Security Evaluation for Graphical Password

被引:0
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
来源
DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I | 2011年 / 166卷
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [1] Usability and security of the recall-based graphical password schemes
    Gao, Haichang
    Liu, Ning
    Li, Kaisheng
    Qiu, Jinhua
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 2237 - 2244
  • [2] METHOD OF PASSWORD SECURITY EVALUATION
    Hub, Miloslav
    Capek, Jan
    DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, : 401 - 405
  • [3] Quantifying the Effect of Graphical Password Guidelines for Better Security
    Jali, Mohd
    Furnell, Steven
    Dowland, Paul
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 80 - 91
  • [4] Security Analysis Method of Recognition-based Graphical Password
    Khodadadi, Touraj
    Alizadeh, Mojtaba
    Gholizadeh, Somayyeh
    Zamani, Mazdak
    Darvishi, Mahdi
    JURNAL TEKNOLOGI, 2015, 72 (05):
  • [5] The Shoulder Surfing Resistant Graphical Password Authentication Technique
    Gokhale, Aakansha S.
    Waghmare, Vijaya S.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 490 - 498
  • [6] PassPoints: Design and longitudinal evaluation of a graphical password system
    Wiedenbeck, S
    Waters, J
    Birget, JC
    Brodskiy, A
    Memon, N
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 102 - 127
  • [7] Authentication using Alignment of the Graphical Password
    Shenoy, Manjula
    Supriya, A.
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [8] Graphical Password Using an Intuitive Approach
    Mahey, Rajat
    Singh, Nimish
    Kumar, Chandan
    Bhagwat, Nitin
    Verma, Poonam
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 153 - 161
  • [9] A free drawing graphical password scheme
    Lin, Alice J.
    Cheng, Fuhua
    Computer-Aided Design and Applications, 2009, 6 (04): : 553 - 561
  • [10] Can I Guess Your Password? Examining Security Aspects of Graphical Passwords
    Alsubait, Tahani
    Alabdullatif, Raghad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 258 - 262