0% found this document useful (0 votes)
22 views16 pages

Graphical Password

Uploaded by

Abhisek Rout
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views16 pages

Graphical Password

Uploaded by

Abhisek Rout
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Department of Computer Science and

Engineering

GRAPHICAL
PASSWORD AUTHENTICATION

Name- Abhisek Rout Under the guidance


Regd. No- of :-
2101229025 Prof. Surajit
Sec- A Mohanty
Sem- 7th
Branch- CSE
Contents
Introduction
Overview of the Authentication Methods
Text Password and Drawbacks
Graphical Password
The Survey
Recall Based Techniques
Recognition Based Techniques
Advantages
Disadvantages
Conclusion
Reference

2
Introduction
What is a Password

A password, sometimes called a passcode, is a secret data that is


used to identify a user and grant access to a device or website. It
protects our accounts and devices and also keep our information
safe and private.

Passwords are used for :-

 Logging into accounts


 Retrieving emails
 Accessing applications
 Networks
 Websites
 Databases

3
Overview of The
Authentication Methods
 Token based authentication
 Key cards, bank cards, etc.

 Biometric based authentication


 Fingerprints, iris scan, facial recognition, etc.

 Knowledge based authentication


 Text-based passwords, picture-based passwords, etc.
 Most widely used authentication techniques.

4
Text Password
Text password is a secret word or string of characters that is
used for user authentication to prove his identity and gain
access to resources.

Drawbacks
 Difficulty of remembering passwords.
 easy to remember -> easy to guess
 hard to guess -> hard to remember

 Vulnerable to attacks like Dictionary attack, Brute force


attack .
Many solutions have been proposed. Graphical
password is one of the solutions.

5
Graphical password
 Graphical passwords were originally described by BLONDER
in 1996.

 A graphical password is a type of authentication system


that uses images instead of text-based passwords to access
something.

 It is also known as graphical password authentication(GUA).

6
The Survey: Two Categories
 Recall Based Techniques
A user is asked to reproduce something that he created or
selected earlier during the registration stage.

 Recognition Based Techniques


A user is presented with a set of images and the user passes
the authentication by recognizing and identifying the
images he selected during the registration stage.

7
Recall based techniques
Draw-A-Secret (DAS) Scheme
 User draws a simple picture on a 2D grid, the coordinates of
the grids occupied by the picture are stored in the order of
drawing.

 Redrawing has to touch


the same grids in the
same sequence in
authentication.

8
Recall based techniques
Pass Point Scheme
User click on any place on an image in a sequence to create
a password. In order to be authenticated, user must click in
the same place on the image and in the correct sequence.

9
Recognition based techniques
Dhamija and Perrig Scheme
Pick several pictures out of many choices, identify them
later
in authentication.

10
Recognition based techniques
Passface Scheme
In this technique human faces are used as password.

11
Advantages
 Graphical password schemes provide a way of making
more human-friendly passwords .

 Here the security of the system is very high.

 Dictionary attacks and brute force search are infeasible.

12
Disadvantages
 Password registration and log-in process take too long.

 Require much more storage space than text based


passwords.

 Shoulder Surfing .

13
Conclusion
 Graphical passwords are an alternative to textual
alphanumeric password. It satisfies both conflicting
requirements i.e. it is easy to remember & it is hard to
guess. By the solution of the shoulder surfing problem, it
becomes more secure & easier password scheme. Not yet
widely used, current graphical password techniques are still
immature.

14
Reference
[1] Blonder, G. (1996). "Graphical Passwords." United States Patent No. 5559961.

[2] Jermyn, I., Mayer, A., Monrose, F., Reiter, M., & Rubin, A. (1999). "The Design and
Analysis of Graphical Passwords." Proceedings of the 8th USENIX Security Symposium,
pp. 1-14.

[3] Biddle, R., Chiasson, S., & Van Oorschot, P. (2012). "Graphical Passwords: Learning
from the First Twelve Years." ACM Computing Surveys, vol. 44, no. 4, pp. 1-41.

[4] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005).
"PassPoints: Design and Longitudinal Evaluation of a Graphical Password System."
International Journal of Human-Computer Studies, vol. 63, no. 1, pp. 102-127.

[5] Zhao, H. & Li, X. (2007). "S3PAS: A Scalable Shoulder-Surfing Resistant Textual-
Graphical Password Authentication Scheme." Proceedings of the 21st International
Conference on Advanced Information Networking and Applications
Workshops, pp. 467-472.

15
Thank You…

16

You might also like