Top Banner
Comprehensive study of the usability features of the Graphical Password 1
39

Comprehensive study of the usability features of the Graphical Password

Jan 14, 2015

Download

Education

taniamutholil

Comprehensive study of the usability features of the Graphical Password
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Comprehensive study of the usability features of the  Graphical  Password

Comprehensive study of the usability

features of the Graphical Password

1

Page 2: Comprehensive study of the usability features of the  Graphical  Password

1. INTRODUCTION

2. CURRENT AUTHENTICATION METHODS

3.DRAWBACKS OF NORMAL PASSWORD

4.WHY DO WE USE GRAPHICAL PASSWORD?

5. RECOGNITION BASED TECHNIQUES

6.RECALL BASED TECHNIQUES

7.CONCLUSION

8.REFERENCES

9.WORDS OF GRATITUDE

CONTENTS

2

Page 3: Comprehensive study of the usability features of the  Graphical  Password

Current authentication methods

Token based authentication ( key cards,bank cards,smart cards)

Biometric based (fingerprint,iris scan,facial recognition)

Knowledge based (text based and picture based passwords)

3

Introduction

Page 4: Comprehensive study of the usability features of the  Graphical  Password

4

1Token based authentication

Page 5: Comprehensive study of the usability features of the  Graphical  Password

Current authentication methods

Token based authentication

( key cards,bank cards,smart cards) Biometric based

(fingerprint,iris scan,facial recognition) Knowledge based

(text based and picture based passwords)

5

Introduction

Page 6: Comprehensive study of the usability features of the  Graphical  Password

6

2,Biometric based

Page 7: Comprehensive study of the usability features of the  Graphical  Password

Current authentication methods

Token based authentication

( key cards,bank cards,smart cards) Biometric based

(fingerprint,iris scan,facial recognition) Knowledge based

(text based and picture based passwords)

7

Introduction

Page 8: Comprehensive study of the usability features of the  Graphical  Password

8

3,Knowledge baseda) text based

Page 9: Comprehensive study of the usability features of the  Graphical  Password

9

3,Knowledge basedb)picture based

Page 10: Comprehensive study of the usability features of the  Graphical  Password

Drawbacks of normal password

Easy to guess Harder passwords are not easy to remember Dictionary attack-successively trying all the

words in an exhaustive list called a dictionary Bruteforce attack-tries to use every possible

character combinations as a password Key-space is limited to 64 ASCII characters

10

Page 11: Comprehensive study of the usability features of the  Graphical  Password

Why do we use graphical password?

More secure More memorable Easier for people to use A picture worth thousand passwords Offers much larger keyspace Cued recall,which helps users to remember a

password based on picture displayed and not just memory alone

Divided into two-recognition method and recall based methods

11

Page 12: Comprehensive study of the usability features of the  Graphical  Password

12

Graphical password?

Divided into two

Recognition method Recall based methods

Page 13: Comprehensive study of the usability features of the  Graphical  Password

13

Recognition based technique

A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage

Page 14: Comprehensive study of the usability features of the  Graphical  Password

Methods for recognition based technique

Dhamija and Perrig algorithmSobrado and Birget algorithmJansen et al. algorithmPassface algorithm

14

Page 15: Comprehensive study of the usability features of the  Graphical  Password

Dhamija and Perrig algorithm

15

Based on hash visualization technique

Page 16: Comprehensive study of the usability features of the  Graphical  Password

16

User will be asked to select certain number of images from a set of random pictures generated by a program

Later, user will be required to identify the pre-selected images to be authenticated

Page 17: Comprehensive study of the usability features of the  Graphical  Password

Drawbacks

SHOULDER-SURFING

using direct observation techniques,

such as looking over someone's shoulder,

to get information

Longer login time

17

Page 18: Comprehensive study of the usability features of the  Graphical  Password

Sobrado and Birget algorithmOvercome the shoulder-surfing attacks

Login time can be reduced

Several schemes are there, eg.triangle scheme,moveable frame scheme,special geometric configuration scheme

18

Page 19: Comprehensive study of the usability features of the  Graphical  Password

Triangle scheme

19

Page 20: Comprehensive study of the usability features of the  Graphical  Password

20

A user needs to selects their pass-object among many displayed object

To be authenticated, a user needs to recognize all the pre-selected pass-object which was selected during the registration phase.

