“hybrid authentication schemes”

56
Jawaharlal Nehru National College of Engineering, Shimoga – 577204 Department of Computer Science & Engineering “HYBRID AUTHENTICATION SCHEMES” Technical Seminar on, Under the guidance of, Mrs. Sowmya D B.E., M.Tech., Asst. Prof. Dept. of Presented By Bhavatarini.N 1 st semester, M.Tech. Coordinator, Dr. R Sanjeev Kunte B.E., M.Tech., Ph.D Professor. Dept. of CS&E,JNNCE

Upload: ilori

Post on 23-Feb-2016

59 views

Category:

Documents


0 download

DESCRIPTION

Jawaharlal Nehru National College of Engineering, Shimoga – 577204 Department of Computer Science & Engineering. Technical Seminar on,. “HYBRID AUTHENTICATION SCHEMES”. Presented By Bhavatarini.N 1 st semester, M.Tech . Coordinator, Dr. R Sanjeev Kunte B.E., M.Tech ., Ph.D - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: “HYBRID AUTHENTICATION SCHEMES”

Jawaharlal Nehru National College of Engineering, Shimoga – 577204

Department of Computer Science & Engineering

“HYBRID AUTHENTICATION SCHEMES”

Technical Seminar on,

Under the guidance of,Mrs. Sowmya DB.E.,

M.Tech., Asst. Prof.

Dept. of CS&E,JNNCE

Presented ByBhavatarini.N

1st semester, M.Tech.Coordinator,

Dr. R Sanjeev Kunte B.E.,

M.Tech., Ph.DProfessor.

Dept. of CS&E,JNNCE

Page 2: “HYBRID AUTHENTICATION SCHEMES”

Authentication is basic step of information security. Textual passwords used to authenticate are prone to eves dropping, dictionary attacks, etc. Graphical passwords are believed to be more secure than textual passwords, but they are also susceptible for many attacks such as shoulder surfing.

To solve this problem, text can be combined with images or colors to generate session passwords for authentication, or one or more authentication schemes may be combined forming hybrid authentication schemes, which provide more security, reliability than traditional schemes.

ABSTRACT

Page 3: “HYBRID AUTHENTICATION SCHEMES”

CONTENTS

PasswordAuthentication Graphical passwordsClassification of graphical passwordsHybrid authentication schemes

Page 4: “HYBRID AUTHENTICATION SCHEMES”

Password

Page 5: “HYBRID AUTHENTICATION SCHEMES”

AUTHENTICATION

Required for authenticating in order to provide access to something(resource, object).

PASSWORD

PROVIDE ACCESS

Password Ideal Password >

Page 6: “HYBRID AUTHENTICATION SCHEMES”

REDUCES LOGIN TIME

DIFFICULT TO GUESS

EASE TO ACCESS

IDEAL PASSWORD

< Password Ideal Password Authentication >

Page 7: “HYBRID AUTHENTICATION SCHEMES”

Authentication

Page 8: “HYBRID AUTHENTICATION SCHEMES”

Classifications Of Authentication Methods

< Authentication Classifications Drawbacks >

Page 9: “HYBRID AUTHENTICATION SCHEMES”

Drawbacks

AlphanumericEasily remembered

or difficult to guess but not both.

Vulnerable to shoulder surfing.

BiometricExpensive

Increases login time.

Entire device may become useless incase of a surgery or an accident changing the biometric feature.

< Classifications Drawbacks Graphical Passwords >

Page 10: “HYBRID AUTHENTICATION SCHEMES”

Graphical Passwords

Page 11: “HYBRID AUTHENTICATION SCHEMES”

An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).

Also called as graphical user authentication (GUA)

< Graphical Passwords Graphical Passwords Graphical passwords >

Page 12: “HYBRID AUTHENTICATION SCHEMES”

It is Promising alternative to conventional password based authentication systems.

Uses pictures instead of textual alternative.

