Graphical Password
Graphical Password
Engineering
GRAPHICAL
PASSWORD AUTHENTICATION
2
Introduction
What is a Password
3
Overview of The
Authentication Methods
Token based authentication
Key cards, bank cards, etc.
4
Text Password
Text password is a secret word or string of characters that is
used for user authentication to prove his identity and gain
access to resources.
Drawbacks
Difficulty of remembering passwords.
easy to remember -> easy to guess
hard to guess -> hard to remember
5
Graphical password
Graphical passwords were originally described by BLONDER
in 1996.
6
The Survey: Two Categories
Recall Based Techniques
A user is asked to reproduce something that he created or
selected earlier during the registration stage.
7
Recall based techniques
Draw-A-Secret (DAS) Scheme
User draws a simple picture on a 2D grid, the coordinates of
the grids occupied by the picture are stored in the order of
drawing.
8
Recall based techniques
Pass Point Scheme
User click on any place on an image in a sequence to create
a password. In order to be authenticated, user must click in
the same place on the image and in the correct sequence.
9
Recognition based techniques
Dhamija and Perrig Scheme
Pick several pictures out of many choices, identify them
later
in authentication.
10
Recognition based techniques
Passface Scheme
In this technique human faces are used as password.
11
Advantages
Graphical password schemes provide a way of making
more human-friendly passwords .
12
Disadvantages
Password registration and log-in process take too long.
Shoulder Surfing .
13
Conclusion
Graphical passwords are an alternative to textual
alphanumeric password. It satisfies both conflicting
requirements i.e. it is easy to remember & it is hard to
guess. By the solution of the shoulder surfing problem, it
becomes more secure & easier password scheme. Not yet
widely used, current graphical password techniques are still
immature.
14
Reference
[1] Blonder, G. (1996). "Graphical Passwords." United States Patent No. 5559961.
[2] Jermyn, I., Mayer, A., Monrose, F., Reiter, M., & Rubin, A. (1999). "The Design and
Analysis of Graphical Passwords." Proceedings of the 8th USENIX Security Symposium,
pp. 1-14.
[3] Biddle, R., Chiasson, S., & Van Oorschot, P. (2012). "Graphical Passwords: Learning
from the First Twelve Years." ACM Computing Surveys, vol. 44, no. 4, pp. 1-41.
[4] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005).
"PassPoints: Design and Longitudinal Evaluation of a Graphical Password System."
International Journal of Human-Computer Studies, vol. 63, no. 1, pp. 102-127.
[5] Zhao, H. & Li, X. (2007). "S3PAS: A Scalable Shoulder-Surfing Resistant Textual-
Graphical Password Authentication Scheme." Proceedings of the 21st International
Conference on Advanced Information Networking and Applications
Workshops, pp. 467-472.
15
Thank You…
16