Security Evaluation for Graphical Password

被引:0
|
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [21] Analysis and design of graphical password techniques
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, G. Scott
    ADVANCES IN VISUAL COMPUTING, PT 2, 2006, 4292 : 741 - +
  • [22] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386
  • [23] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [24] HapticPoints: The Extended PassPoints Graphical Password
    Ratchasan, Trust
    Wiangsripanawan, Rungrat
    INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 16 - 28
  • [25] On user choice in graphical password schemes
    Davis, D
    Monrose, F
    Reiter, MK
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 151 - 163
  • [26] Password Recovery Using Graphical Method
    Kharudin, Wafa' Mohd
    Din, Nur Fatehah Md
    Jali, Mohd Zalisham
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 11 - 20
  • [27] Graphical Password: Prototype Usability Survey
    Eljetlawi, Ali Mohamed
    Ithnin, Norafida
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 351 - +
  • [28] Graphical Password Using an Intuitive Approach
    Mahey, Rajat
    Singh, Nimish
    Kumar, Chandan
    Bhagwat, Nitin
    Verma, Poonam
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 153 - 161
  • [29] Requirements for Secure Graphical Password Schemes
    Rasekgala, Mokgadi
    Ewert, Sigrid
    Sanders, Ian
    Fogwill, Thomas
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [30] A free drawing graphical password scheme
    Lin, Alice J.
    Cheng, Fuhua
    Computer-Aided Design and Applications, 2009, 6 (04): : 553 - 561