SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 5, Issue 1 (Sep-Oct. 2012), PP 37-40
www.iosrjournals.org
www.iosrjournals.org 37 | P a g e
Two Step Endorsement: Text Password and Graphical Password
Chirag Jagani1
, Pooja Kalola2
, Dr. Bankim Radadiya3
1
(Department of CS& IT, Shree M. & N. Virani Science College, Saurashtra University (SU), Rajkot, India)
2
(Department of IT, Patel College of Sci. &Tech.,Rajiv Gandhi Proudyogiki Vishwavidyalaya, Indore, India)
3
(Director of Information Technology, Navsari Agricultural University, Navsari (Gujarat), India)
ABSTRACT: Security-sensitive environments protect their resources against unauthorized access by
enforcing access control mechanisms. Text based passwords are not secure enough for such applications. User
authentication can be improved by using both text passwords and structured images. In order to offer sufficient
security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user
authentication approach combining text passwords, recognition-based graphical passwords, and a dual-step
process, to provide increased security with fewer rounds than such graphical passwords alone. A variation of
this dual-step authentication method, which we have implemented and deployed, is in use in the real world.
Keywords: Graphical Passwords; User Authentication; Phishing; Security; Image based Authentication
I. INTRODUCTION
Text passwords have been widely used for user authentication, e.g., by almost all web-sites on the
Internet. However, it is well-known that text passwords are insecure for a variety of reasons. For example,
users tend to choose simple passwords in favor of memorability, making them subject to dictionary attacks; and
text passwords can be stolen by malicious software (e.g., keystroke loggers) when being entered from key-
boards. Phishing is another serious threat to text passwords, by which, a user could be persuaded to visit a
forged website and enter their passwords. Such an attack is made possible in part due to the fact that text
passwords do not allow users to authenticate a server; by design they provide only one-way user authentication,
and server authentication is not a design objective of text passwords alone. We propose a two-step
authentication method to strengthen text passwords by combining them with graphical passwords.
In this approach, called Dual Step, users continue to use text passwords as a first step, but then must also enter
a graphical password, providing the following advantages:
1. Users’ current sign-in experience is largely pre-served.
2. A text password alone which is stolen (e.g., by phishing) does not compromise an account.
3. Users can be alerted if not seeing the graphical password cuing image after providing their text passwords,
implicitly providing server authentication.
4. It can be implemented in software alone, increasing the potential for large scale adoption on the Internet.
II. Two-Step Authentication Method
Given that text passwords are easy to deploy and to use, we believe that they will continue to be
popular. Thus, we suggest that effort should be made to enhance text pass-words with an easy to use additional
defense mechanism that can address common pass-word attacks, such as brute-force and phishing attacks. To
this end, we propose Dual Step, a combination of text passwords and recognition-based graphical passwords.
The latter can complement text passwords being less subjective to phishing attacks which require prior
knowledge of users’ image portfolios, and to naive key logger attacks.
In step one, a user is asked for her user name and text password. After supplying this, and independent
of whether or not it is correct, in step two, the user is presented with an image portfolio. The user must
correctly select all images (one or more) pre-registered for this account in each round of graphical password
verification. Otherwise, account access is denied despite a valid text password. Using text passwords in step
one preserves the existing user sign-in experience. If the user’s text password or graphical password is correct,
the image portfolios presented are those as defined during password creation. Otherwise, the image portfolios
(including their layout dimensions) presented in first and a next round are random but respectively a
deterministic function of the user name and text password string entered, and the images selected in the
previous round.
More specifically, the image portfolio in round n is pseudo-randomly generated from a seed value
