report of graphical password

21
1. INTRODUCTION A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). A graphical password is easier than a text-based password for most people to remember. Suppose an 8-character password is necessary to gain entry into a particular computer network. Instead of w8KiJ72c, for example, a user might select images of the earth (from among a screen full of real and fictitious planets), the country of France (from a map of the world), the city of Nice (from a map of France), a white stucco house with arched doorways and red tiles on the roof, a green plastic cooler with a white lid, a package of Gouda cheese, a bottle of grape juice, and a pink paper cup with little green stars around its upper edge and three red bands around the middle. Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words (rather than the recommended jumble of characters). A dictionary search can often hit on a password and allow a hacker to gain entry into a system in seconds. But if a series of selectable images is used on successive screen pages, and if there are many images on each page, a hacker must try every possible combination at random. If there are 100 images on each of the 8 pages in an 8-image password, there are 1008, or 10 quadrillion (10,000,000,000,000,000), possible combinations that could form the graphical password! If the system has a built-in delay of only 0.1 second following the selection of each image until the presentation of the next page, it would take (on average) millions of 1

Upload: sahil-dhingra

Post on 12-Dec-2015

218 views

Category:

Documents


1 download

DESCRIPTION

best

TRANSCRIPT

Page 1: Report of Graphical Password

1. INTRODUCTION

A graphical password is an authentication system that works by having the user select from images, in a

specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password

approach is sometimes called graphical user authentication (GUA).

A graphical password is easier than a text-based password for most people to remember. Suppose an 8-

character password is necessary to gain entry into a particular computer network. Instead of w8KiJ72c, for

example, a user might select images of the earth (from among a screen full of real and fictitious planets), the

country of France (from a map of the world), the city of Nice (from a map of France), a white stucco house

with arched doorways and red tiles on the roof, a green plastic cooler with a white lid, a package of Gouda

cheese, a bottle of grape juice, and a pink paper cup with little green stars around its upper edge and three

red bands around the middle.

Graphical passwords may offer better security than text-based passwords because many people, in an

attempt to memorize text-based passwords, use plain words (rather than the recommended jumble of

characters). A dictionary search can often hit on a password and allow a hacker to gain entry into a system

in seconds. But if a series of selectable images is used on successive screen pages, and if there are many

images on each page, a hacker must try every possible combination at random. If there are 100 images on

each of the 8 pages in an 8-image password, there are 1008, or 10 quadrillion (10,000,000,000,000,000),

possible combinations that could form the graphical password! If the system has a built-in delay of only 0.1

second following the selection of each image until the presentation of the next page, it would take (on

average) millions of years to break into the system by hitting it with random image sequences.

1

Page 2: Report of Graphical Password

2.HACKING TECHNIQUES

2.1 Dictionary Attacks

A dictionary attack is a method of breaking into a password-protected computer or server by systematically

entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find

the key necessary to decrypt  an  encrypted message or document.

Dictionary attacks work because many computer users and businesses insist on using ordinary words as

passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases, and

unsuccessful against systems that employ random combinations of uppercase and lowercase letters mixed

up with numerals. In those systems, the brute-force method of attack (in which every possible combination

of characters and spaces is tried up to a certain maximum length) can sometimes be effective, although this

approach can take a long time to produce results.

Vulnerability to password or decryption-key assaults can be reduced to near zero by limiting the number of

attempts allowed within a given period of time, and by wisely choosing the password or key. For example,

if only three attempts are allowed and then a period of 15 minutes must elapse before the next three attempts

are allowed, and if the password or key is a long, meaningless jumble of letters and numerals, a system can

be rendered immune to dictionary attacks and practically immune to brute-force attacks.

A form of dictionary attack is often used by spammers. A message is sent to e-mail addresses consisting of

words or names, followed by the at symbol (@), followed by the name of a particular domain. Long lists of

given names (such as frank, george, judith, or donna) and/or individual letters of the alphabet followed by

surnames (such as csmith, jwilson, or pthomas) in combination with a domain name are usually effective.

2.1.1 Disadvantages

Rarely successful.

Time consuming.

Can be easily defeated using delay settings.