Easier to remember User friendly Increases the level of security

< Graphical Passwords Graphical Passwords Hierarchy of Graphical passwords >

Page 13: “HYBRID AUTHENTICATION SCHEMES”

Graphical Passwords

RECALL BASED

CUED RECALL BASED

RECOGNITION BASED

< Graphical Passwords Hierarchy of Graphical Passwords Recall Based Systems >

Page 14: “HYBRID AUTHENTICATION SCHEMES”

Recall Based Systems

Page 15: “HYBRID AUTHENTICATION SCHEMES”

Draw-a-Secret (DAS) Algorithm

< Recall Based Systems DAS algorithm Disadvantages >

(2,2), (3,2), (3,3), (2,3), (2,2), (2,1), (5, 5)

Page 16: “HYBRID AUTHENTICATION SCHEMES”

Disadvantages

•User finds difficulty in recalling the stroke order

•Weak passwords are susceptible to graphical dictionary attack.

• Susceptible to shoulder surfing and guessing attack.

< DAS algorithm Disadvantages Cued Recall Based Systems >

Page 17: “HYBRID AUTHENTICATION SCHEMES”

Cued Recall Based Systems

Page 18: “HYBRID AUTHENTICATION SCHEMES”

Blonder Algorithm< Cued Recall Based Systems Blonder Algorithm Blonder Algorithm >

• Password is created by having the user click on several locations on an image.

• The image can assist users to recall their passwords

• Prone to guessing attack

Page 19: “HYBRID AUTHENTICATION SCHEMES”

Disadvantages : password space is relatively small

< Blonder Algorithm Blonder Algorithm Recognition Based Technique >

Page 20: “HYBRID AUTHENTICATION SCHEMES”

Recognition Based Technique

Page 21: “HYBRID AUTHENTICATION SCHEMES”

Recognition is easier than recall.“I know you but I forgot your name”

< Recognition Based Technique Recognition Based Technique Dharmija and Perrig Technique >

Page 22: “HYBRID AUTHENTICATION SCHEMES”

Dhamija and Perrig Technique

Disadvantage: prone to shoulder surfing.

< Recognition Based Technique Dharmija and Perrig Technique Passface algorithm >

Page 23: “HYBRID AUTHENTICATION SCHEMES”

Passface Algorithm< Shoulder-Surfing Passface Algorithm Hybrid Authentication >

Page 24: “HYBRID AUTHENTICATION SCHEMES”

• Technique is based on the assumption that people can recall human faces easier than other pictures.

Disadvantages :

• requires more time• Some obvious patterns were found• Prone to shoulder surfing and guessing attacks

Page 25: “HYBRID AUTHENTICATION SCHEMES”

Hybrid Authentication Schemes

Page 26: “HYBRID AUTHENTICATION SCHEMES”

Hybrid Authentication SchemeCombination of

•two or more authentication scheme

•Shape ,colors and text

Used in Personal digital assistants (PDA) Used to provide secure authentication

during E-transaction

< Hybrid Authentication Hybrid Authentication Pair Based Authentication >

Page 27: “HYBRID AUTHENTICATION SCHEMES”

Pair Based Authentication Scheme

Page 28: “HYBRID AUTHENTICATION SCHEMES”

Pair based authentication scheme

1 A J R H 70 K 9 I Q G3 B O C P 6Z L 4 S T 2M Y W D 5 F8 X N V E U

Login:

< Pair Based Authentication Pair Based Authentication Hybrid Textual Authentication >

Page 29: “HYBRID AUTHENTICATION SCHEMES”

< Pair Based Authentication Pair Based Authentication Hybrid Textual Authentication >

STEP 1:If the password considered is SACHIN46

Example:

STEP 2:Consider the password selected in pairs.SACHIN46STEP 3:Search for the letter which is in the intersection of the pair of letters, considering the row of first letter and column of second letter