derived from the entered user name and text password when n=1, and from the images selected in round n-1
when n ≥ 2.Seeing a portfolio including no familiar image allows a legitimate user to immediately realize that
Two Step Endorsement: Text Password And Graphical Password
www.iosrjournals.org 38 | P a g e
she entered an invalid text or graphical password (and then go back to re-enter it, e.g., using a “Go Back”
dialog button), but prevents an attacker from knowing that the text or graphical password tried is invalid. [3][2]
2.1 Creation of Graphical Passwords
Graphical passwords can be created during user registration or after registration (for users registered
before Dual Step was implemented), and be changed any time after creation. A graphical password policy,
which may be set by the site operator or the user, influences its presentation and security. Ex-ample policy
attributes are: number of rounds of verification; display layout, e.g., 6×6, defining how images are presented to
the user and the total number of images displayed in each round: number of images to be selected in each
round: and ordered or unordered image selection, defining whether order of image selection matters. After a
graphical password policy is defined, users choose images as their graphical passwords. For each round of
verification, the specified numbers of images are randomly selected by the system from a database to form an
image portfolio. A user then chooses a specified number of images from the portfolio as her graphical
password components. This process repeats for the specified number of rounds. If the user does not like a
particular image portfolio, she may request a new one or upload her own images to be included in a portfolio.
An accepted image portfolio remains unchanged until the user changes her graphical password. To facilitate
recognition, images within a portfolio are assembled to be sufficiently distinguishable.
2.2 Subsequent Login using Dual Steps
In step one the user as usual enters a user name and text password. The login page of the server
deploying Dual Steps remains the same as when text passwords alone were used, i.e., no change in the front
login page is required to deploy Dual Step, nor do users see any difference in their sign-in experience in step
one. After the user provides a text password, the second step of authentication (the graphical step or g-step)
begins. In each round of graphical password verification, the server transmits an image portfolio to the user,
and the user chooses out her pre-registered images. After the user completes all rounds of verification, if both
the text password and all graphical passwords were correct, she is granted account access. Otherwise, access is
denied. We next discuss several attacks against graphical passwords which must be considered. Further
security discussion is found in Section 3.
2.3 Eavesdropping
An attacker able to intercept communication between the server and client would be able to capture
image portfolios transmitted from the server, and the images selected by the user, thus stealing the entire
graphical password. To prevent this attack, a security protocol such as HTTPS must be deployed to provide
confidentiality.
2.4 Shoulder-Surfing
An attacker can also steal a graphical password by shoulder-surfing (e.g., using a video camera)
during the g-step. Such shoulder-surfing would be particularly easy if an implementation of the g-step provided
user visual feedback upon user selection of an image, such as highlighting an image border. Here we describe a
simple method to mitigate this type of attack (see Fig. 1).
Fig. 1 Selection panel in graphical step
For a given image portfolio, each image is associated with an index number. Images along with their
index numbers are displayed in a random order on the screen. Below the displayed image portfolio is a
selection panel with all index numbers dis-played incrementally. To select an image, the user identifies the
image and then clicks the corresponding index number on the lower selection panel. In the case that several
images must be chosen from a portfolio, the selection panel can help the user keep track of which images have
Two Step Endorsement: Text Password And Graphical Password
www.iosrjournals.org 39 | P a g e
been selected so far (and allow easy de-selection, by clicking the corresponding number in the bottom panel, if
necessary). The idea is that it is more difficult for a casual human observer to have line of sight to the lower
