Security Evaluation for Graphical Password

被引:0
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
来源
DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I | 2011年 / 166卷
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [21] Conundrum-Pass: A New Graphical Password Approach
    Asmat, Nida
    Qasim, Hafiz Syed Ahmed
    2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 282 - 287
  • [22] Against Spyware Using CAPTCHA in Graphical Password Scheme
    Wang, Liming
    Chang, Xiuling
    Ren, Zhongjie
    Gao, Haichang
    Liu, Xiyang
    Aickelin, Uwe
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 760 - 767
  • [23] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386
  • [24] Password Recovery Using Graphical Method
    Kharudin, Wafa' Mohd
    Din, Nur Fatehah Md
    Jali, Mohd Zalisham
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 11 - 20
  • [25] Graphical Password: Prototype Usability Survey
    Eljetlawi, Ali Mohamed
    Ithnin, Norafida
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 351 - +
  • [26] Requirements for Secure Graphical Password Schemes
    Rasekgala, Mokgadi
    Ewert, Sigrid
    Sanders, Ian
    Fogwill, Thomas
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [27] A New Graphical Password Scheme Resistant to Shoulder-Surfing
    Gao, Haichang
    Ren, Zhongjie
    Chang, Xiuling
    Liu, Xiyang
    Aickelin, Uwe
    2010 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2010), 2010, : 194 - 199
  • [28] TCpC: a graphical password scheme ensuring authentication for IoT resources
    Matta P.
    Pant B.
    International Journal of Information Technology, 2020, 12 (3) : 699 - 709
  • [29] Text based Graphical Password System to Obscure Shoulder Surfing
    Irfan, Khazima
    Anas, Agha
    Malik, Sidra
    Amir, Saneeha
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 422 - 426
  • [30] LocPass: A Graphical Password Method to Prevent Shoulder-Surfing
    Por, Lip Yee
    Adebimpe, Lateef Adekunle
    Idris, Mohd Yamani Idna
    Khaw, Chee Siong
    Ku, Chin Soon
    SYMMETRY-BASEL, 2019, 11 (10):