GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the...

18
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera

Transcript of GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the...

Page 1: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

GRAPHICAL PASSWORD

AUTHENTICATION PRESENTED BY

SUDEEP KUMAR PATRA

REGD NO-0901223488

Under the guidance ofMrs. Chinmayee Behera

Page 2: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

CONTENTS

1. WHAT IS PASSWORD?2. OVERVIEW OF AUTHENTICATION METHOD.3. WHAT IS GRAPHICAL PASSWORD?4. THE SURVEY.5. COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL

PASSWORDS. 6. A SIMPLE GRAPHICAL PASSWORD SCHEME.7. GRAPHICAL PASSWORD-WHAT A CONCEPT.8. ADVANTAGES OF GRAPHICAL PASSWORDS.9. DRAWBACKS.10. CONCLUSION

Page 3: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

PASSWORDS

The most commonly used form of user authentication. The weakest links of computer security systems. Two conflicting requirements of alphanumeric

passwords (1) Easy to remember and (2) Hard to guess. Many people tend to ignore the second requirement which

lead to weak passwords. Many solutions have been proposed. Graphical password is one of the solutions.

Page 4: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

OVERVIEW OF THE AUTHENTICATION METHOD

Token based authentication– key cards, band cards, smart card, …

Biometric based authentication– Fingerprints, iris scan, facial recognition, …

Knowledge based authentication– text-based passwords, picture-based passwords– most widely used authentication techniques

Page 5: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

GRAPHICAL PASSWORDS

A GRAPHICAL PASSWORD is an authentication system that works by having the user select from

images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).

It can be used in:– web log-in application– ATM machines– mobile devices

Page 6: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

The survey : Two categories

Recognition Based Techniques– a user is presented with a set of images and the user passes the

authentication by recognizing and identifying the images he selected during the registration stage

Recall Based Techniques– A user is asked to reproduce something that he created or

selected earlier during the registration stage

Page 7: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

Recognition Based Techniques

Sobrado and Birget Scheme System display a number of pass-objects (pre-

selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.

– authors suggested using 1000 objects, which makes the display very crowed and the objects almost indistinguishable.

password space: N!/K! (N-K)!

( N-total number of picture objects

K-number of pre-registered objects)

Page 8: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

Recall Based Techniques

“PassPoint” Scheme User click on any place on an image to

create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence.

Password Space: N^K

( N -the number of pixels or smallest

units of a picture, K - the number of

Point to be clicked on )

Page 9: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS:

Commonly used guidelines for alpha-numeric passwords are: The password should be at least 8 characters long. The password should not be easy to relate to the user (e.g., last name,

birth date). Ideally, the user should combine upper and lower case letters and

digits.

Graphical passwords The password consists of some actions that the user performs on an

image. Such passwords are easier to remember & hard to guess.

Page 10: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

Graphical Passwords - What A Concept!

Here you pick several icons to represent the password.

Then when you want to authenticate it, a screen is drawn as a challenge to which you must respond.

The screen has numerous icons, at some of which are your private password icons.

You must locate your icons visually on the screen and click on the screen to the password.

Page 11: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

A SIMPLE GRAPHICAL PASSWORD SCHEME

The user chose these regions when he or she created the password. The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.

Page 12: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

ADVATAGES OF GRAPHICAL PASSWORDS

Graphical password schemes provide a way of making more human-friendly passwords .

Here the security of the system is very high.

Here we use a series of selectable images on successive screen pages.

Dictionary attacks are infeasible.

Page 13: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

DRAWBACKS

Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing

It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.

Because of their graphic nature, nearly all graphical password

schemes are quite vulnerable to shoulder surfing.

Page 14: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

SOLUTION TO SHOULDER SURFING PROBLEM

(1) TRIANGLE SCHEME

Page 15: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

(2) MOVABLE FRAME SCHEME

Page 16: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

CONCLUSION

Graphical passwords are an alternative to textual alphanumeric password.

It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.

By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.

By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.

Page 17: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.
Page 18: GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.