panel and to map an index or set of indices from it to the corresponding images on the screen. This approach
can reduce casual shoulder-surfing but cannot fully prevent such attacks involving movie-clip camera phones.
Other techniques, e.g., Gaze-based password entry [13], can better mitigate this type of attack, but have their
own usability and deployment challenges
III. Preliminary Security Analysis
3.1 Password Strength
Wediscuss the strength ofDual Step, measured by entropy in bits, by considering both the entropy of
the text password and the graphical password parts. A text password of lengthlcharacters has entropy ofl · log2c
bits if characters are selected uniformly at random and independently from an alphabet of c characters. For
example, a randomly generated 8-character password consisting of digits, lowercase, and uppercase has8·
log262 = 47.6Bits of entropy. Letr be the number of rounds of our graphical password verification. For each
round, let nbe the size of the image portfolio, andk < n the total number of images selected from the portfolio
as the graphical password. The entropy of a randomly selected graphical password conforming to this policy is
r · log2t, where 𝑡 = (𝑛¦𝑘) and 𝑛!/(𝑛 − 𝑘)!for un-ordered and ordered images respectively.
As an example, considerr = 1, n= 36, k= 3, and unordered image selection, meaning one round of
verification by selecting3images in any order from a portfolio of size36. The entropy is l ≈12.8bits. For r = 2,
in theory this doubles to 25.6bits, though in practice we might expect less unpredictability due to patterns in
user choice [5]. Choosing different parameters k, n, r, and tcan increase security, but also changes usability. In
addition, password guessing attacks in Dual Step must be done online (interacting with the server), which is
more costly than offline attacks.
Note that text passwords used in practice are generally far from randomly and in-dependently
selected, and often lowercase only ([10]),decreasing entropy. For example, an 8-character lowercase password
has entropy about 37.6 bits if all characters were selected randomly and independently. But in practice, they
perhaps have only 20-35 bits on average and less for some subsets of users. Relative to this more realistic
estimate, the 25.6bits (or even12.8 bits) of added security from the graphical part is quite significant, against
both targeted single-account exhaustive attacks, and system-wide multi-account attacks that might attempt as
few as 3-5 guesses per account.
3.2 Mitigating Naive Key logging Attacks
Keylogging is a common method for stealing user text passwords. A keylogger is malicious software
which intercepts keystrokes on an infected machine as a user types. For example, Microsoft Windows provides
(un-documented) interfaces facilitating interception of system events including keystrokes. With Dual Step, a
user would use the keyboard for the text password part, and mouse clicks for the graphical parts. Thus, a naive
keylogger cannot obtain the graphical parts. More sophisticated malware can capture both user screen contents
and mouse clicks to recover a graphical password, with more effort.
3.3 Mitigating Phishing Attacks
Phishing [7] is another common technique for stealing passwords by fooling users to enter such
information into a fraudulent website spoofing a legitimate one (e.g., a bank site). Social engineering tactics are
often used (e.g., “urgent account update”, requests to verify fake transactions, etc.). In Dual Step, while users’
text password part can still be stolen by phishing, obtaining their graphical password parts is more difficult:
without knowledge of users’ image profiles, the phisher does not know what images to present in order to
extract a graphical password.
3.4 Mitigating Active MITM Attacks
An active man-in-the-middle (MITM) attack allows an attacker to become an intervening proxy and
control all communication be-tween the user and the website [9]. SSL cannot mitigate this attack since an
attacker can use SSL on both communication segments individually, so users (and end website) appear to be
“operating securely”. The proxy can be either malware on a user’s local machine or located on a remote server
(controlled by an attacker) to which the user is drawn by phishing techniques. Such an attacker can gain access
to any information exchanged between a user and a website, thus can defeat Dual Step. It appears difficult to
prevent this active MITM attack if the end-user machine is infected by malicious software. In fact, it seems all
