and keep them secret. There are many implementations, such as Blonder algorithm [12] and PassPoint scheme [13]. Figure 2. . Example of Grid Selection Model In 1996, Blonder [12] designed a method where a pre- determined image is shown to the user on a visual display and the user should “click” on some predefined positions on In 2004, the Grid selection technique was proposed by the image in a particular order to be authenticated as in Thorpe and Van Oorschot [9] to enhance the password Figure 4. This method was later modified and presented as space of DAS. Their study showed the impact of stroke- Passpoint [13]. count on DAS password space which decreases significantly In 2005, the PassPoint [13] scheme was created to be with less strokes for a fixed password length. To improve similar to the Blonder's scheme while overcoming some of the DAS security level, they suggested the "Grid Selection" its main limitations. In Passpoint, the image can be an technique, where the selection grid is large at the beginning, arbitrary photograph or paintings with many clickable A fine grained grid from which the person selects a drawing regions as shown in Figure 5. This will increase the grid, a rectangular area to zoom in on, in which they may password space of Passpoint scheme which in turn will enter their password as shown in Figure 2. This technique increase the security level. Another source of difference is would increase the password space of DAS, which improves that there is no predefined click area with clear boundaries the security level at the same time. Actually, this technique like the Blonder algorithm. The user password could only improves the password space of DAS but still carries contain any chosen sequence of points in the image, which over DAS weaknesses and drawbacks as mentioned above. increases the usability level of this scheme. Passdoodle [11], is a graphical password of handwritten drawing or text, normally sketched with a stylus over a touch sensitive screen as shown in Figure 3. In [11], Goldberg et.al have shown that users were able to recognize a complete doodle password as accurately as text-based passwords. Unfortunately, the Passdoodle scheme has many drawbacks. As mentioned in [9], users were fascinated by other users' drawn doodles, and usually entered other users' password merely to a different doodles from their own. In [1], the authors concluded that the Passdoodle scheme is vulnerable to several attacks such as guessing, spyware, key-logger, and shoulder surfing. Figure 4. Example of Blinder Scheme Figure 3. Example of Passdoodle Figure 5 Example of PassPoint System 432
  • 4. The Passpoint system has a large password space, which remotely. Since all the image based password schemes improves the security level compared with other similar known to us use static passwords, the recorded movie may systems. For example, five or six click points on an image be replayed and with some human-interaction, the user’s can produce more passwords than 8-character text-based password may be decoded. passwords with standard 26-character alphabet [13]. For more security, the Passpoint system stores the image password in a hashed (encrypted) form in the password file. IV. IMPLICIT PASSWORD AUTHENTICATION SYSTEM Moreover, hashing does not allow approximation e.g. two In this section, we propose our Implicit Password passwords that are almost the same but not fully identical Authentication System. IPAS is similar to the PassPoint will be hashed differently. In order to be authenticated, the scheme with some finer differences. In every “what you user has to click close to the selected points, within some know type” authentication scheme we are aware of, the measured tolerance distance from the pass point. server requests the user to reproduce the fact given to the Wiedenbeck et al. [14] proposed the best tolerance server at the time of registration. This is also true in around the click point in such an image. To log in, the user graphical passwords such as PassPoint. In IPAS, we should click with the tolerance of such a click point. In fact, consider the password as a piece of information known to a larger password space leads to a smaller tolerance size e.g. the server at the time of registration and at the time of 2 to 5 mm2 around the chosen click point or pixel. For authentication, the user give this information in an implicit example, an image of size 330 x 260 mm2 with tolerance form that can be understood only by the server. We explain areas of size 6 x 6 mm2 gives more than 590 tolerance areas this through a Mobile Banking case-study. [14]. It is clear that password space depends on the tolerance size or system choice. This enhancement makes the A. Study Case of IPAS (Mobile Banking) Passpoint system more flexible, especially for people using In our case study, we consider mobile banking as our mobile devices. domain. However, our proposed (IPAS) may also be implemented in any client-server environment, where we need to authenticate a human as a client (IPAS will not work III. PROBLEMS WITH THE EXITING SCHEMES in machine-to-machine authentication). We also assume that Traditional alphanumeric passwords are always the server has enough hardware resources like RAM and vulnerable to guessing and dictionary attack. There may CPU. This is not un-realistic as high-end servers are even be a rogue program that may record the key strokes becoming