TIME BASED PERSUASIVE CUED CLICK-POINTS (TPCCP) Neenu Mol M.Tech Student Department of Computer Science and Engineering Malabar College of Engineering and Technology, Trissur neenuvinay@gmail.com Abstract— Varieties of authentication techniques are available passwords are difficult to remember by the user. From in recent times. Text based passwords are most commonly these it is concluded that a password authentication system used for authentication, but they are highly sensitive to several should encourage strong passwords while maintaining the kinds of attacks. Another type of authentication technique is based on graphical passwords. Graphical memorability. So a new alternative authentication method password has been proposed using pictures as passwords. authentication techniques are more useful and unsusceptible In graphical passwords [1] the user has to work with compared to text passwords, because human can remember images better than texts. This paper presents a graphical images, i.e. user performs some events on pictures like password authentication technique that enables users to select clicking, secure based authentication techniques gain more importance because authentication scheme minimizes the chance of capture Human brain has remarkable ability to remember thousands attacks like shoulder surfing. This product encourages user of images with detail. Whereas it difficult to keep text in choices and also influences users to select strong passwords. memory. and memorable passwords. This time The time based approach is more secure since password dragging, moving mouse etc. Graphical This paper proposes a time based graphical password authentication is based on both time and click points. The authentication scheme, called time based persuasive cued proposed scheme has a much higher password space than the click-points that encourages user choices and also allows other graphical authentication schemes. The scheme is very them to choose a strong password. In this system the task of convenient to use. selecting weak passwords is more tedious. This click-based Keywords- Graphical password authentication, Text based graphical authentication scheme influence users to set a passwords, Shoulder surfing, Password space. strong password which cannot be guessed by the attackers. I. It covers all usability and security issues. It is effective at INTRODUCTION reducing hotspots (areas of the image where users are more In knowledge-based authentication techniques, we likely to select click-points) and avoiding patterns formed usually prefer text based passwords. The major issue by click-points within a password, while still maintaining related with the text based passwords is that they are the usability. vulnerable to be hacked. The attackers can easily guess the II. passwords with other details of the system. In order to BACKGROUND avoid this problem system can assign strong passwords, Authentication techniques can be categorized into three which the attackers cannot guess. But the system assigned main areas: Token based, Biometric based and Knowledge 1 based authentication. In token based authentication A. PassPoints schemes a token is provided to the user, which contains In PassPoints a single password involves a sequence of data created by the server. The server uses this information five different click points on a given image. During to identify a particular user. Bank cards, Smart cards, and e- registration user may select any pixels as click points. At passports are examples of the tokens for authentication. In the time of login the user has to choose the click points in Biometric based authentication user is identified by his/her correct order within the system defined tolerance square of physical or behavioural traits. It is based on shape of the the original click points. body such as fingerprint, face, palm print, DNA etc. The major problem associated with this password scheme Knowledge based authentication technique can be is hotspots. Hotspots are areas of the images that have subdivided into two major categories: Alphanumeric and higher likelihood of being selected by users as password Graphical passwords. In Alphanumeric or Text based click points. Attackers who gain knowledge about these passwords user has to provide some text/characters from hotspots can build attack dictionaries and more easily guess keyboard or any other input device. Alphanumeric the passwords are susceptible to dictionary attacks [10], discretization square is used, which is the tolerance area guessing, brute force attack and shoulder surfing. In view around the original click point. The user should click on the of shortcomings of text based passwords Graphical discretization area. Here, the system does not have any techniques are gaining importance. influence over the selection of the click points. Since it is Graphical Passwords [2] can be of two types: PassPoints passwords. For correct validation, being very simple, it can easily be attacked. Recognition based and Recall based. For recognition based B. Cued Click-Points technique a user is presented with a collection of images Cued Click-Points (CCP) [4] was developed to overcome from which they are able to select pictures, icons or the shortcomings of PassPoints. That means it was designed symbols. At the time of authentication process, the user is to reduce patterns and hotspots problems. Rather than five required to recognize their registration choice from among click points on one image CCP uses five click points on a set of images. five different images in sequence as a single password. Recall based technique can be of two types: Pure recall While creating a password the user can choose these five based and Cued-recall based. For pure recall based click-points on five different images. technique, a user has to reproduce her password without At the time of authentication the user has to click the being given any reminder, hints or gestures. Cued-recall chosen click points in sequence