software-only defenses fail for such compromised end-machines. On the other hand, if the active MITM proxy
is located remotely, as in DNS server pharming-based MITM attacks, consistency check techniques involving
alternative communication paths could be used to detect if requests intended to be sent to one server actually
terminate at another. This provides protection to Dual Step against active MITM proxies.
Two Step Endorsement: Text Password And Graphical Password
www.iosrjournals.org 40 | P a g e
IV. Related Work
Graphical passwords can be largely classified into three categories: recognition-based, cued-recall, or
recall-based. In recognition-based graphical passwords, users are required to recognize and then select a set of
preselected images from a larger set. In cued-recall, the images cue the user, for example, to click a set of
points on an image [3]. In recall-based, users are required to recall a password without any cues, such as
drawing a doodle in Draw-A-Secret [12]. We focus the remainder of our review here on recognition-based
schemes. For a broader survey, [1] [6] is a recognition-based graphical password, which makes use of random
art images, instead of photographs, to discourage users from selecting predictable images. While randomly
generated images can improve security, they also reduce usability.
For example, it takes longer for users to remember random art images than photos, and less time to
forget them. Passfaces [4] is another recognition-based scheme, using human faces as authentication images. A
user’s password consists of k faces, each of which must be chosen from a set of n >1 faces in each round of the
selection. While human faces are more memorable than text passwords, it was also found [5] that users usually
choose predictable faces as their passwords, e.g., faces of their own race. In addition, female faces and
“attractive” faces are chosen more often than male faces. Those biases make human faces less suitable as
password components.Story [5] is similar to passfaces, but uses a variety of photos to form image portfolios,
and encourages users to select photos to form a storyto improve memorability. In Winchell’s scheme [15], a
user is asked to answer a sequence of questions based on a shared set of images with the server. This scheme
can resistshoulder-surfing attacks, but requires significant training and has usability issues, as well as security
issues [11].
References
[1] S. Chiasson. Usable Authentication and Click-Based Graphical Passwords. PhD thesis, Carleton University,Ottawa, Canada,
January 2009.
[2] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot. Influencing Users towards Better Passwords: Persuasive Cued Click-
Points. InProc. of HCI’08, September 2008.
[3] S. Chiasson, P.C. van Oorschot, and R. Biddle. Graphical Password Authentication Using Cued Click Points. InProc. of
ESORICS’07, volume 4734,
[4] pages 359–374, September 2007.
[5] Real User Corporation. The Science Behind Passfaces, September 2001.
[6] D. Davis, F. Monrose, and M. Reiter. On User Choice in Graphical Password Schemes. In Proc. of13th USENIX Security
Symposium, August 2004.
[7] R. Dhamija and A. Perrig. Deja Vu: A User Study Using Images for Authentication. InProc. Of 9th USENIX Security
Symposium, August 2000.
[8] R. Dhamija, J. Tygar, and M. Hearst. Why Phishing Works. In Human Factors in Computing Systems, April 2006.
[9] 51Logon: Simplifying SignInExperience. http://www.51Logon.com (in Chinese).
[10] E. Felton, D. Balfanz, D. Dean, and D. Wallach. Web Spoofing: An Internet Con Game. In Proc. of the20th National
Information systems Security Conference, October 1997.
[11] D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. InProc. of the 2007 World Wide Web, 2007. D.
[12] P. Golle and D. Wagner. Cryptanalysis of a Cognitive Authentication Schemes (Extended Abstract). InProc. of the 2007 IEEE
Symposium on Security and Privacy, May 2007.
[13] I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. InProc. of the
8th USENIX Security Symposium, August 23-26 1999.
[14] M. Kumar, Tal Garfinkel, D. Boneh, and T. Winograd. Reducing Shoulder-surfing by Using Gaze-based Password Entry.
InProc. of SOUPS’07, July 2007.
[15] Rabkin. Personal Knowledge Questions for Fallback Authentication. In Proc. of the 2008 Symposium On Usable Privacy and
Security (SOUPS), July 23-25 2008.
[16] D. Weinshall. Cognitive Authentication Schemes Safe against Spyware (Short Paper). In Proc. of the 2006 IEEES ymposium on
Security and Privacy, May 2006.