Page 30: “HYBRID AUTHENTICATION SCHEMES”

1 A J R H 70 K 9 I Q G3 B O C P 6Z L 4 S T 2M Y W D 5 F8 X N V E U

Login:

< Pair Based Authentication Pair Based Authentication Hybrid Textual Authentication >SACHIN46

Page 31: “HYBRID AUTHENTICATION SCHEMES”

1 A J R H 70 K 9 I Q G3 B O C P 6Z L 4 S T 2M Y W D 5 F8 X N V E U

Login:

< Pair Based Authentication Pair Based Authentication Hybrid Textual Authentication >

LPV2

Page 32: “HYBRID AUTHENTICATION SCHEMES”

Hybrid Textual Authentication Scheme

Page 33: “HYBRID AUTHENTICATION SCHEMES”

Registration phase

•Enter the username•Rate the colors

1 2 3 4 5 6 7 8

< Hybrid Textual Authentication Hybrid Textual Authentication Hybrid Textual Authentication >

Page 34: “HYBRID AUTHENTICATION SCHEMES”

3 4 6 8 5 2 7 1

1 2 3 4 5 6 7 8

1 5 7 8 3 1 4 2 6

2 8 6 4 2 3 1 5 7

3 3 5 6 4 7 8 1 2

4 2 3 5 6 8 7 4 1

5 7 2 1 5 4 6 8 3

6 1 4 7 8 2 3 6 5

7 4 1 2 7 6 5 3 8

8 6 8 3 1 5 2 7 4

Login:

< Hybrid Textual Authentication Hybrid Textual Authentication Secure E-transaction >

Page 35: “HYBRID AUTHENTICATION SCHEMES”

3 4 6 8 5 2 7 1

1 2 3 4 5 6 7 8

1 5 7 8 3 1 4 2 6

2 8 6 4 2 3 1 5 7

3 3 5 6 4 7 8 1 2

4 2 3 5 6 8 7 4 1

5 7 2 1 5 4 6 8 3

6 1 4 7 8 2 3 6 5

7 4 1 2 7 6 5 3 8

8 6 8 3 1 5 2 7 4

5Login:

< Hybrid Textual Authentication Hybrid Textual Authentication Secure E-transaction >

Page 36: “HYBRID AUTHENTICATION SCHEMES”

Hybrid Authentication Scheme For Secure E-transaction

Page 37: “HYBRID AUTHENTICATION SCHEMES”

Hybrid Authentication Scheme For Secure E-Transaction

• 3 step process

• Resistant to phishing attack, shoulder surfing and guessing attacks.

•Used to provide secured and reliable authentication procedure for E-Transactions.

< Secure E-transaction Secure E-transaction Registration Algorithm >

Page 38: “HYBRID AUTHENTICATION SCHEMES”

Registration algorithm

1. Enter Username (Ur) (If exists Enter New Username)

{Ur: It is a set of characters.}

2. Now user selects the desired text password (Tr).

{Tr: It is a set alphabets, characters and etc.}

3. Draw a Secret (DASr) for producing recall based password.

{DASr: It is combination of Dot Pattern produce by user.}

< Secure E-Transaction Registration Algorithm Registration Algorithm >

Page 39: “HYBRID AUTHENTICATION SCHEMES”

4. User selects the images (Ir) from the various categories of images for recognition based password. {Ir: It is a set of images selected for authentication by user in a definite order}

5. Registration complete.

< Registration Algorithm Registration Algorithm Authentication Algorithm >

Page 40: “HYBRID AUTHENTICATION SCHEMES”

Authentication algorithms1. Enter Username (Ua) (If not valid enter

valid username.)

