Security Evaluation for Graphical Password

被引:0
|
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [1] Quantifying the Effect of Graphical Password Guidelines for Better Security
    Jali, Mohd
    Furnell, Steven
    Dowland, Paul
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 80 - 91
  • [2] Analysis and Evaluation of the ColorLogin Graphical Password Scheme
    Gao, Haichang
    Liu, Xiyang
    Dai, Ruyi
    Wang, Sidong
    Chang, Xiuling
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS (ICIG 2009), 2009, : 722 - 727
  • [3] METHOD OF PASSWORD SECURITY EVALUATION
    Hub, Miloslav
    Capek, Jan
    DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, : 401 - 405
  • [4] Security Analysis Method of Recognition-based Graphical Password
    Khodadadi, Touraj
    Alizadeh, Mojtaba
    Gholizadeh, Somayyeh
    Zamani, Mazdak
    Darvishi, Mahdi
    JURNAL TEKNOLOGI, 2015, 72 (05):
  • [5] Usability and security of the recall-based graphical password schemes
    Gao, Haichang
    Liu, Ning
    Li, Kaisheng
    Qiu, Jinhua
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 2237 - 2244
  • [6] PassPoints: Design and longitudinal evaluation of a graphical password system
    Wiedenbeck, S
    Waters, J
    Birget, JC
    Brodskiy, A
    Memon, N
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 102 - 127
  • [7] An evaluation of the Game Changer Password System: A new approach to password security
    McLennan, Conor T.
    Manning, Philip
    Tuft, Samantha E.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2017, 100 : 1 - 17
  • [8] Graphical One-Time Password (GOTPass): A usability evaluation
    Alsaiari, Hussain
    Papadaki, Maria
    Dowland, Paul
    Furnell, Steven
    INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 94 - 108
  • [9] An Evaluation Model for Recognition-based Graphical Password Schemes
    Nizamani, Shah Zaman
    Hassan, Syed Raheel
    Shaikh, Riaz Ahmed
    Bakhsh, Sheikh Tahir
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2019, 14 (03): : 67 - 77
  • [10] GRAPHICAL PASSWORDS IMPLIES ON TOLERANCE PASSWORD, IMAGE CHOICE, AND PUZZLE LOGIN SECURITY
    Gunaseeli, L.
    Canessane, R. Aroul
    2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,