cheaper day-by-day. The bank may have a and publish it on a remote website. In order to overcome the database of 100 to 200 standard questions. During the time key logger based attacks, newer systems may show a of registration, a user should pick 10-20 questions from the graphical keyboard and the user has to press the correct database (depending upon the level of security required) and password using “mouse clicks”. This may also be defeated provide answers to the selected questions. For example, the if the attacker uses a screen capture mechanism, rather than user may choose the following questions: using a key logger. Since new video-codec is providing higher compression ratio, an attacker may use a screen x The maker of your first car? capture program and record a short video clip and send it to x The city you love to visit or visited? a remote server for publishing. So, as an alternative, a token x Date of birth? based authentication method may be used either as a stand- alone authentication or used in addition to the traditional For each question, the server may create an intelligent alphanumeric password. But this technology is not authentication space using images, where the answers to the pervasive. The user may have to carry a trusted token card particular question for various users are implicitly reader. With unknown token readers, a user may not be embedded into the images. During the time of aware whether they are using a trusted legitimate reader or authentication, the server may pick one or more questions using an un-trusted one that may clone the token (similar to selected by the users at the time of registration randomly the recent ATM card scam). (the number of questions depends on the level of service Although image based authentication systems reviewed in requested). For each chosen question, the server may choose our paper address most of the threats, still they suffer from an image randomly from the authentication space and the following attacks: replay, Shoulder-surfing, and present IT to the user as a challenge. Using the stylus or the recording the screen. mouse, the user needs to navigate the image and click the One may argue that replay attack can be prevented using right answer. For example, the server may present the user encryption and tamper-proof time stamps, and physical with the picture of the Globe. The user should correlate to shoulder-surfing may be known to the user as this process is Question 2. If Sydney is the city the user loves to visit or invasive. However, due to the availability of high- has visited, he needs to click on to Australia. It will then bandwidth to mobile devices and light-weight, high-efficient enlarge Australia. Then in the map, the user needs to click video codecs, a rogue program may still capture and publish Sydney as shown in Figure 6. 433
  • 5. the correct “clickable area”. Then based on the function f(I), the image I and the area the user clicked, the client will then generate a key K. The function f(I) is chosen in such a way that S(Qi) = K if and only if the user and the server has exactly the same area of interest in the image. The user then decrypts S(Qi)[p] to get the random number. He then transmits p+1 to the server for authentication and to the next level. In this way, the user is authenticated implicitly and no confidential information is exchanged over the network. When the server is executing the last question in the authentication process, instead of encrypting a pseudo Figure 6. Example of an IPAS random number, it will pick a session key and encrypt with the derived key. When the client decrypts it, he gets an implicit message from the server to use this session key for Next time, if the same question is chosen by the server, transmission. This procedure not only authenticates a user the same scenario may not be presented. For the next time, implicitly, this will also exchange a session key implicitly. the server may show an image containing all famous It is up to the application developer and the organization buildings and monuments. The user needs to click on the to decide on what to do when a user gives an incorrect “Sydney Opera house” to implicitly convey his answer. answer to one or more of the questions. Since every time the server uses a different scenario and the answers are given implicitly, our proposed system is immune to screen capture attack. Also, except for the server C. Strength of IPAS and the legitimate user, for others, the answers may look As one can easily see, IPAS is immune to shoulder fuzzy. For example, if the user click “Opera house”, it may surfing and screen-dump attacks. Also, the authentication even mean the “type of music user is interested to listen”, or information is presented to the user in an implicit form that may represent his “place of birth”, or “current residency” can be understood and decoded only by the legitimate end- and so on. user. Traditional password based authentication schemes and PassPoint are special cases of IPAS. The strength of B. IPAS Implementation Framework IPAS depends greatly on how effectively the authentication information is embedded implicitly in an image and it The bank will have a set of 100 to 200 questions. Every should be easy to decrypt for a legitimate user and highly- user selects a set of 10 to 20 questions at the time of fuzzy for a non-legitimate user. registration and provides their