A remote user authentication scheme using strong graphical passwords

被引:0
|
作者
Ku, WC [1 ]
Tsaur, MJ [1 ]
机构
[1] Fu Jen Catholic Univ, Dept Comp Sci & Informat Engn, Taipei 242, Taiwan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional remote user strong-password authentication schemes have the common drawback that the user has to mentorize a hard-to-remember textual password, and therefore their applications are restricted. To solve this problem, we propose a remote user authentication scheme using strong graphical passwords in this paper. As graphical passwords are easy to remember for the user and conventionally dictionary attacks on graphical passwords are infeasible, the practicability of the proposed scheme is improved. Next, we show that the proposed scheme can withstand the replay attack, the password-file compromise attack, the denial-of-service attack, the predictable n attack, and the insider attack. In particular, the proposed scheme is easily reparable.
引用
收藏
页码:351 / 355
页数:5
相关论文
共 50 条
  • [1] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [2] Strong Remote User Authentication Scheme using Smart Cards
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    Pomykala, Jacek
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 199 - 208
  • [3] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [4] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [5] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [6] A New Remote User Authentication Scheme based on Graphical Password using Smart Card
    Baruah, Khanjan Ch.
    Banerjee, Subhasish
    Dutta, Manash P.
    Bhunia, Chandan T.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 251 - 258
  • [7] A Hybrid Graphical User Authentication Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    [J]. 2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415
  • [8] Wireless Authentication using Remote Passwords
    Harding, Andrew
    van der Horst, Timothy W.
    Seamons, Kent E.
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 24 - 29
  • [9] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [10] Provably secure RSA-based remote user authentication protocol using passwords
    Wang, Ding
    Wang, Ping
    Li, Zeng-Peng
    Ma, Chun-Guang
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01): : 191 - 204