Beruflich Dokumente
Kultur Dokumente
1,3
Department of Computer Science and Engineering, GHRIETW, 440016, Nagpur, MH, INDIA
2
Department of Computer Technology, YCCE, 441110, Nagpur, MH, INDIA
Abstract- User endorsement is one of the most important components in information security. Different types of validations
are used to prevent user account. But these authentication methods are not safe from a mugger. These endorsement
techniques suffer from various kinds of unwanted interruption such as words attacks, possible keys attack, human error
attacks, etc. This survey proves that word based attack is widely performed during authentication nowadays. Word based
interruption defined in two ways: operative case and down case. While down case word attacks are possible when the
adversary is able to hack or get the data through communication channel where as the operative case word attack is easy to
perform and there are no groovy solutions available. This survey deals with different endorsement technique which is used to
prevent user accounts in various ways.
Index Terms- Online Security, Dextral Based Attack, Pictorial Based Attack.
I.
INTRODUCTION:
Dextral based
Pictorial based
1.1The dextral based technique consists of following
survey.
1.1.1
EKE- S.M Bellovin and M Merritt
discussed about the combination of public and secret
key to prevent password attacks in insecure network.
Found it to be more effective in preventing user for
selecting easily guessable passwords and various
online attacks.
1.1.2
3P-EKE- Hen-Tyan Yeh, Hung- Min Sun
and Tzonelih Hwang discuss the way to generate a
session key for communication. This paper shows
two techniques, first one way authentication and
another with 3 party authentications, which generate a
secure session key for transformation of information.
1.1.3
Computational
challenge
systemComputational challenge protocol deals with online
dictionary attacks observed by Vipul Goyal, Virendra
Kumar, Mayank Singh, Ajith Abraham and Sugata
Sanyal. This protocol uses one way hash function as
the stepping stones and extract online dictionary
attacks by implementing an input-output scheme but
found out very time consuming technique.
1.1.4
RBGP- This paper talk about the issue
whether the RBGP is related to salvation or not.
Several surveys are done by Rosanne, Ron Poet
shows that there remains no effective way of counting
the level of surveillance of and discusses it with
threat model. This paper analyses different type of
attacks performance with this threat model.
OUTLINE BIOGRAPHY:
1.1.5
S3PAS scheme- One hybrid technique is
developed by Huanyu Zhao and Xiaolin Li . In this
system the dextral word is combined with graphics to
reduce text based, password deficiency. This
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
80
1.1.6
CCP- Chang Chang password secret
transformation rule deals with 3-party simple secret
transformation protocol, which is advanced version of
the 3PKEK protocol It deals with undetectable
attacks on password. Chang-Chang have proposed
novel 3- party key exchange protocol in which
parallel message transmission takes place to reduce
one message circuiting to prevent time and cost.
1.1.7
AKE Protocol- Author Yasunori Onda,
Seongtlan Shin, Kazukuni Kobara, Hideki Imai give
an introduction about the AKE protocol, which is
used to distinguish between dictionary attacks and
mistakenly typed error password. It uses MAC and
digital signature to distinguish dictionary from
another dirty deed.
1.2.5
Web based password- There are various
studies developed in password and password reuse
human tendency. In this Deine Florencio and Cormac
Herley find out details about countersign power, user
recorded each information about deduce like how
many numbers of invoice user has, number of
endeavours password per day, how often password
are shared. Generally, this paper works by human
doings of using a password.
1.1.8
PGRP- PGRP is very useful in password,
identifying charge. In this paper author Mansour
Alsaleh, Mohammad Mannan, P.C van Oorschot
deals with a restriction over number of trial and error
attempts to login certain account. It also shows that
how it is invulnerable to both dictionary and brute
force attack.
1.1.9
S3-PAS - Accomplished three level
evidences and key affiliation rule develop to give
bilateral evidence and key transformation which is
prevented against hidden word identifying attack.
Author R. Padmavathy [24] exchange view on three
types of defilement- Detectable, Undetectable and
Offline Attack
1.2.6
YAGP- D-A-S i.e Draw-A-Secrete is the
way, which is largely used in a pictorial scheme to
overcome the drawback of alphanumeric password. It
used the concept of DAS system and creates a new
technique YAGP.
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming
Wang, and Xiyang Liu shows that YAGP makes it
easy for the user and free with some restriction for
drawing. This paper also shows the usability
drawback of this system.
1.2.7
User Friendly Password- Password which
is more user friendly as far as pictorial password is
concerned rather than text based key. In this paper
author Mohammed Misbahuddin, Dr P. Premchand,
Dr A. Govardhan talk about two types of password-Recognition based
-Recall based
This paper gives complete description about graphical
password and shows that this type of password is
more user friendly.
1.2.2
SSA- Author Kameswara Rao, Sushma
Yalamanchili bounces off survey on different textgraphical password technique. Author proposed two
techniques named as PPC and TPPC and compare it
with traditional text-based method and found it as
more restrictive to shoulder surfing, spyware, brute
force and random click attacks.
1.2.8
HOTSPOT problem- The iconic secret
execution as recognition based is facedown to hotspot
problem. To cut down the hotspot problem author
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel,
Hakan Gurbaslar, Burak Erdeniz develops two ways
called GPI and GPIS. This method is not only
1.2.3
A wase-E- Since passwords are very much
useful for user authentication, but remembering a
secret is also very important. But it affects the user
operability. And to maintain such operability this
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
81
1.2.9
Picture Attribute Selection- In this paper
the use of scene as a password is selected on the basis
of dimensions of the picture. These properties are
size, presentation and color and category of blueprint
which deals with the custom and security of the user.
This paper is based on lots of study made on these
attributes. The overall research shows the different
elicitation of icon according to their involvement,
which is very beneficial while picking images
according to their preferences.
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
82
CONCLUSION:
This paper makes two kinds of contribution. First
relate to security constraint and another is password
persistent. From the related survey, it comes to know
that there are various addresses available to make
user password more secure and memorable, but there
is no proper solution to mitigate different types of
attacks over passwords. Since to make password
stronger and harder to guess pictorial password is the
best solution which makes user convenient to select
password of user own choice.
REFERENCES:
[1]
[2]
[3]
[4]
[5]
[6]
[18] Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, and
Xiuling Chang, Analysis and Evaluation of the ColorLogin
Graphical Password Scheme, 5th International Conference
on Image and Graphics (ICIG) 2009. http://dx.doi.org
/10.1109/icig.2009.62
[7]
[8]
[9]
Rosanne, Ron Poet, Towards a Metric for RecognitionBased Graphical Password Security, 5th International
Conference on Network and System Security (ICNSS)
IEEE 2007. http://dx.doi.org/10.1109/icnss.2011.6060007
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
83
[29] Kameswara Rao, Sushma Yalamanchili , Novel ShoulderSurng Resistant Authentication Schemes using TextGraphical Passwords, International Journal of Information
& Network Security (IJINS)
Vol.1, No.3,
2012
http://dx.doi.org/10.11591/ijins.v1i3.529
[32] Housam Khalifa Bashier, Lau Siong Hoe, Pang Ying Han,
Graphical Password: Pass-Images Edge Detection 9th
International Colloquium on Signal Processing and its
Applications, (CSPA) 2013. http://dx.doi.org/10.1109
/cspa.2013 .6530025.
Proceedings of 4th SARC International Conference, 30th March-2014, Nagpur, India, ISBN: 978-93-82702-70-2
84