individual answer. For each One of the weaknesses of implementing this scheme is question, the system then either creates an authentication that the system may simply ask the user an alphanumeric space (the space that represents implicit answers for the question given during the time of registration process and questions using images) if it is not available or add the new ask the user to input the answer through a graphical user’s answer to the existing authentication space. Once the keyboard authentication space is created, the system is ready for authenticating a user. V. CONCLUSION AND FUTURE DIRECTIONS First, a user may request access to the system by In this paper, we have proposed a new Implicit Password presenting his user name and the level of access required. Authentication System where the authentication information This may be sent as a plain text. Depending on the level of is implicitly presented to the user. If the user “clicks” the access required, the system might choose one or more same grid-of-interest compared with the server, the user is questions registered by the user during the time of implicitly authenticated. No password information is registration process. For each question, the server may exchanged between the client and the server in IPAS. Since choose a random scenario from the authentication space that the authentication information is conveyed implicitly, IPAS represents the correct answer. The chosen scenario will have can tolerate shoulder-surfing and screen dump attack, which one or more “clickable” points that represent the answer to none of the existing schemes can tolerate. The strength of the question provided by the particular user. Similar to IPAS lies in creating a good authentication space with a PassPoint, the IPAS considers the image as a grid and the sufficiently large collection of images to avoid short answers represent a clickable area. repeating cycles. Compared to other methods reviewed in Similar to Kerberos, a session key S(Qi) is derived from our paper, IPAS may require human-interaction and careful the correct clickable area through a function f(I). The server selection of images and “click” regions. IPAS may also will choose a random number p and then encrypt p with the need user training. Once this is done, IPAS can be more session key S(Qi) and transmit <Image, S(Qi)[p], f(I)> to the robust. In our subsequent papers, we present various steps mobile device. The client application then displays the image. Using the stylus or a mouse, the user needs to choose 434
  • 6. involved in creating a robust authentication space for every symposium on Usable privacy and security. Pittsburgh, Pennsylvania, question. ACM. [8] Wei-Chi, K. and T. Maw-Jinn (2005). “A Remote User Authentication Scheme Using Strong Graphical Passwords”, Local Computer Networks, 2005. 30th Anniversary. REFERENCES [9] Lashkari, A. H., F. Towhidi, et al. (2009). “A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication [1] Sabzevar, A.P. & Stavrou, A., 2008,” Universal Multi-Factor Algorithms”, Computer and Electrical Engineering, 2009. ICCEE '09. Authentication Using Graphical Passwords”, IEEE International Second International Conference. Conference on Signal Image Technology and Internet Based Systems [10] Renaud, K. (2009)."On user involvement in production of images (SITIS). used in visual authentication." J. Vis. Lang. Comput. 20(1): 1-15. [2] Haichang, G., L. Xiyang, et al. (2009). “Design and Analysis of a [11] Masrom, M., F. Towhidi, et al. (2009). “Pure and cued recall-based Graphical Password Scheme”, Innovative Computing, Information graphical user authentication”, Application of Information and and Control (ICICIC), 2009 Fourth International Conference on Communication Technologies, 2009. AICT 2009. International Graphical Passwords. Conference. [3] Pierce JD, Jason G. Wells, Matthew J. Warren, & David R. Mackay. [12] Birget, J. C., H. Dawei, et al. (2006). "Graphical passwords based on (2003). “A Conceptual Model for Graphical Authentication”, 1st robust discretization", Information Forensics and Security, IEEE Australian Information security Management Conference, 24 Sept. Transactions on 1(3): 395-399. Perth, Western Australia, paper 16. [13] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, [4] Xiaoyuan, S., Z. Ying, et al. (2005). “Graphical passwords: a survey”, ``PassPoints: Design and longitudinal evaluation of a graphical Computer Security Applications Conference, 21st Annual. password system'', International J. of Human-Computer Studies [5] Wells, Jason; Hutchinson, Damien; and Pierce, Justin, "Enhanced (Special Issue on HCI Research in Privacy and Security), 63 (2005) Security for Preventing Man-in-the-Middle Attacks in Authentication, 102-127. formation Security Management Conference. Paper 58. [14] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. [6] Takada, T. and H. Koike (2003). “Awase-E: Image-Based Memon, ``Authentication using graphical passwords: Effects of Authentication for Mobile Phones Using User’s Favorite Images”, tolerance and image choice'', Symposium on Usable Privacy and Human-Computer Interaction with Mobile Devices and Services, Security (SOUPS), 6-8 July 2005, at Carnegie-Mellon Univ., Springer Berlin / Heidelberg. 2795: 347-351. Pittsburgh. [7] Dirik, A. E., N. Memon, et al. (2007). “Modeling user choice in the PassPoints graphical password scheme”, Proceedings of the 3rd 435