2.2 Brute force attacks

In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory,

be used against any encrypted data (except for data encrypted in an information-theoretically

secure manner). Such an attack might be utilized when it is not possible to take advantage of other

2

Page 3: Report of Graphical Password

weaknesses in an encryption system (if any exist) that would make the task easier. It consists of

systematically checking all possible keys or passwords until the correct one is found. In the worst case, this

would involve traversing the entire search space.

When password guessing, this method is very fast when used to check all short passwords, but for longer

passwords other methods such as the dictionary attack are used because of the time a brute-force search

takes.When key guessing, the key length used in the cipher determines the practical feasibility of

performing a brute-force attack, with longer keys exponentially more difficult to crack than shorter ones. A

cipher with a key length of N bits can be broken in a worst-case time proportional to 2Nand an average time

of half that.

Brute-force attacks can be made less effective by obfuscating the data to be encoded, something that makes

it more difficult for an attacker to recognize when he/she has cracked the code. One of the measures of the

strength of an encryption system is how long it would theoretically take an attacker to mount a successful

brute-force attack against it.

Brute-force attacks are an application of brute-force search, the general problem-solving technique of

enumerating all candidates and checking each one.

Fig.1: Brute-force attack kit[4]

The EFF's US$250,000 DES cracking machine contained over 1,800 custom chips and could brute-force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted on both sides with 64 Deep Crack chips.

2.3 Shoulder surfing

Shoulder surfing is particularly effective in crowded places because it is relatively easy to observe someone as they:

fill out a form enter their PIN at an automated teller machine or a POS terminal use a telephone card at a public payphone enter a password at a cybercafe, public and university libraries, or airport kiosks enter a

3

Page 4: Report of Graphical Password

code for a rented locker in a public place such as a swimming pool or airport public transport is a particular area of concern.

Shoulder surfing can also be done at a distance using binoculars or other vision-enhancing devices.

Inexpensive, miniature closed-circuit television cameras can be concealed in ceilings, walls or fixtures to

observe data entry. To prevent shoulder surfing, it is advised to shield paperwork or the keypad from view

by using one's body or cupping one's hand.

Secure, the European Association for Visual Data Security, recommends that when you are in a situation

with heightened risk, take steps to protect yourself by angling your screen away from the gazes of other

people or using a screen shield to reduce the visibility of your screen. Secure also recommends that

corporate IT security guidance includes directions on how to mitigate these threats. This could include the

adoption of ISO/IEC 27001. You should also ensure that staff are properly educated to the risks involved

with accessing information.

A survey of IT professionals in a white paper for Secure found that:

85% of those surveyed admitted to seeing sensitive information on screen that they were not authorised to

see 82% admitted that it was possible information on their screens could have been viewed by unauthorised

personnel 82% had little or no confidence that users in their organisation would protect their screen from

being viewed by unauthorised people.

2.4 Overview of Authentication Methods

Current authentication methods can be divided into

Three main areas:

• Token based authentication

• Biometric based authentication

• Knowledge based authentication

Token based techniques, such as key cards, bank cards and smart cards are widely used. Many token based

authentication systems also use knowledge based techniques to enhance security. For example, ATM cards

are generally used together with a PIN number.

Many different aspects of human physiology, chemistry or behavior can be used for biometric

authentication. The selection of a particular biometric for use in a specific application involves a weighting

4

Page 5: Report of Graphical Password

of several factors. Jain et al. (1999)[6] identified seven such factors to be used when assessing the suitability

of any trait for use in biometric authentication. Universality means that every person using a system should

possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant

population such that they can be distinguished from one another. Permanence relates to the manner in which

a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over

time with respect to the specific matching algorithm. Measurability (collectability) relates to the ease of

acquisition or measurement of the trait. In addition, acquired data should be in a form that permits

subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy,

speed, and robustness of technology used (see performance section for more details). Acceptability relates

to how well individuals in the relevant population accept the technology such that they are willing to have

their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be

imitated using an artifact or substitute.

