18
Presen ted by: Anilaj a CSE

Graphical password authentication

  • Upload
    anilaja

  • View
    7.397

  • Download
    4

Embed Size (px)

Citation preview

Page 1: Graphical password authentication

Presented by:AnilajaCSE

Page 2: Graphical password authentication

What is PASSWORD?PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.

Uses of Password: Logging into accounts. Retrieving emails. Accessing applications. Networks. Websites Databases

Page 3: Graphical password authentication

Authentication is a process of conformation of a persons identity.

Types: Token based authentication

key cards, band cards, smart card, …

Biometric based authentication Fingerprints, iris scan, facial recognition, …

Knowledge based authentication text-based passwords, picture-based

passwords, … most widely used authentication

techniques

Page 4: Graphical password authentication

Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.

Difficulty of remembering passwords easy to remember -> easy to guess hard to guess -> hard to remember

Page 5: Graphical password authentication

A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).

For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).

An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.

Page 6: Graphical password authentication

Recall Based TechniquesA user is asked to reproduce something that he

created or selected earlier during the registration stage

Recognition Based TechniquesA user is presented with a set of images and the

user passes the authentication by recognizing and identifying the images he selected during the registration stage.

Cued-recall TechniqueAn extra cue is provided to users to remember

and target specific locations within a presented image.

Page 7: Graphical password authentication

Draw-A-Secret (DAS) SchemeUser draws a simple picture on a 2D grid, the

coordinates of the grids occupied by the picture are stored in the

order of drawing

Redrawing has to touch thesame grids in the same sequence in authentication.

User studies showed the drawing sequences is hard to remember.

Page 8: Graphical password authentication

Signature scheme

Here authentication is conducted by having the user drawing their signature using a mouse.

Page 9: Graphical password authentication

Pass Point Scheme

User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in the correct sequence.

Page 10: Graphical password authentication

B-DAS Scheme

Grid Selection Scheme

Page 11: Graphical password authentication

Dhamija and Perrig Scheme

Pick several pictures out of many choices, identify them later

in authentication.

Page 12: Graphical password authentication

Sobrado and Birget Scheme

System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.

Page 13: Graphical password authentication

Pass face scheme:

In this technique human faces are used as password.

Page 14: Graphical password authentication

Other Schemes

Select a sequence of images as password

Page 15: Graphical password authentication

Graphical password schemes provide a way of making more

human-friendly passwords while increasing the level of security.

Here the security of the system is very high.

Dictionary attacks and brute force search are infeasible.

Page 16: Graphical password authentication

Password registration and log-in process take too long.

Require much more storage space than text based passwords.

Shoulder Surfing .

Page 17: Graphical password authentication
Page 18: Graphical password authentication