within the defined based technique is based on reminders, hints and gestures tolerance square of the original click points. Here the next that assists the user to reproduce their password or to make image displayed is based on the user’s previous click as a reproduction more accurate. shown in Fig 1. When logging on, seeing an image they do Click-based graphical passwords [3] are a type of not recognize alerts users that their previous click-point knowledge based authentication systems, in which users was incorrect and users may restart password entry. identify and target previously selected locations within one In this scheme user is free to select the password without or more images. The images act as memory cues to aid system’s intervention. So the attackers can easily guess the recall. Example systems include PassPoints and Cued hotspots. CCP is a secure authentication scheme than Click- Points (CCP). Passpoints. During login, when user sees an unseen image, he knows that his previous click-point was incorrect. 2 But CCP is also vulnerable to hotspot problem, because user must choose the five click points on five different the user is free to select the password without the system’s images in sequence within the defined tolerance square of guidelines. In this case attackers can guess the hotspots in the original click points. The invalid click-points lead to the images and also can log in to the system easily. Here incorrect image sequence. Hence the user cannot login the authentication failure is indicated after the final click- successfully. point. So it protect against the guessing attacks. Fig. 1. A user navigates through images to form a CCP password. Each click determines the next image. Fig. 2. PCCP Create Password interface. The viewport highlights part of C. Persuasive Cued Click-Points the image. Persuasive Technology was first articulated by Fogg [5]. Persuasive technology allows users to select strong PCCP [7] operates in two dimensions; x and y positions passwords and do not impose system assigned passwords. from the top left corner of the image are used for the login Persuasive Cued Click-Points (PCCP) [6] was designed by process. The sequence of five click-points on five different adding the persuasive feature to the CCP. At the time of images of PCCP password increases its security. It is registration images are shaded except for a viewport as difficult for attackers to guess these click-points. PCCP shown in Fig 2. The viewport is located at random, which reduces the formation of patterns and also minimize hotspot enables to avoid the hotspots problem. problems. It eliminates most of the drawbacks of Cued The user must choose the click points within this Click-Points (CCP). viewport and also cannot click outside of the viewport. But they are susceptible to capture attacks like shoulder Here a shuffle button is used to reposition the viewport. surfing [8]. Shoulder surfing means act of obtaining private These viewport and shuffle buttons are displayed only information through direct observation. So that observing during password creation. the approximate location of click points may reduce the During login images are displayed normally and user number of guesses to determine the password. may click anywhere on the images. The viewport and the shuffle button are absent at the time of authentication. Then 3 III. the other parts of the image are shaded, so that the user can TIME BASED PERSUASIVE CUED CLICK- POINTS (CCP) click only inside the view port. The view ports are selected encourages users to select more arbitrary click-points, by the system randomly for each image to create a hence more secure passwords. As PCCP [9], TPCCP uses a graphical password. It will be very hard for the attackers to sequence of five click-points on five different images as a guess the click point in all the images. The users are single password. When user creates a password all the allowed to click anywhere in the view port. There is an images are faintly shaded except for a viewport. The option for changing the viewport position also. This option viewport is situated at random during the password creation is called the Shuffle. There is a limit on the number of to avoid the known hotspots. times the shuffle option to be used. Persuasive feature in Cued Click-Points A shuffle button is used to shift the viewport arbitrarily. While users may shuffle as often as desired, this The viewport and the shuffle button are present only during significantly slows password creation. The viewport and the registration phase. At the time of password creation the shuffle button appear only during password creation. user should select the threshold time for each click-point, During later password entry, the images are displayed while login, the users have to click on image within the normally, without shading or the viewport, and users may threshold time selected here. Else they don’t have click anywhere on the images. During login click-points permission to login. must be within the defined tolerance squares of the original points and must be clicked within the threshold time. At the time of authentication, the images are sported normally without any shading, users may allow to click Like PCCP, TPCCP implements centered discretization, anywhere on the images. Then the user must choose the in which the approximately correct click-points to be click-points within the chosen threshold time as shown in accepted by the system. In centered discretization each Fig. 3. In the case of incorrect click-points and the selection image is divided into square tolerance areas and then of click-points beyond the threshold time are leads to determines whether the login click points falls within this invalid image sequence. Like PCCP, it provides the tolerance area of original click-point. For each click-point, feedback about the correctness of the password in every this fixed sized square area is set around the original click- attempt. point during