Fig.2: Block Diagram for Biometric Systems[4]

The block diagram illustrates the two basic modes of a biometric system. First, in verification (or

authentication) mode the system performs a one-to-one comparison of a captured biometric with a specific

template stored in a biometric database in order to verify the individual is the person they claim to be. Three

steps are involved in the verification of a person.In the first step, reference models for all the users are

generated and stored in the model database. In the second step, some samples are matched with reference

models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing

step. This process may use a smart card, username or ID number (e.g. PIN) to indicate which template

should be used for comparison. 'Positive recognition' is a common use of the verification mode, "where the

aim is to prevent multiple people from using same identity".

Second, in identification mode the system performs a one-to-many comparison against a biometric database

in attempt to establish the identity of an unknown individual. The system will succeed in identifying the 5

Page 6: Report of Graphical Password

individual if the comparison of the biometric sample to a template in the database falls within a previously

set threshold. Identification mode can be used either for 'positive recognition' (so that the user does not have

to provide any information about the template to be used) or for 'negative recognition' of the person "where

the system establishes whether the person is who she (implicitly or explicitly) denies to be". The latter

function can only be achieved through biometrics since other methods of personal recognition such as

passwords, PINs or keys are ineffective.

The first time an individual uses a biometric system is called enrollment. During the enrollment, biometric

information from an individual is captured and stored. In subsequent

uses, biometric information is detected and compared with the information stored at the time of enrollment.

Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system

is to be robust. The first block (sensor) is the interface between the real world and the system; it has to

acquire all the necessary data. Most of the times it is an image acquisition system, but it can change

according to the characteristics desired. The second block performs all the necessary pre-processing: it has

to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some

kind of normalization, etc. In the third block necessary features are extracted. This step is an important step

as the correct features need to be extracted in the optimal way. A vector of numbers or an image with

particular properties is used to create a template. A template is a synthesis of the relevant characteristics

extracted from the source. Elements of the biometric measurement that are not used in the comparison

algorithm are discarded in the template to reduce the filesize and to protect the identity of the

enrollee[citation needed].

During the enrollment phase, the template is simply stored somewhere (on a card or within a database or

both). During the matching phase, the obtained template is passed to a matcher that compares it with other

existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The

matching program will analyze the template with the input. This will then be output for any specified use or

purpose (e.g. entrance in a restricted area)[citation needed]. Selection of biometrics in any practical

application depending upon the characteristic measurements and user requirements. We should consider

Performance, Acceptability, Circumvention, Robustness, Population coverage, Size, Identity theft

deterrence in selecting a particular biometric. Selection of biometric based on user requirement considers

Sensor availability, Device availability, Computational time and reliability, Cost, Sensor area and power

consumption.

6

Page 7: Report of Graphical Password

K.B.A-Quickly being able to confirm someone is who they claim to be ultimately leads to faster purchase

approvals, a better customer experience and quicker revenue for you. The key is to do this without

increasing your costs or putting your customer’s identity at risk.

We offer two knowledge-based authentication (KBA) solutions, both based on an out-of-wallet questions

process, that businesses can use to establish trust with their consumers and then maintain this trust

throughout the entire customer lifecycle. Use them individually, or together, to expand your out-of-wallet

authentication capabilities.

ExpectID IQ – verify consumers and generate out-of-wallet KBA questions based on IDology’s data

sources

ExpectID Enterprise  – create custom out-of-wallet KBA questions using internal proprietary data behind

your firewall.

7

Page 8: Report of Graphical Password

3. CATEGORIES OF SECURITY SYSTEMS

As known, the most common computer authentication method is to use alphanumerical usernames and

passwords, which requires a significant amount of human involvement. It has been shown that this method

suffers from many weaknesses. Users tend to choose either very short passwords – which are easy to beak –

or long passwords that are hard to remember. In addition, they commonly choose the passwords that can be

easily guessed or they choose the ones which are hard to guess; but have problems remembering them

afterwards. Computer scientists have come up with different techniques in order to address this problem.