More Related Content

What's hot

Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...AbhilashPasupula
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...NurrulHafizza
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass facesIJERA Editor
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 

What's hot (20)

Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass faces
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

Viewers also liked

Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware SpreadIOSR Journals
 
Pretext Knowledge Grids on Unstructured Data for Facilitating Online Education
Pretext Knowledge Grids on Unstructured Data for Facilitating  Online EducationPretext Knowledge Grids on Unstructured Data for Facilitating  Online Education
Pretext Knowledge Grids on Unstructured Data for Facilitating Online EducationIOSR Journals
 
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...IOSR Journals
 
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...IOSR Journals
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 

Viewers also liked (20)

B0950814
B0950814B0950814
B0950814
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
 
A0320105
A0320105A0320105
A0320105
 
Preclusion Measures for Protecting P2P Networks from Malware Spread
Preclusion Measures for Protecting P2P Networks from Malware  SpreadPreclusion Measures for Protecting P2P Networks from Malware  Spread
Preclusion Measures for Protecting P2P Networks from Malware Spread
 
L0956974
L0956974L0956974
L0956974
 
I0614550
I0614550I0614550
I0614550
 
J0956064
J0956064J0956064
J0956064
 
F0613134
F0613134F0613134
F0613134
 
A0330103
A0330103A0330103
A0330103
 
Pretext Knowledge Grids on Unstructured Data for Facilitating Online Education
Pretext Knowledge Grids on Unstructured Data for Facilitating  Online EducationPretext Knowledge Grids on Unstructured Data for Facilitating  Online Education
Pretext Knowledge Grids on Unstructured Data for Facilitating Online Education
 
K0466974
K0466974K0466974
K0466974
 
G0314045
G0314045G0314045
G0314045
 
C0541925
C0541925C0541925
C0541925
 
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
A Density Based Clustering Technique For Large Spatial Data Using Polygon App...
 
I0946770
I0946770I0946770
I0946770
 
D0342934
D0342934D0342934
D0342934
 
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...
Enhancement of ATC by Optimal Allocation of TCSC and SVC by Using Genetic Alg...
 
C01041922
C01041922C01041922
C01041922
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
H0325660
H0325660H0325660
H0325660
 

Similar to Two Step Endorsement: Text Password and Graphical Password

IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 

Similar to Two Step Endorsement: Text Password and Graphical Password (20)

IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
An03402300234
An03402300234An03402300234
An03402300234
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
CNS Review PPT.pptx
CNS  Review PPT.pptxCNS  Review PPT.pptx
CNS Review PPT.pptx
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Two Step Endorsement: Text Password and Graphical Password

