graphicalpasswordauthentication 130907104619-

18
Presen ted by: Anilaj a CSE

Upload: snehal-wankhede

Post on 19-Jun-2015

622 views

Category:

Documents


0 download

TRANSCRIPT

  • 1. Presented by: Anilaja CSE

2. What is PASSWORD?PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources. Uses of Password: Logging into accounts. Retrieving emails. Accessing applications. Networks. Websites 3. Authentication is a process of conformation of a persons identity.Types: Token based authentication key cards, band cards, smart card, Biometric based authentication Fingerprints, iris scan, facial recognition, Knowledge based authentication text-based passwords, picture-basedpasswords, 4. Text password is a secret word or string ofcharacters that is used for user authentication to prove his identity and gain access to resources. Difficulty of remembering passwords easy to remember -> easy to guess hard to guess -> hard to remember 5. A graphical password is an authentication system thatworks by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach issometimes called graphical user authentication (GUA). An example of a graphical password uses animage on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in. 6. Recall Based Techniques A user is asked to reproduce something that hecreated or selected earlier during the registration stage Recognition Based Techniques A user is presented with a set of images and theuser passes the authentication by recognizing and identifying the images he selected during the registration stage. Cued-recall Technique 7. Draw-A-Secret (DAS) SchemeUser draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing Redrawing has to touch thesame grids in the same sequence in authentication. User studies showed the 8. Signature scheme Here authentication is conducted by having the user drawing their signature using a mouse. 9. Pass Point Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in the correct sequence. 10. B-DAS SchemeGrid Selection Scheme 11. Dhamija and Perrig SchemePick several pictures out of many choices, identify them later in authentication. 12. Sobrado and Birget SchemeSystem display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects. 13. Pass face scheme: In this technique human faces are used as password. 14. Other SchemesSelect a sequence of images as password 15. Graphical password schemes provide a way ofmaking more human-friendly passwords while increasing the level of security. Here the security of the system is very high. Dictionary attacks and brute force search areinfeasible. 16. Password registration and log-in process take toolong. Require much more storage space than text basedpasswords. Shoulder Surfing .