One of those techniques is to use images as passwords and it’s called “Graphical Passwords”. There are

different kinds of Graphical Password Techniques, classified in two categories: recognition-based and

recall-based approaches. In our survey, we conducted a research on this topic, more specifically Recognition

Based Authentication Methods with Graphical Passwords. In this paper we discussed advantages and

drawbacks of those Graphical Password Techniques. Moreover different types of applications were assessed

as well as our own application “Concept-Based”.

3.1 Recognition based techniques

In recognition-based techniques, a user is presented with a set of images and the user passes the

authentication by recognizing and identifying the images he or she selected during the registration stage.

There are many recognition based schemes. Some of them are is PassFac-es which was developed by Real

User Corporation . Another recognition-based schemeis Pass-Objects which was developed by Sobrado and

Birget. Although a recognition-based graphical password seems to be easy to remember, which increases

the usability, it is not completely secure. Also, it is obvious that recognition based systems are vulnerable to

replay attack and mouse tracking becauseof the use of a fixed image as a password.

3.2 Recall based techniques.

Recall based techniques are those which require you to reproduce the image that you selected at the time of

setting up the account ,like the biometric system or a iris scan or a das. These techniques will be discussed

later on.

8

Page 9: Report of Graphical Password

4. RECOGNITION BASED TECHNIQUES

4.1DHAMIJA PERRIG MODEL

Dhamija and Perrig proposed a graphical authentication scheme based on the HashVisualization technique .

In their system, the user is asked to select a certain number of images from a set of random pictures

generated by a program . Later, the user will be required to identify the pre selected images in order to be

authenticated. The results showed that 90% of all participants succeeded in the authentication using this

technique, while only 70% succeeded using text-based passwords and PINS. The average log-in time,

however, is longer than the traditional approach. A weakness of this system is that the server needs to store

the seeds of the portfolio images of each user in plain text. Also, the process of selecting a set of pictures

from the picture database can be tedious and time consuming for the user.

Fig. 3-Dhamija Perring scheme[4]

4.2SobradoBridget scheme

Sobrado and Birget developed a graphical password technique that deals with the shoulder-surfing problem.

In the first scheme, the system will display a number of pass-objects (pre-selected by user) among many

other objects. To be authenticated, a user needs to recognize pass-objects and click inside the convex hull

formed by all the pass-objects.In order to make the password hard to guess, Sobrado and Birget suggested

using 1000 objects, which makes the display very crowded and the objects almost indistinguishable, but

using fewer objects may lead to a smaller password space, since the resulting convex hull can be large. In

their second algorithm, a user moves a frame (and the objects within it) until the pass object on the frame

lines up with the other two pass-objects. The authors also suggest repeating the process a few more times to

minimize the likelihood of logging in by randomly clicking or rotating. The main drawback of these

algorithms is that the log in process can be slow.

9

Page 10: Report of Graphical Password

During the authentication, the user must enter the registered images in the correct sequence. One drawback

of this technique is that since the number of thumb nail images is limited to 30, the password space is small.

Each thumbnail image is assigned a numerical value, and the sequence of selection will generate a

numerical password. The result showed that the image sequence length was generally shorter than the

textural password length. To address this problem, two pictures can be combined to compose a new

alphabet element, thus expanding the image alphabet size.

Very little research has been done to study the difficulty of cracking graphical passwords. Because graphical

passwords are not widely used in practice, there is no report on real cases of breaking graphical passwords.

Here we briefly exam some of the possible techniques for breaking graphical passwords and try to do a

comparison with text-based passwords.

The main defense against brute force search is to have a sufficiently large password space. Text-based

passwords have a password space of 94^N, where N is the length of the password, 94 is the number of

Printable characters excluding SPACE. Some graphical password techniques have been shown to provide a

password space similar to or larger than that of text-based passwords. Recognition based graphical

passwords tend to have smaller password spaces than the recall based methods. It is more difficult to carry

out a brute force attack against graphical passwords than text-based passwords.