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 5, Issue 1 (Sep-Oct. 2012), PP 37-40 www.iosrjournals.org www.iosrjournals.org 37 | P a g e Two Step Endorsement: Text Password and Graphical Password Chirag Jagani1 , Pooja Kalola2 , Dr. Bankim Radadiya3 1 (Department of CS& IT, Shree M. & N. Virani Science College, Saurashtra University (SU), Rajkot, India) 2 (Department of IT, Patel College of Sci. &Tech.,Rajiv Gandhi Proudyogiki Vishwavidyalaya, Indore, India) 3 (Director of Information Technology, Navsari Agricultural University, Navsari (Gujarat), India) ABSTRACT: Security-sensitive environments protect their resources against unauthorized access by enforcing access control mechanisms. Text based passwords are not secure enough for such applications. User authentication can be improved by using both text passwords and structured images. In order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text passwords, recognition-based graphical passwords, and a dual-step process, to provide increased security with fewer rounds than such graphical passwords alone. A variation of this dual-step authentication method, which we have implemented and deployed, is in use in the real world. Keywords: Graphical Passwords; User Authentication; Phishing; Security; Image based Authentication I. INTRODUCTION Text passwords have been widely used for user authentication, e.g., by almost all web-sites on the Internet. However, it is well-known that text passwords are insecure for a variety of reasons. For example, users tend to choose simple passwords in favor of memorability, making them subject to dictionary attacks; and text passwords can be stolen by malicious software (e.g., keystroke loggers) when being entered from key- boards. Phishing is another serious threat to text passwords, by which, a user could be persuaded to visit a forged website and enter their passwords. Such an attack is made possible in part due to the fact that text passwords do not allow users to authenticate a server; by design they provide only one-way user authentication, and server authentication is not a design objective of text passwords alone. We propose a two-step authentication method to strengthen text passwords by combining them with graphical passwords. In this approach, called Dual Step, users continue to use text passwords as a first step, but then must also enter a graphical password, providing the following advantages: 1. Users’ current sign-in experience is largely pre-served. 2. A text password alone which is stolen (e.g., by phishing) does not compromise an account. 3. Users can be alerted if not seeing the graphical password cuing image after providing their text passwords, implicitly providing server authentication. 4. It can be implemented in software alone, increasing the potential for large scale adoption on the Internet. II. Two-Step Authentication Method Given that text passwords are easy to deploy and to use, we believe that they will continue to be popular. Thus, we suggest that effort should be made to enhance text pass-words with an easy to use additional defense mechanism that can address common pass-word attacks, such as brute-force and phishing attacks. To this end, we propose Dual Step, a combination of text passwords and recognition-based graphical passwords. The latter can complement text passwords being less subjective to phishing attacks which require prior knowledge of users’ image portfolios, and to naive key logger attacks. In step one, a user is asked for her user name and text password. After supplying this, and independent of whether or not it is correct, in step two, the user is presented with an image portfolio. The user must correctly select all images (one or more) pre-registered for this account in each round of graphical password verification. Otherwise, account access is denied despite a valid text password. Using text passwords in step one preserves the existing user sign-in experience. If the user’s text password or graphical password is correct, the image portfolios presented are those as defined during password creation. Otherwise, the image portfolios (including their layout dimensions) presented in first and a next round are random but respectively a deterministic function of the user name and text password string entered, and the images selected in the previous round. More specifically, the image portfolio in round n is pseudo-randomly generated from a seed value derived from the entered user name and text password when n=1, and from the images selected in round n-1 when n ≥ 2.Seeing a portfolio including no familiar image allows a legitimate user to immediately realize that
  • 2. Two Step Endorsement: Text Password And Graphical Password www.iosrjournals.org 38 | P a g e she entered an invalid text or graphical password (and then go back to re-enter it, e.g., using a “Go Back” dialog button), but prevents an attacker from knowing that the text or graphical password tried is invalid. [3][2] 2.1 Creation of Graphical Passwords Graphical passwords can be created during user registration or after registration (for users registered before Dual Step was implemented), and be changed any time after creation. A graphical password policy, which may be set by the site operator or the user, influences its presentation and security. Ex-ample policy attributes are: number of rounds of verification; display layout, e.g., 6×6, defining how images are presented to the user and the total number of images displayed in each round: number of images to be selected in each round: and ordered or unordered image selection, defining whether order of image selection matters. After a graphical password policy is defined, users choose images as their graphical passwords. For each round of verification, the specified numbers of images are randomly selected by the system from a database to form an image portfolio. A user then chooses a specified number of images from the portfolio as her graphical password components. This process repeats for the specified number of rounds. If the user does not like a particular image portfolio, she may request a new one or upload her own images to be included in a portfolio. An accepted image portfolio remains unchanged until the user changes her graphical password. To facilitate recognition, images within a portfolio are assembled to be sufficiently distinguishable. 