The user requires to click inside the convex-hull which formed by the pass-object

Page 21: Comprehensive study of the usability features of the  Graphical  Password

21

Moveable frame scheme

Page 22: Comprehensive study of the usability features of the  Graphical  Password

22

This scheme is similar to their previous scheme but, only three pass objects were involved in this technique.

One of the pass-objects is placed into the moveable frame.

To be authenticated, the user needs to rotate the frame until all the pass-object is located in a straight line

Page 23: Comprehensive study of the usability features of the  Graphical  Password

Jansen et al. algorithm

23

Select a sequence of thumbnail photo to form a password

Designed especially for mobile devices such as PDAs

Page 24: Comprehensive study of the usability features of the  Graphical  Password

24

Throughout the password creation, a user has to select the theme first e.g. sea and shore,

Afterward, a user has to selects and registers a sequence of the selected thumbnail photo to form a password .

The user needs to recognize and identify the previously seen photos and touch it by using stylus with the correct sequence in order to be authenticated

Page 25: Comprehensive study of the usability features of the  Graphical  Password

Passface algorithm

25

Page 26: Comprehensive study of the usability features of the  Graphical  Password

26

Based on the assumption that human can recall human faces easier than other pictures

User are requires to select the previously seen human face picture from a grid of nine faces which one of the face is the known face and the rest is the decoy faces

Page 27: Comprehensive study of the usability features of the  Graphical  Password

27

This step continuously repeated until all the four face is identified. User needs to recognize all the face selected during the enrollment stage. User is authenticated if all the correct face is successfully identified.

Page 28: Comprehensive study of the usability features of the  Graphical  Password

28

Takada and koike

Allow users to use their favourite image for authentication

First register their favourite images with the server

Page 29: Comprehensive study of the usability features of the  Graphical  Password

29

Recall based techniques

A user is asked to reproduce something that he or she created or selected earlier during the registration stage

Page 30: Comprehensive study of the usability features of the  Graphical  Password

Methods for recall based techniques

Passlogix scheme DAS scheme Signature scheme

30

Page 31: Comprehensive study of the usability features of the  Graphical  Password

Passlogix scheme “Repeating a sequence of actions” Creating a password by a chronological

situation

31

Page 32: Comprehensive study of the usability features of the  Graphical  Password

32

User can select their background images based on the environment, for example in the kitchen, bathroom, bedroom or etc

To enter a password, user can click and/or drag on a series of items within that image.

Page 33: Comprehensive study of the usability features of the  Graphical  Password

33

For example in the kitchen environment, user can prepare a meal by selecting cooking ingredients, take fast food from fridge and put it in the microwave oven, select some fruits and wash it in washbasin and then put it in the clean bowl.

Page 34: Comprehensive study of the usability features of the  Graphical  Password

DAS scheme“Draw-a-secret” based on two dimensional gridUsers can draw a password as long as they wish

34

Page 35: Comprehensive study of the usability features of the  Graphical  Password

Signature scheme There is no need to memorize one’s

signature and signatures are hard to fake

35

Page 36: Comprehensive study of the usability features of the  Graphical  Password

Conclusion

In this paper, we have conducted a comprehensive study of existing graphical password techniques

We have found that the graphical passwords schemes is more difficult to be cracked by using the traditional attack methods.

36

Page 37: Comprehensive study of the usability features of the  Graphical  Password

References

37

Ieee papers

www.graphicalpassword.net

R. Dhamija and A. Perrig. “Déjà vu: A User Study Using Images forAuthentication

wikipedia

Page 38: Comprehensive study of the usability features of the  Graphical  Password

THANK YOU

38

Page 39: Comprehensive study of the usability features of the  Graphical  Password

39