Graphical password authentication
-
Upload
shalini-singh -
Category
Technology
-
view
585 -
download
2
Transcript of Graphical password authentication
1. Password
2. Over view of authentication methods
3) Graphical passwords
3.1) recognition based technique.
3.2) Recall based technique-
○ Pass points
○ cued click point(CCP)
○ persuasive cued click point(PCCP)
○Improved PCCP (IPCCP)
○Comparison between IPCCP and PCCP 2
Most commonly used form of user authentication.
It is used to prove identity or access approval to gain
access to a resource.
Two conflicting requirements of alphanumeric
passwords-
1)Easy to remember
2) hard to guess
Many people tend to ignore second requirement,
which lead to weak passwords. So many solutions
have been proposed one of them is graphical
passwords.3
1) Token Based Authentication :
Example : Smart cards , Key cards , ATM
2) Biomatrics:
Example: Finger print, Iris scan ,face recognition
3) Knowledge based authentication:
Example: picture based passwords , most widely used
authentication techniques..
4
1) Recognition Based Technique:
A user is presented with a set of images ,for authentication he
recognize and identify the images he selected during the
registration stage.
2) Recall Based Technique:
User is asked to reproduce something that he created or selected
earlier during registration.
6
1) Pass points: user click on any place on the image to create
password. In order to be authenticated user must click with in
the tolerances in correct sequence.
Password space: N^K
N= the number of pixels,
K= number of points to be
clicked on
7
Disadvantage: hotspot problem different users tend to select
similar click points as a part of their passwords. Attackers who
yield the knowledge of these hotspots through harvesting can
build attack dictionaries.
2) Cued click point(CCP): It is designed to reduce hotspot
problem, rather than five click points on a single image it takes
five click points on five different images.
user can select their images only to extent that their click point
determines the next image, as it consist of different images, so
it prevent guessing attacks.
remembering the order of click points is no longer the
requirement of user .
9
10
Picture authentication using cued click points:
modules
User registration
process
Picture selection process
System login process
18
Disadvantage: Although pattern based attack seems to be
ineffective but hotspot problem remained same.
3)Persuasive technology : technology to motivate and
impact people to behave in a desired manner.
3.1)Persuasive Cued Click Point(PCCP):
● persuasive technology is added to CCP .
● It encourage users to select more secure passwords.
● here images are slightly shaded except for a viewport.
● when users created a password, the images were slightly
shaded except for a randomly positioned viewport. The
viewport is positioned randomly rather than specifically to
avoid known hotspots.
Disadvantage: shoulder surfing problem: watching over
people’s shoulder as they process information. E.g..
Observing keyboard as person typing password like ATM
password. 19
3.2)Improved Persuasive Cued Click Point(IPCCP):
It reduce both hotspot problem and shoulder surfing
problem.
Processing:
●By using x-y coordinates it divide image into blocks.
●Merge the blocks, after merging blur the complete
image.
●Activate only one block to set click points during
registration.
20
● User create the ID and allocate the set of images to
select password.
● It use double click method ,as in first click it take empty
values ,and in second click it take the values.
● Double click method is used to prevent shoulder surfing
problem, as most of the attackers focuses on single click
method.
21
1) USABILITY : measured by success rate and password generation time.
1.1) success rate : Login times for both IPCCP and PCCP
Successful user
password creation
Successful user login
IPCCP 38/40 (95%) 35/40 (87.5%)
PCCP 36/40 (90%) 34/40 (85%)
80
82
84
86
88
90
92
94
96
IPCCP PCCP
successful user passwordcreation
successful user login
22