Authentication Techniques For Engendering Session Passwords With Colors and Text
Authentication Techniques For Engendering Session Passwords With Colors and Text
71
2, 3, 4, 5
I. INTRODUCTION
The most popular user authentication approach
is the text-based password scheme in which a user enters
a login name and password. Despite of its wide usage, the
textual passwords have a number of short comes. The
simple and straightforward textual passwords are easy to
remember, but they are more vulnerable for attackers to
break. Whereas the complex and arbitrary passwords
makes the system more secure, resisting the brute force
search and dictionary attacks, but the difficulty lies in
retaining them [1]. Besides this, textual passwords are
liable to the shoulder-surfing, hidden cameras, and spyware attacks.
Consequently, graphical password strategies
have been introduced as a substitute for textual passwords
schemes, as pictures can be easily remembered when
compared with words. Furthermore, it is difficult to
formulate automated attacks for graphical passwords.
Moreover the password space of the graphical password
scheme may extend that of the textual based password
schemes and hence probably providing a higher level of
security means [2]. On the account of these reasons, there
is an intensifying interest in the graphical password
methods.
However, most of the existing graphical
password authentication methods suffer from shouldersurfing, a known hazard where an intruder can scrutinize
the password by recording the authentication session or
through direct surveillance. In addition, setting up a
system that offers the graphical authentication schemes is
substantially costlier than the text based password
methods. Even though some of the graphical password
procedures resistant to the shoulder surfing are proposed,
72
73
74
75
76
77
IV. CONCLUSION
Generally, there are many drawbacks associated
with the textual passwords such as brute-force and
dictionary attacks. Similar is the case with the graphical
passwords which includes shoulder-surfing and are very
expensive to implement. As such, we have proposed the
idea of utilizing session passwords for authentication. For
this purpose, we had made use of both the textual and
graphical password techniques. In this paper, we have
implemented two authentication techniques (pair-based
authentication scheme and hybrid textual authentication
scheme) for engendering the session passwords.
Associated with these techniques is the draw-a-secret
graphical method employed for security issues.
V. FUTURE SCOPE
In this paper, two authentication techniques
based on text and colours are proposed for PDAs. These
techniques generate session passwords and are resistant to
dictionary attack, brute force attack and shoulder-surfing.
References
[1] R. Dhamija, and A. Perrig. DjVu: A User Study Using Images
for Authentication. In 9th USENIX Security Symposium, 2000.
[2] H. Zhao and X. Li, "S3PAS: A Scalable Shoulder-Surfing Resistant
Textual-Graphical Password Authentication Scheme," in 21st
International Conference on Advanced Information Networking and
Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467472.
[3] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe
Aickelin, A New Graphical Password Scheme Resistant to ShoulderSurfing.
[4] M Sreelatha, M Shashi, M Anirudh, MD Sultan Ahamer,V Manoj
Kumar Authentication Schemes for Session Passwords using Color and
Images, International Journal of Network Security & Its Applications
(IJNSA),Vol.3, No.3,May2011.
[5] G. E. Blonder. Graphical passwords. United States Patent
5559961, 1996.
[6] A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification
System Using Signature Written with Mouse," in Third Australasian
Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[7] Real User Corporation: Passfaces. www.passfaces.com
[8] W. Jansen, "Authenticating Mobile Device User through Image
Selection," in Data Security, 2004.
[9] W. Jansen, "Authenticating Users on Handheld Devices in
Proceedings of Canadian Information Technology Security Symposium,
2003.
[10] S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant
graphical password scheme," in Proceedings of International conference
on security and management. Las Vegas, NV, 2003
[11] X. Suo, Y. Zhu and G. Owen, Graphical Passwords: A Survey. In
Proc. ACSAC'05.
[12] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., The
design and analysis of graphical passwordsin Proceedings of USENIX
Security Symposium, August 1999.
78