Security Evaluation for Graphical Password

被引:0
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
来源
DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I | 2011年 / 166卷
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [41] An Enhanced Drawing Reproduction Graphical Password Strategy
    Liu, Xi-Yang
    Gao, Hai-Chang
    Wang, Li-Ming
    Chang, Xiu-Ling
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (06) : 988 - 999
  • [42] An Enhanced Drawing Reproduction Graphical Password Strategy
    刘西洋
    高海昌
    王黎明
    常秀玲
    JournalofComputerScience&Technology, 2011, 26 (06) : 988 - 999
  • [43] A Tabular Steganography Scheme for Graphical Password Authentication
    Lin, Tsung-Hung
    Lee, Cheng-Chi
    Tsai, Chwei-Shyong
    Guo, Shin-Dong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2010, 7 (04) : 823 - 841
  • [44] A graphical password scheme strongly resistant to spyware
    Hong, DW
    Man, S
    Hawes, B
    Matthews, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 94 - 100
  • [45] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [46] An Enhanced Drawing Reproduction Graphical Password Strategy
    Xi-Yang Liu
    Hai-Chang Gao
    Li-Ming Wang
    Xiu-Ling Chang
    Journal of Computer Science and Technology, 2011, 26 : 988 - 999
  • [47] Password Security as a Game of Entropies
    Rass, Stefan
    Koenig, Sandra
    ENTROPY, 2018, 20 (05)
  • [48] A Graphical Password Scheme against Snapshot, Remote Monitoring, And Shoulder-surfing with Its Application in One-Time Password
    Qian, Chengxue
    Song, Xingwei
    Huang, Yun
    Lai, Xuejia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 608 - 615
  • [49] IMPACT OF GLOBAL SOCIAL CHANGES ON THE SECURITY OF PASSWORD AUTHENTICATION
    Hub, Miloslav
    Prihodova, Katerina
    GLOBALIZATION AND ITS SOCIO-ECONOMIC CONSEQUENCES, 2018, : 2061 - 2066
  • [50] Implementation and evaluations of graphical password using object-based image ranking
    Nguyen, Cuong Xuan
    Huang, Hung-Hsuan
    Kawagoe, Kyoji
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (04): : 285 - 295