2.2 Subsequent Login using Dual Steps In step one the user as usual enters a user name and text password. The login page of the server deploying Dual Steps remains the same as when text passwords alone were used, i.e., no change in the front login page is required to deploy Dual Step, nor do users see any difference in their sign-in experience in step one. After the user provides a text password, the second step of authentication (the graphical step or g-step) begins. In each round of graphical password verification, the server transmits an image portfolio to the user, and the user chooses out her pre-registered images. After the user completes all rounds of verification, if both the text password and all graphical passwords were correct, she is granted account access. Otherwise, access is denied. We next discuss several attacks against graphical passwords which must be considered. Further security discussion is found in Section 3. 2.3 Eavesdropping An attacker able to intercept communication between the server and client would be able to capture image portfolios transmitted from the server, and the images selected by the user, thus stealing the entire graphical password. To prevent this attack, a security protocol such as HTTPS must be deployed to provide confidentiality. 2.4 Shoulder-Surfing An attacker can also steal a graphical password by shoulder-surfing (e.g., using a video camera) during the g-step. Such shoulder-surfing would be particularly easy if an implementation of the g-step provided user visual feedback upon user selection of an image, such as highlighting an image border. Here we describe a simple method to mitigate this type of attack (see Fig. 1). Fig. 1 Selection panel in graphical step For a given image portfolio, each image is associated with an index number. Images along with their index numbers are displayed in a random order on the screen. Below the displayed image portfolio is a selection panel with all index numbers dis-played incrementally. To select an image, the user identifies the image and then clicks the corresponding index number on the lower selection panel. In the case that several images must be chosen from a portfolio, the selection panel can help the user keep track of which images have
  • 3. Two Step Endorsement: Text Password And Graphical Password www.iosrjournals.org 39 | P a g e been selected so far (and allow easy de-selection, by clicking the corresponding number in the bottom panel, if necessary). The idea is that it is more difficult for a casual human observer to have line of sight to the lower panel and to map an index or set of indices from it to the corresponding images on the screen. This approach can reduce casual shoulder-surfing but cannot fully prevent such attacks involving movie-clip camera phones. Other techniques, e.g., Gaze-based password entry [13], can better mitigate this type of attack, but have their own usability and deployment challenges III. Preliminary Security Analysis 3.1 Password Strength Wediscuss the strength ofDual Step, measured by entropy in bits, by considering both the entropy of the text password and the graphical password parts. A text password of lengthlcharacters has entropy ofl · log2c bits if characters are selected uniformly at random and independently from an alphabet of c characters. For example, a randomly generated 8-character password consisting of digits, lowercase, and uppercase has8· log262 = 47.6Bits of entropy. Letr be the number of rounds of our graphical password verification. For each round, let nbe the size of the image portfolio, andk < n the total number of images selected from the portfolio as the graphical password. The entropy of a randomly selected graphical password conforming to this policy is r · log2t, where 𝑡 = (𝑛¦𝑘) and 𝑛!/(𝑛 − 𝑘)!for un-ordered and ordered images respectively. As an example, considerr = 1, n= 36, k= 3, and unordered image selection, meaning one round of verification by selecting3images in any order from a portfolio of size36. The entropy is l ≈12.8bits. For r = 2, in theory this doubles to 25.6bits, though in practice we might expect less unpredictability due to patterns in user choice [5]. Choosing different parameters k, n, r, and tcan increase security, but also changes usability. In addition, password guessing attacks in Dual Step must be done online (interacting with the server), which is more costly than offline attacks. Note that text passwords used in practice are generally far from randomly and in-dependently selected, and often lowercase only ([10]),decreasing entropy. For example, an 8-character lowercase password has entropy about 37.6 bits if all characters were selected randomly and independently. But in practice, they perhaps have only 20-35 bits on average and less for some subsets of users. Relative to this more realistic estimate, the 25.6bits (or even12.8 bits) of added security from the graphical part is quite significant, against both targeted single-account exhaustive attacks, and system-wide multi-account attacks that might attempt as few as 3-5 guesses per account. 3.2 Mitigating Naive Key logging Attacks Keylogging is a common method for stealing user text passwords. A keylogger is malicious software which intercepts keystrokes on an infected machine as a user types. For example, Microsoft Windows provides (un-documented) interfaces facilitating interception of system events including keystrokes. With Dual Step, a user would use the keyboard for the text password part, and mouse clicks for the graphical parts. Thus, a naive keylogger cannot obtain the graphical parts. More sophisticated malware can capture both user screen contents and mouse clicks to recover a graphical password, with more effort. 