This document discusses authentication methods and focuses on graphical passwords. It begins with an overview of common authentication methods like text passwords, tokens, and biometrics. It then discusses the drawbacks of text passwords and introduces graphical passwords as an alternative. The document surveys recall-based and recognition-based graphical password techniques and provides examples like Draw-A-Secret and Passfaces. It concludes by noting the advantages of graphical passwords in usability and security but also disadvantages like longer login times and storage requirements.
Introduction to authentication methods, overview of text and graphical passwords, survey techniques, and a discussion on advantages and disadvantages.
Definitions and usage of passwords in authentication across various systems, including token and biometric methods.
Text passwords as user authentication methods, their vulnerabilities, and the challenge of memorizing complex passwords.
Introduction to graphical passwords, including their definition, operation, and applications in web and ATM logins.
Explanation of recall-based and recognition-based authentication techniques for graphical passwords.
Various graphical password schemes: Draw-A-Secret, signature scheme, Pass Point scheme, and several user-selected image schemes.
Pros and cons of graphical passwords, including user-friendliness, security, registration time, storage concerns and vulnerability to shoulder surfing.
Summary of graphical passwords as a viable alternative to text passwords, addressing security and usability concerns.
Introduction
Overview of theAuthentication Methods
Text Password and drawbacks.
Graphical Passwords.
The survey
Recall Based Techniques
Recognition Based Techniques
Discussion
Advantages
disadvantages
Conclusion
3.
What is PASSWORD
Theterm PASSWORD commonly refers to a secret used for
authentication. Passwords are the most commonly used method for
identifying users in computer and communication systems.
PASSWORDS are used for:
Logging into accounts.
Retrieving emails.
Accessing applications.
Networks.
Websites
Databases
workstations
4.
Token based authentication
Key cards, bank cards, smart card, …
Biometric based authentication
Fingerprints, iris scan, facial recognition, …
Knowledge based authentication
Text-based passwords, picture-based passwords, …
Most widely used authentication techniques
5.
Text Password
Text passwordis a secret word or string of characters that is
used for user authentication to prove his identity and gain access
to resources.
Drawback
Difficulty of remembering passwords.
easy to remember -> easy to guess
hard to guess -> hard to remember
Vulnerable to attacks like Dictionary attack, Brute force
attack .
Many solutions have been proposed. Graphical password is
one of the solutions.
6.
Graphical passwordswere originally described by BLONDER
in 1996.
A graphical password is an authentication system that works
by having the user select from images, in a specific
order, presented in a graphical user interface (GUI).
For this reason, the graphical-password approach is
sometimes called graphical user authentication (GUA).
7.
Use of graphicalpassword:
Web log-in application.
ATM machine.
Mobile device.
8.
Recall Based Techniques
Auser is asked to reproduce something that he created or
selected earlier during the registration stage
Recognition Based Techniques
A user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he
selected during the registration stage
9.
Draw-A-Secret (DAS) Scheme
User draws a simple picture on a 2D grid, the coordinates of the
grids occupied by the picture are stored in the order of drawing.
Redrawing has to touch
the same grids in the
same sequence in
authentication.
Pass Point Scheme
Userclick on any place on an image to create a password. A
tolerance around each chosen pixel is calculated. In order to be
authenticated, user must click within the tolerances in the
correct sequence.
12.
Dhamija andPerrig Scheme
Pick several pictures out of many choices, identify them later
in authentication.
Sobrado andBirget Scheme
System display a number of pass-objects (pre-selected by user)
among many other objects, user click inside the convex hull
bounded by pass-objects.
15.
Advantages of Graphicalpassword
Graphical password schemes provide a way of making more
human-friendly passwords .
Here the security of the system is very high.
Dictionary attacks and brute force search are infeasible.
16.
Disadvantages ofGraphical password
Password registration and log-in process take too long.
Require much more storage space than text based passwords.
Shoulder Surfing .
- As the name implies, shoulder surfing is watching over people's
shoulders as they process information.
- Because of their graphic nature, nearly all graphical password schemes
are quite vulnerable to shoulder surfing.
17.
Graphical passwords arean alternative to textual alphanumeric
password.
It satisfies both conflicting requirements i.e. it is easy to
remember & it is hard to guess.
By the solution of the shoulder surfing problem, it becomes more
secure & easier password scheme.
Not yet widely used, current graphical password techniques are
still immature.