Graphical Password System using Different Techniques–A Review Mr. Amit Kashnath Barate

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 11 - Mar 2014
Graphical Password System using Different
Techniques–A Review
Mr. Amit Kashnath Barate1, Mrs.Sunita Sunil Shinde2
1
M.E. (student), 2 Assistant Professor
Department of Electronics & Telecommunication, Annasaheb Dange College of Engineering & Technology, Ashta,
Maharastra, India.
Abstract— This review summarises the current state of
knowledge on various methods of Image authentication.
Passwords provide security mechanism for authentication and
protection of services against unwanted access to resources. The
essential function of authentication systems is to support users in
selecting better passwords to access or enter into systems. Most
frequently the authentications are based on the use of
alphanumeric passwords. However, users face difficulty in
remembering passwords that are long or random-appearing.
Thus, they create short, simple, and insecure passwords. The
graphical based password offers a better and efficient alternative
to textual passwords. Human psychology studies have indicated
that humans are able to remember pictures easily. Thus
graphical passwords have been designed to make passwords
more memorable and easier for people to use and, hence, more
secure. In a graphical password, users click on images instead of
typing alphanumeric characters. This password system is a
combination of recognition and recall based techniques that
offers many advantages over the conventional systems and could
be more convenient for the user.
Keywords—Authentication, Security, Graphical password,
Attacks, Pass Points Click Password, Cued Click Points
Password.
I.
INTRODUCTION
One of the most important functions of any security system
is the controlling of people in or out of protected areas, such
as physical buildings, information systems and our national
borders. Also, computer systems and the information they
store and process are valuable resources which need to be
protected.
Authentication is most often based on the use of
alphanumeric passwords. However, users have difficulty in
remembering a password that is long and random-appearing.
Instead, they create short, simple, and insecure passwords.
The problem arises because passwords are expected to comply
with two fundamentally conflicting requirements:
 Passwords should be easy to remember, and the user
authentication protocol should be executable quickly
and easily by humans.
 Passwords should be secure, i.e., they should look
random and should be hard to guess; they should be
changed frequently, and should be different on
different accounts of the same user; they should not
be written down or stored in plain text.
ISSN: 2231-5381
To overcome the problems associated with text password
based authentication systems, many researchers have
proposed the concept of graphical password and developed the
alternative authentication mechanisms.
A. Main problems with alphanumeric passwords
The main problem with the alphanumeric passwords is that
once a password has been chosen and learned the user must be
able to recall it to log in. But, people regularly forget their
passwords. If a password is not frequently used it will be even
more susceptible to forgetting. The recent surveys have shown
that users select short, simple passwords that are easily
guessable, for example, personal names of their family
members, names of pets, date of birth etc. [8].
B. Why Graphical Passwords?
Graphical passwords were originally described by Blonder
(1996). The basic notion for graphical Password is that
graphical passwords are expected to be easier to recall, less
likely to be written down and have the potential to provide a
richer symbol space than text based passwords. For example,
a user might authenticate by clicking a series of points on an
image, selecting a series of tiles, or by drawing a series of
lines on the screen [9].
II. CLASSIFICATION OF GRAPHICAL PASSWORD SYSTEM
Graphical based passwords schemes can be broadly
classified into four main categories: First is Recognition
based Systems. Recognition based techniques involve
identifying whether one has seen an image before. The user
must only be able to recognize previously seen images, not
generate them unaided from memory. Second is Pure Recall
based systems. In pure recall-based methods the user has to
reproduce something that he or she created or selected earlier
during the registration stage. Third is Cued Recall based
systems. In cued recall-based methods, the user is provided
with a hint so that he or she can recall his his/her password.
Fourth is Hybrid systems which are typically the combination
of two or more schemes.
III.
VARIOUS GRAPHICAL PASSWORD TECHNIQUES
A number of graphical password techniques have been
proposed to fulfill the requirements of the secure and
http://www.ijettjournal.org
Page 537
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 11 - Mar 2014
memorable password such as Pass Points Graphical Password,
Cued Click Points Graphical Password, Persuasive Cued
Click-Points (PCCP) Graphical Password.
A. Pass Points Graphical Password
In the PassPoints graphical password scheme a password
consists of a sequence of click points (say 5 to 8) that the user
chooses in an image [4]. The image is displayed on the screen
by the system. The image is not secret and has no role other
than helping the user remember the click points. Any pixel in
the image is a candidate for a click point. To log in, the user
has to click again closely to the chosen points, in the chosen
sequence. Since it is almost impossible for human users to
click repeatedly on exactly the same point, the system allows
for an error tolerance in the click locations.
B. Cued Click Points Graphical Password
The idea of click-based graphical passwords originated
with Blonder [2] who proposed a scheme where a password
consisted of a series of clicks on predefined regions of an
image. Cued Click Points (CCP) is a proposed alternative to
PassPoints. In CCP, users click one point on each of images
rather than on five points on one image. It offers cued-recall
and introduces visual cues that instantly alert valid users if
they have made a mistake when entering their latest clickpoint (at which point they can cancel their attempt and retry
from the beginning). It also makes attacks based on hotspot
analysis more challenging. If a user enters an incorrect clickpoint, then the sequence of images from that point onwards
will be incorrect and thus the login attempt will fail. For an
attacker who does not know the correct sequence of images,
this cue will not be helpful.