3.3 Mitigating Phishing Attacks Phishing [7] is another common technique for stealing passwords by fooling users to enter such information into a fraudulent website spoofing a legitimate one (e.g., a bank site). Social engineering tactics are often used (e.g., “urgent account update”, requests to verify fake transactions, etc.). In Dual Step, while users’ text password part can still be stolen by phishing, obtaining their graphical password parts is more difficult: without knowledge of users’ image profiles, the phisher does not know what images to present in order to extract a graphical password. 3.4 Mitigating Active MITM Attacks An active man-in-the-middle (MITM) attack allows an attacker to become an intervening proxy and control all communication be-tween the user and the website [9]. SSL cannot mitigate this attack since an attacker can use SSL on both communication segments individually, so users (and end website) appear to be “operating securely”. The proxy can be either malware on a user’s local machine or located on a remote server (controlled by an attacker) to which the user is drawn by phishing techniques. Such an attacker can gain access to any information exchanged between a user and a website, thus can defeat Dual Step. It appears difficult to prevent this active MITM attack if the end-user machine is infected by malicious software. In fact, it seems all software-only defenses fail for such compromised end-machines. On the other hand, if the active MITM proxy is located remotely, as in DNS server pharming-based MITM attacks, consistency check techniques involving alternative communication paths could be used to detect if requests intended to be sent to one server actually terminate at another. This provides protection to Dual Step against active MITM proxies.
  • 4. Two Step Endorsement: Text Password And Graphical Password www.iosrjournals.org 40 | P a g e IV. Related Work Graphical passwords can be largely classified into three categories: recognition-based, cued-recall, or recall-based. In recognition-based graphical passwords, users are required to recognize and then select a set of preselected images from a larger set. In cued-recall, the images cue the user, for example, to click a set of points on an image [3]. In recall-based, users are required to recall a password without any cues, such as drawing a doodle in Draw-A-Secret [12]. We focus the remainder of our review here on recognition-based schemes. For a broader survey, [1] [6] is a recognition-based graphical password, which makes use of random art images, instead of photographs, to discourage users from selecting predictable images. While randomly generated images can improve security, they also reduce usability. For example, it takes longer for users to remember random art images than photos, and less time to forget them. Passfaces [4] is another recognition-based scheme, using human faces as authentication images. A user’s password consists of k faces, each of which must be chosen from a set of n >1 faces in each round of the selection. While human faces are more memorable than text passwords, it was also found [5] that users usually choose predictable faces as their passwords, e.g., faces of their own race. In addition, female faces and “attractive” faces are chosen more often than male faces. Those biases make human faces less suitable as password components.Story [5] is similar to passfaces, but uses a variety of photos to form image portfolios, and encourages users to select photos to form a storyto improve memorability. In Winchell’s scheme [15], a user is asked to answer a sequence of questions based on a shared set of images with the server. This scheme can resistshoulder-surfing attacks, but requires significant training and has usability issues, as well as security issues [11]. References [1] S. Chiasson. Usable Authentication and Click-Based Graphical Passwords. PhD thesis, Carleton University,Ottawa, Canada, January 2009. [2] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot. Influencing Users towards Better Passwords: Persuasive Cued Click- Points. InProc. of HCI’08, September 2008. [3] S. Chiasson, P.C. van Oorschot, and R. Biddle. Graphical Password Authentication Using Cued Click Points. InProc. of ESORICS’07, volume 4734, [4] pages 359–374, September 2007. [5] Real User Corporation. The Science Behind Passfaces, September 2001. [6] D. Davis, F. Monrose, and M. Reiter. On User Choice in Graphical Password Schemes. In Proc. of13th USENIX Security Symposium, August 2004. [7] R. Dhamija and A. Perrig. Deja Vu: A User Study Using Images for Authentication. InProc. Of 9th USENIX Security Symposium, August 2000. [8] R. Dhamija, J. Tygar, and M. Hearst. Why Phishing Works. In Human Factors in Computing Systems, April 2006. [9] 51Logon: Simplifying SignInExperience. http://www.51Logon.com (in Chinese). [10] E. Felton, D. Balfanz, D. Dean, and D. Wallach. Web Spoofing: An Internet Con Game. In Proc. of the20th National Information systems Security Conference, October 1997. [11] D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. InProc. of the 2007 World Wide Web, 2007. D. [12] P. Golle and D. Wagner. Cryptanalysis of a Cognitive Authentication Schemes (Extended Abstract). InProc. of the 2007 IEEE Symposium on Security and Privacy, May 2007. [13] I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. InProc. of the 8th USENIX Security Symposium, August 23-26 1999. [14] M. Kumar, Tal Garfinkel, D. Boneh, and T. Winograd. Reducing Shoulder-surfing by Using Gaze-based Password Entry. InProc. of SOUPS’07, July 2007. [15] Rabkin. Personal Knowledge Questions for Fallback Authentication. In Proc. of the 2008 Symposium On Usable Privacy and Security (SOUPS), July 23-25 2008. [16] D. Weinshall. Cognitive Authentication Schemes Safe against Spyware (Short Paper). In Proc. of the 2006 IEEES ymposium on Security and Privacy, May 2006.