10

Page 11: Report of Graphical Password

5. RECALL BASED TECHNIQUES

5.1 DRAW A SECRET (DAS)

It is a purely graphical password selection and input scheme. The scheme replaces alphanumeric password

strings, with a picture drawn on a grid. Instead of entering an alphanumeric password, this authentication

method allows users to use a set of gestures drawn on a grid to authenticate. The user's drawing is mapped

to a grid on which the order of coordinate pairs used to draw the password are recorded in a sequence. New

coordinates are inserted to the recorded "password" sequence when the user ends one stroke (the motion of

pressing down on the screen or mouse to begin drawing followed by taking the stylus or mouse off to create

a line or shape) and begins another on the grid.In DAS, a password is a picture drawn free-form on a grid of

size N x N. Each grid cell is denoted by two-dimensional discrete coordinates (x, y) ∈ [1, N] × [1, N]. A

completed drawing, i.e., a secret, is encoded as the ordered sequence of cells that the user crosses whilst

constructing the secret.

The predominant argument in favor of graphical over alphanumeric passwords is use of the Picture

superiority effect which describes the improved performance of the human mind in recalling images and

objects over strings of text. This effect is utilized through DAS, as complex drawings are less difficult for

the human mind to memorize than a long string of alphanumeric characters. This allows for the user to input

stronger and more secure sequences through graphical password input schemes than conventional text input

with relative ease.

Fig 4-DAS on a 2d grid[4]

11

Page 12: Report of Graphical Password

6.SECURITY ISSUES

Multiple Accepted Passwords

The encoding of a particular secret has a one-to-many relationship with the possible drawings it can

represent, this implies that more than one drawing may in fact be accepted as a successful authentication of

the user. This is especially true with a small number of cells in the N x N grid.

To resolve this issue, more cells can be included in the grid. This makes it more difficult to cross through all

of the cells required to fulfill the password sequence. The cost of this added security is an increase in

difficulty to reproduce the password by the actual user. The more cells that are present in the grid, the more

accurate the user must be when entering the password to stroke through all of the required cells in the

correct order.

Graphical Dictionary Attacks

Through the use of common "hotspots" or "Points-of-interest" in a grid or background image, a graphical

dictionary attack can be initiated to guess users' passwords .Other factors such as similar shapes and objects

in the background image also form "click order" vulnerabilities as these shapes may be clumped together

and used in a sequence . These attacks are far more common to the Background variation of Draw a Secret

as it utilizes an image that can used to exploit the vulnerabilities explained above. A study in 2013   also

showed that users have the tendency to go through similar password selection processes across different

background images.

Shoulder Surfing Attacks

This form of an attack is initiated by a bystander watching the user enter their password. This attack is

present in most input schemes for authentication, but DAS schemes are especially vulnerable as the users

strokes are displayed on the screen for all to see, unlike alphanumeric text input where the characters

entered are not actually displayed on screen.

Three techniques have been designed for protecting DAS and BDAS systems from shoulder surfing attacks:

Decoy Strokes - the use of strikes which are inputted simply to confuse potential onlookers, they may be

differentiated by colors chosen by the user.

Disappearing Strokes - each stroke is removed from the screen after it is inputted by the user.

12

Page 13: Report of Graphical Password

Line Snaking - an extension of the disappearing strokes method, where shortly after a stroke is started, the

end of the stroke begins disappearing shortly after, giving the appearance of a "line snaking"

13

Page 14: Report of Graphical Password

7.CONCLUSION

The past decade has seen a growing interest in using graphical passwords as an alternative to the traditional

text-based passwords .Although the main argument for graphical passwords is that people are better at

memorizing graphical passwords than text-based passwords, the existing user studies are very limited and

there is not yet convincing evidence to support this argument. Our preliminary analysis suggests that it is

more difficult to break graphical passwords using the traditional attack methods such as brute force search,

dictionary attack,or spyware. However, since there is not yet wide deployment of graphical password

systems, the vulnerabilities of graphical passwords are still not fully understood. Overall, the current

graphical password techniques are still immature. Much more research and user studies are needed for

graphical password techniques to achieve higher levels of maturity and usefulness.

14

Page 15: Report of Graphical Password

8.REFERENCES

1. http://www.seminarsonly.com/Labels/Graphical-Password-Authentication-Advantages-and-

Disadvantages.php

2. clam.rutgers.edu/~birget/grPssw/susan3.pdf

3. Wikipedia

4. Ieee paper.

15