C. Persuasive Cued Click-Points (PCCP) Graphical
Password
Persuasive Technology was first articulated by Fogg [11] as
using technology to motivate and influence people to behave
in a desired manner. He discusses how interface cues can be
designed to actively encourage users to perform certain tasks.
Forget et al. [12] propose how these may be condensed into a
set of core persuasive principles for computer security. By
adding a persuasive feature to CCP, PCCP encourages users to
select less predictable passwords, and makes it more difficult
to select passwords where all five click-points are hotspots.
graphical passwords than text-based passwords. Automatically
generated accurate mouse movement is required in brute force
attack to reproduce human input, which is mostly difficult in
case of recall based graphical passwords.
B. Dictionary Attacks
Since recognition based graphical pass-words involve
mouse input instead of keyboard input, it will be impractical
to carry out dictionary attacks against this type of graphical
passwords. For some recall based graphical passwords, it is
possible to use a dictionary attack but an automated dictionary
attack will be much more difficult than a text based dictionary
attack. Overall, graphical passwords are less vulnerable to
dictionary attacks than text-based passwords.
C. Guessing
Like a serious problem usually associated with text-based
passwords, graphical passwords also tend to be guessed. For
example, studies on the Pass face technique have shown that
people often choose weak and predictable graphical
passwords. Similar predictability is found among the graphical
passwords created with the DAS technique.
V. FUTURE IMPROVEMENTS WITH POSSIBLE INTEGRATED
SYSTEM FOR GRAPHICAL PASSWORD
Theoretically, textual password and graphical integrated
password can be used to enhance the security of the system.
Multilevel system can be implemented with different types of
password system. The detailed description of an integrated
system is not the focus of this paper.
VI.
CONCLUSION
This paper provides a record on different types of existing
graphical password techniques. The graphical password
techniques are classified into two categories; recognitionbased and recall-based techniques. The past decade has seen
an emergent interest in using graphical passwords as an
alternative to the conventional text-based passwords. To
enhance the security implementation of different multilevel
graphical system might be a prerequisite.
ACKNOWLEDGMENT
IV.
VARIOUS P OSSIBLE ATTACK ON GRAPHICAL
PASSWORD TECHNIQUES
Following are the different types of attacks on the
graphical passwords:
A. Brute Force Attack
The main defence against brute force attack is to have a
sufficiently large password space. In some graphical password
techniques password space is similar to or larger than that of
text-based passwords. Recognition based graphical passwords
tend to have smaller password spaces than the recall based
methods. A brute force attack is difficult to carry against
ISSN: 2231-5381
I would like to acknowledge and extend my heartfelt
gratitude to my guide Prof. Sunita S. Shinde for her
encouragement and support. .
REFERENCES
[1]
Ahmad Almulhem Computer Engineering Department King Fahd
University of Petroleum and Minerals Dhahran, Saudi Arabia, A
Graphical Password Authentication System.
[2]
Chiasson, S, van Oorschot, P.C., Biddle, R. Graphical Password
Authentication Using Cued Click-points. ESORICS 2007.
http://www.ijettjournal.org
Page 538
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 11 - Mar 2014
AUTHORS BIOGRAPHY
[3]
Sonia Chiasson, Member, Robert Biddle, Member, IEEE, and Paul C.
van Oorschot, Member, IEEE, Persuasive Cued Click-Points: Design,
Implementation, and Evaluation of a Knowledge-Based Authentication
Mechanism, March 2012.
[4]
Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget, Department of
Computer and Information Science, Modeling user choice in the
PassPoints graphical password scheme.
[5]
Patric Elftmann, Diploma Thesis, “Secure Alternatives to PasswordBased Authentication Mechanisms” Aachen, Germany October 2006.
[6]
FABIAN MONROSE AND MICHAEL K. REITER, ch09.10346 Page
161 Friday, August 5, 2005, Graphical Passwords.
[7]
Sonia Chiasson, Alain Forget, Robert Biddle, P.C. van Oorschot,
School of Computer Science, 2Human-Oriented Technology Lab
Carleton University, Ottawa Canada, Influencing Users Towards Better
Passwords: Persuasive Cued Click-Points.
[8]
Brown, Bracken, Zoccali, & Douglas, Sasse et al., 2001; 2004.
[9]
Bogdan Hoanca and Kenrich Mock,“Secure graphical password
system for high traffic public areas” ETRA '06 2006.
[10]
Blonder, G.E. Graphical Passwords. United States Patent 5,559,961,
1996.
[11]
Fogg, B.J. Persuasive Technologies: Using Computers to Change What
We Think and Do. Morgan Kaufmann Publishers, San Francisco, CA,
2003.
[12]
Forget, A., Chiasson, S., and Biddle, R. Persuasion as Education for
Computer Security. AACE E-Learn 2007.
ISSN: 2231-5381
Mrs. Sunita S. Shinde received the
Bachelor’s and Master’s degree in
Electronics Engineering from Shivaji
University, Kolhapur, Maharashtra.
She has teaching experience of 16
years. Her fields of interests are
Wireless communication and Adhoc
Networks. She is a life member of
ISTE. She has written three books on Computer Networks.
http://www.ijettjournal.org
Mr. Amit K. Barate is pursuing M.E in
Electronics and Telecommunication
from Shivaji University, Maharatshtra.
He has completed the Bachelor’s degree
in Electronics and Telecommunication
from Mumbai University, Maharatshtra.
Page 539
Download