{Ua: It is the username given during registration.}

2. Now user enters the text password (Ta). (If not verified enter valid text password)

{Ta: Text password selected during registration.}

3. Draw the DASa.

{DASa: It is combination of Dot Pattern produced by the user during registration.}

< Registration Algorithm Authentication Algorithm Authentication Algorithm >

Page 41: “HYBRID AUTHENTICATION SCHEMES”

4. Selects the images (Ia) from the various categories of images for recognition based password.{Ia: It is a set of images selected during registration by user in a definite order.}

5. If successful then,

6. Authentication Complete

< Authentication Algorithm Authentication Algorithm Based On Shape And Text >

Page 42: “HYBRID AUTHENTICATION SCHEMES”

A Hybrid Password Authentication Scheme Based On Shape And Text

Page 43: “HYBRID AUTHENTICATION SCHEMES”

BASIC IDEA

•Map the shape from strokes and grids to text.

Shape TextStrokes and grid

< Based On Shape And Text Basic Idea Notations >

Page 44: “HYBRID AUTHENTICATION SCHEMES”

Notations • U: The set of elements appeared in the grid in the

interface.

• V: Input passwords vector, which consists of elements in U.

• |V|: Size of the V. It also represents the length of the input passwords, or the strokes’ size.

• g: the size of the grid.

• S: Shape of the password.

• |S|: Number of strokes of the password

< Basic Idea Notations Password Set Interface >

Page 45: “HYBRID AUTHENTICATION SCHEMES”

Password Set Interface< Notations Password Set Interface Password Set Procedure >

Page 46: “HYBRID AUTHENTICATION SCHEMES”

Password Set Procedure< Password Set Interface Password Set Procedure Original Stroke >

Page 47: “HYBRID AUTHENTICATION SCHEMES”

Original Stroke On The Interface

< Password Set Procedure Original Stroke Different Input Style >

Page 48: “HYBRID AUTHENTICATION SCHEMES”

Different input style< Original Stroke Different Input Style Security Analysis >

Page 49: “HYBRID AUTHENTICATION SCHEMES”

Security Analysis

Page 50: “HYBRID AUTHENTICATION SCHEMES”

Brute Force Attack

• Produces every combination of password • Text based passwords contain 94 ˄N number

of space where 94->number of printable characters , N -> length•Almost proven successful against text

passwords•Hybrid authentication schemes are resistant

to brute force attack.

< Security Analysis Brute Force Attack Dictionary Attack >

Page 51: “HYBRID AUTHENTICATION SCHEMES”

Dictionary attack

•Generally directed towards textual passwords.

• It is a method of breaking into a password protected system by systematically entering every word in a dictionary as password.

•Dictionary attack has no effect on hybrid authentication scheme because of the session passwords.

< Brute Force Attack Dictionary Attack Guessing Attack >

Page 52: “HYBRID AUTHENTICATION SCHEMES”

Guessing attack

•Mechanism in which passwords are guessed.

• Text passwords are sometimes easy to guess

•Guessing attacks fails in case of hybrid authentication schemes.

< Dictionary Attack Guessing Attack Shoulder Surfing Attack >

Page 53: “HYBRID AUTHENTICATION SCHEMES”

Shoulder Surfing Attack

• Passwords are identified by looking over a person’s shoulder.• Common in crowded places

• Both text and graphical passwords are vulnerable.

•Hybrid authentication scheme is resistant and hence can be used in e-transactions

< Guessing Analysis Shoulder Surfing Attack Conclusion >

Page 54: “HYBRID AUTHENTICATION SCHEMES”

Conclusion

Page 55: “HYBRID AUTHENTICATION SCHEMES”

< Conclusion Conclusion

Currently many schemes and techniques are available for authentication. There is a growing interest in using pictures as passwords rather than text passwords. The major advantage of the hybrid authentication scheme is that, it is a secure authentication system for E-transaction, and for PDAs. In fact, this particular system needs not to be depended on any elements like cards or human parts etc. for authenticating the user. It increases the reliability, accuracy, security and also the memorability of the system.

Conclusion

Page 56: “HYBRID AUTHENTICATION SCHEMES”