Sie sind auf Seite 1von 32

A Graphical Password Authentication System

Guided by:

Presented by:

Ms. Divya Shettigar

Nishan H Kumar 4ES09CS025

Outline
Introduction Overview of the Authentication Methods Graphical Password Scheme: Two Categories
Recognition Based Techniques Recall Based Techniques

Working Proposed System Conclusion References

Introduction
How about text-based passwords ? Difficulty of remembering passwords
easy to remember -> easy to guess hard to guess -> hard to remember

Users tend to write passwords down or use the same passwords for different accounts An alternative: Graphical Passwords Psychological studies: Human can remember pictures better than text

Overview of the Authentication Methods


Token based authentication
key cards, bank cards, smart card,

Biometric based authentication


Fingerprints, iris scan, facial recognition,

Knowledge based authentication


text-based passwords, picture-based passwords, most widely used authentication techniques.

Graphical Password Scheme


Using Pictures as Passwords. Easy to remember, as humans remember pictures better than words. Resistant to brute force attack because the search space is practically infinite. Graphical Passwords are classified into two main categories: - Recognition based techniques. - Recall based techniques.

Graphical Password: Two categories

Graphical Password: Two categories


Recognition Based Techniques
A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage

Recall Based Techniques


A user is asked to reproduce something that he created or selected earlier during the registration stage

Recognition Based Techniques


Dhamija and Perrig Scheme
Pick several pictures out of many choices, identify them later in authentication.
Using Hash Visualization, which, given a seed, automatically generate a set of pictures Take longer to create graphical passwords
Password Space: N!/K! (N-K)!
( N-total number of pictures; K-number of pictures selected as passwords)

Recognition Based Techniques


Sobrado and Birget Scheme
System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
Sobrado and Birget suggested using 1000 objects, which makes the display very crowed and the objects almost indistinguishable.
Password Space: N!/K! (N-K)!
( N-total number of picture objects; K-number of pre-registered objects)

Recognition Based Techniques


Other Schemes

Using human faces as password


Select a sequence of images as password

Recall Based Techniques


Draw-A-Secret (DAS) Scheme
User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing.
Redrawing has to touch the same grids in the same sequence in authentication. User studies showed the drawing sequences is hard to Remember.

Recall Based Techniques


PassPoint Scheme
User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence.
It can be hard to remember the sequences

Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )

Recall Based Techniques


Other Schemes

Signature Scheme

Working of Graphical Password Authentication Systems

Registration Phase

Verification Phase

User Registration Process


//EXAMPLE:

Enter the username in the username field.


USERNAME

N i s h a n

Click on NEW USER REGISTER button

NEW USER REGISTER


New user registration process. Verifies the username and store into the database

DATAB ASE

Creating Picture Password


How to Select pictures?
There are two ways for selecting an picture for password authentication.

User Defined Pictures


Pictures are selected by the user from the hard disk or any other image supported devices.

PICTURE

System Defined Pictures


Pictures are selected by the user from the database of the password system.

PICTURE

DATABASE

THE PICTURE SELECTED FROM ONE OF THE SYSTEM

USER DEFINED PICTURE

OR
DATABASE

Picture + Gridlines

SYSTEM DEFINED PICTURE

MESSAGE BOX: DO YOU WISH TO CONTINUE WITH THIS POINT

YES

NO

Select another point User click on the point


DATABASE

Point and the image will be stored into database. Now the user can select another image and follows the same steps above. User with username

Username U S E R N A M E verification
Reenter the username

Verifies the username

Checks the username in the database Incorrect username

User enters the username

If username not matched

DATAB ASE

Generates an message username doesn't match Please Reenter the username

Correct username

Proposed System by Ahmad Almulhem

An example of creating a graphical password using the proposed system

Proposed System by Ahmad Almulhem

Login Screen

Implementation of Proposed System


The proposed system was implemented using Visual Basic.net 2005 (VB.net). The implementation has three main classes: LoginInfo: Contains username, graphical password,and related methods. GraphicalPassword: Contains graphical password information and related methods. SelReg: Contains fields about selected regions (POIs).

Advantages of Graphical Password Authentication System


Graphical password schemes provide a way of making more human-friendly passwords . Here the security of the system is very high. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.

Dictionary attacks are infeasible.

Drawbacks of Graphical Password Authentication System


Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing: It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.

Solution to Shoulder Surfing Problem


Triangle Scheme

(For clarity, this collection contains only a little over 100 objects. Typical screens can fit over 1000.)

Solution to Shoulder Surfing Problem


Movable Frame Scheme

Conclusion
Main argument for graphical passwords:
People are better at memorizing graphical passwords than textbased passwords.

It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. It is more difficult to break graphical passwords using the traditional attack methods such as burte force method, dictionary attack or spyware. Not yet widely used, current graphical password techniques are still immature.

References
[1] A graphical password authentication system, Ahmad Almulhem Computer Engineering DepartmentKing Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia. www. ieeexplore.ieee.org [2] Graphical Passwords: A Survey by Xiaoyuan Suo, Ying Zhu, G. Scott. Owen Department of Computer Science Georgia State University. [3] L. Sobrado and J.-C. Birget, "Graphical passwords,"The Rutgers Scholar, An Electronic Bulletin forUndergraduate Research, vol. 4, 2002. [4] Ian Jermyn Aviel D. Rubin The Design and Analysis of Graphical Passwords.

Thank you

Queries?

Das könnte Ihnen auch gefallen