the registration. At the time of login, the system checks the acceptability of each click-point. IV. IMPLEMEMTATION ISSUES For each password PW, the system hashes the username Persuasive Cued Click-Points (PCCP) is works in two W, and the following details for each click-point Ci dimensions i.e. x and y positions from top left corner of the (i=1….5): its grid offset (Gxi;Gyi), a tolerance area image are used for authentication. Besides these, the identifier Txi; Tyi (indicating the exact square containing TPCCP take into consideration the time interval (threshold the click-point), threshold time ti and its image identifier Ii. time) for each click-point. While registering the password, The system stores additional information Aw such as Gx, user should also choose the time interval for the particular Gy for each click-point and a random seed Sw to determine clicks point. At the time of authentication each click must collection of images for a user. These components are be performed within the chosen time interval. The described as following sections describe several practical design and Pw = h( [C1,….Ci], W ) implementation choices in building the TPCCP. In TPCCP, when the image is displayed the randomly Ci = ( Ii, Txi, Tyi, Gxi, Gyi, ti ) Aw = ( [ Gx1, Gy1,………Gxi, Gyi ], Sw ) selected grid called the view port only clearly seen out. All 4 In order to improve the security of the system the In TPCCP, each image displayed is based on a number of click-points used for a single password can be deterministic function increased. To increase the memorability of the user, an audio support Ii+1 = f( Sw, Ci, ti). can be used, i.e. each valid click-point is associated with an audio sound. So that for invalid click-points user can be i.e. During login the first image loaded is I1 =f(SW; 0). Sw alarmed by a different sound. is generated during the password creation and is The password strength is increased with the password regenerated during the authentication process. Each time a space. The effective password space is determined by the password is changed a new Sw is formed. area of the viewport. So for creating a strong password, the Human eye is visible to small portion of images at a time. viewport should be larger. It increases security of the So the viewport must be large enough to satisfy the user’s password, but decreases the memorability of the password. choice, but small enough to distribute the click-points This system can be improved by including better image across the image. As PCCP this system uses a 75×75 size features. viewport. This viewport is positioned randomly on the VI. CONCLUSIONS image. During password creation TPCCP uses a shuffle Since click based graphical passwords are secure and button to arbitrarily relocate the viewport. In TPCCP the random, the attacker cannot guess it. Also these passwords chance of shuffle is restricted to three. are very easy to remember. The purpose of good authentication system is to provide a strong and effective password space. By the use of random viewport the system can generate more robust password. The use of shuffle during password creation is restricted here. Thus the registration process will be faster. This system allows user choice while increasing the password space. The time interval associated with each click-point helps the user to fast login. In the case of hacker, who doesn’t know the correct time interval cannot make login successfully. The major advantage of time based persuasive cued click point scheme is its large password space since the entire image is used for creating the password and the viewport limits the possibility of hotspots. Thus it provides high security. TPCCP is based on the time interval for each click-point. While choosing small time interval (threshold time) during Fig. 3. TPCCP Login interface. the password creation, the problem of shoulder surfing is greatly reduced. V. FUTURE WORK In Time based PCCP, user choice is allowed and also the The following aspects can be added to the concept system direct their selection. That means it guides users for discussed above: 5 making strong passwords by the use of viewport during password creation. It makes secure choices rather than vague instructions such as “pick a password that is hard to guess.” The use of persuasive technology increases the randomness of the password. It reduces the formation of patterns and hotspots, thus the effective password space is increased. VII. REFERENCES [1] “Graphical Password Authentication Schemes: Current Status and Key Issues” Harsh Kumar Sarohi1, Farhat Ullah Khan. [2] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical Passwords: Learning from the First Twelve Years,” to be published in ACM Computing Surveys, vol. 44, no. 4, 2012. [3] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords, ” Proc. ACM Symp. Usable Privacy and Security (SOUPS), July 2007. [4] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical password authentication using Cued Click Points,” in European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359–374. [5] “Persuasive Cued Click-points:Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism”, Sonia Chiasson, Elizabath Stobert, Alain Forget, and Paul C. Van. [6] “Design, Implementation and Evaluation of Knowledge-Based Authentication Mechanism Using Persuasive Cued ClickPoints” by Prof. Anil Kulkarni, Sangameshwar. [7] B. Fogg, Persuasive Technologies: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, San Francisco, CA, 2003. [8] “Shoulder Surfing attack in graphical password authentication”, Arash Habibi Lashkari, Samaneh Farmand, Dr.Omar Bin Zakaria, Dr.Rosli Saleh. [9] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing users towards better passwords: Persuasive Cued Click-Points,” in Human Computer Interaction (HCI), The British Computer Society, September 2008. [10] B. Pinkas and T. Sander, “Securing Passwords against Dictionary Attacks,” Proc. Ninth ACM Conf. Computer and Comm. Security(CCS), Nov. 2002. 6