A Graphical Password Authentication System
A Graphical Password Authentication System
A Graphical Password Authentication System
Presented by..
Ch.Satish (08F01A0518)
Abstract Introduction Identification Passwords Passphrase Biometrics Graphical password Conclusion References
In this extended abstract , propose a simple graphical password authentication system .It describes operation with some examples, and highlight important aspects of the system
Use textual passwords augmented by some graphical capabilities They are attractive since people usually remember pictures better than words Also, they should be more resistant to bruteforce attacks, since the search space is practically infinite.
Passwords: method of choice for user authentication Usually it is 8-15 character or slightly more than that Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Its nothing but the enhance version of password. Usually it is a combination of words or simply collection of password in proper sequence is passphrase. Length of passphrase is about 30-50 character or more than that also 30-50 character is creates ambiguity to remember if there is no any proper sequence
Refer to a broad range of technologies Automate the identification or verification of an individual Based on human characteristics or body organs
Observation
Graphical password
GRAPHICAL PASSWORD
DRAW-A-SECRET SCHEME
Conventional
Users freed from having to remember alphanumeric string. What is good about picture-based password?
SCREEN SHOTS:
Triple-DES
Ek(P)
restult=Dk(Ek(P))
Store Ek(P)
ressult = P ??
L=1
P : password Grid size GxG L : length of password Lmax : maximum length of password
P(L,G)
l=L
l=1
N(l,G) = n(x,y,l,G) (x,y)[1..G]x[1..G] n : number of strokes of length l (x,y) : ending cell
However, above table shows raw size of graphical password space surpasses that of textual passwords
To login, user is required to click within the circled red regions (chosen when created the password) in this picture. The choice for the four regions is arbitrary
In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text.