GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488 Under the guidance of Mrs. Chinmayee Behera.

Slides:



Advertisements
Similar presentations
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Advertisements

Lecture 6 User Authentication (cont)
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in.
ACADEMIC COMPUTING ESSENTIALS For SCCC students. Login instructions for My SCCC Student Portal using Banner For access to: Class schedule, SAIN report,
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Kok-Chie Daniel Pu - MSISPM. Wow... Daniel will be presenting a lecture on Graphical Passwords !!!
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Ch 26 & 27 User Interfaces.
Chapter 12 Designing the Inputs and User Interface.
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
A SECURE RECOGNITION BASED ON GRAPHICAL PASSWORD
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
3D password Umesh ECE.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Textual Password How to use the Textual Authentication Model (AC)
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Different Types of HCI CLI Menu Driven GUI NLI
Graphical VS Textual Presented by Ding Li Nicholas Wright, Andrew S. Patrick, and Robert Biddle. “Do you see your password? Applying recognition to textual.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Security Cooperation Information Portal (SCIP) Token User Login Instructions.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Topic 2 Input devices. Topic 2 Input devices Are used to get raw data into the computer so that it can be processed Include common input devices such.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
3D Password.
1 The Design and Analysis of Graphical Passwords Presenter : Ta Duy Vuong Ian Jermyn New York University Alain Mayer, Fabian Monrose,
Challenge/Response Authentication
Towards Another Step from 3D Password to 4D Password:
Input devices.
System Access Authentication
Authentication Schemes for Session Passwords using Color and Images
PASSWORDS Unique is Good.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Input devices.
Chapter 5 - Input.
Setting up an online account
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
REU Summer Research in Computer Security
The Design and Analysis of Graphical Passwords
Module 2 OBJECTIVE 14: Compare various security mechanisms.
COEN 351 Authentication.
Presentation transcript:

GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera

CONTENTS 1. WHAT IS PASSWORD? 2. OVERVIEW OF AUTHENTICATION METHOD. 3. WHAT IS GRAPHICAL PASSWORD? 4. THE SURVEY. 5. COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS. 6. A SIMPLE GRAPHICAL PASSWORD SCHEME. 7. GRAPHICAL PASSWORD-WHAT A CONCEPT. 8. ADVANTAGES OF GRAPHICAL PASSWORDS. 9. DRAWBACKS. 10. CONCLUSION

PASSWORDS The most commonly used form of user authentication. The weakest links of computer security systems. Two conflicting requirements of alphanumeric passwords (1) Easy to remember and (2) Hard to guess. Many people tend to ignore the second requirement which lead to weak passwords. Many solutions have been proposed. Graphical password is one of the solutions.

OVERVIEW OF THE AUTHENTICATION METHOD Token based authentication – key cards, band cards, smart card, … Biometric based authentication – Fingerprints, iris scan, facial recognition, … Knowledge based authentication – text-based passwords, picture-based passwords – most widely used authentication techniques

GRAPHICAL PASSWORDS A GRAPHICAL PASSWORD is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). It can be used in: – web log-in application – ATM machines – mobile devices

The survey : Two categories Recognition Based Techniques – a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage Recall Based Techniques – A user is asked to reproduce something that he created or selected earlier during the registration stage

Recognition Based Techniques Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects. – authors suggested using 1000 objects, which makes the display very crowed and the objects almost indistinguishable. password space: N!/K! (N-K)! ( N-total number of picture objects K-number of pre-registered objects)

Recall Based Techniques “ PassPoint” Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence. Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )

COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS: Commonly used guidelines for alpha-numeric passwords are: The password should be at least 8 characters long. The password should not be easy to relate to the user (e.g., last name, birth date). Ideally, the user should combine upper and lower case letters and digits. Graphical passwords  The password consists of some actions that the user performs on an image.  Such passwords are easier to remember & hard to guess.

Graphical Passwords - What A Concept! Here you pick several icons to represent the password. Then when you want to authenticate it, a screen is drawn as a challenge to which you must respond. The screen has numerous icons, at some of which are your private password icons. You must locate your icons visually on the screen and click on the screen to the password.

A SIMPLE GRAPHICAL PASSWORD SCHEME The user chose these regions when he or she created the password. The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.

ADVATAGES OF GRAPHICAL PASSWORDS Graphical password schemes provide a way of making more human- friendly passwords. Here the security of the system is very high. Here we use a series of selectable images on successive screen pages. Dictionary attacks are infeasible.

DRAWBACKS Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.

SOLUTION TO SHOULDER SURFING PROBLEM (1) TRIANGLE SCHEME

(2) MOVABLE FRAME SCHEME

CONCLUSION Graphical passwords are an alternative to textual alphanumeric password. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme. By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.