Security Evaluation for Graphical Password

被引:0
|
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [41] On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
    Mayer, Peter
    Schwartz, Christian
    Volkamer, Melanie
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 733 - 748
  • [42] An Enhanced Drawing Reproduction Graphical Password Strategy
    Liu, Xi-Yang
    Gao, Hai-Chang
    Wang, Li-Ming
    Chang, Xiu-Ling
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (06) : 988 - 999
  • [43] My Personal Images as My Graphical Password
    Sosa-Valles, P. A.
    Villalobos-Serrano, J. G.
    Velarde-Alvarado, P.
    Garcia, V.
    Parra-Michel, J. R.
    Mena, L.
    Martinez-Pelaez, R.
    IEEE LATIN AMERICA TRANSACTIONS, 2018, 16 (05) : 1516 - 1523
  • [44] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    International Journal of Information Security, 2011, 10 : 321 - 336
  • [45] An Enhanced Drawing Reproduction Graphical Password Strategy
    刘西洋
    高海昌
    王黎明
    常秀玲
    Journal of Computer Science & Technology, 2011, 26 (06) : 988 - 999
  • [46] Heuristic Attacks Against Graphical Password Generators
    Peach, S.
    Vorster, J.
    van Heerden, R.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 272 - 284
  • [47] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [48] YAGP: Yet Another Graphical Password Strategy
    Gao, Haichang
    Guo, Xuewu
    Chen, Xiaoping
    Wang, Liming
    Liu, Xiyang
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 121 - 129
  • [49] A graphical password scheme strongly resistant to spyware
    Hong, DW
    Man, S
    Hawes, B
    Matthews, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 94 - 100
  • [50] A Tabular Steganography Scheme for Graphical Password Authentication
    Lin, Tsung-Hung
    Lee, Cheng-Chi
    Tsai, Chwei-Shyong
    Guo, Shin-Dong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2010, 7 (04) : 823 - 841