Secure User Authentication with Graphical Passwords and PassText

被引:0
|
作者
Mohd, Raj Mohammed [1 ]
Bindu, C. Shoba [2 ]
Vasumathi, D. [3 ]
机构
[1] GITAM Hyderabad, Hyderabad, Telangana, India
[2] JNTUCE Anantapuramu, Anantapuramu, Andhra Pradesh, India
[3] JNTUH CE, Hyderabad, Telangana, India
关键词
Authentication; Mobile host; Web services; Passtext and graphical passwords; Scyther tool;
D O I
10.1007/978-981-10-2471-9_51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the users access the Internet or web services by means of smart phones, which are capable of handling all kinds of computations. There is a necessity to provide mutual authentication among the clients (Mobile Hosts) and servers. In general, users authenticated to system or website by means of User ID and Password, a claim for user's identity. Passwords have their own vulnerabilities such as dictionary, brute-force, guessing, observation and spyware attacks etc. Users are the weakest link in any secure system because, they choose simple, short and easy to remember passwords. we proposes a strong password generation algorithm with help of PassText and Graphical Password concepts. PassText Password concept is used to generate a unique strong password with help of password images (graphical password). User need to remember only the password images instead of text. This paper analyzes the security issues with help of scyther tool.
引用
收藏
页码:523 / 533
页数:11
相关论文
共 50 条
  • [1] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [2] Secure network authentication with PassText
    Yampolskiy, Roman V.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 831 - 836
  • [3] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [4] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [5] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [6] Authentication by Graphical Passwords Method 'Hope'
    Zujevs, Nikita
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99
  • [7] GENERATION OF SECURE PASSWORDS BY THE USER
    PILLER, E
    [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 518 - 524
  • [8] Graphical Passwords: Requisite for Secure Information Systems
    Abbasi, Kashif
    Zin, Abdullah Mohd
    Mokhtar, Mohd Rosmadi
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
  • [9] Provably secure RSA-based remote user authentication protocol using passwords
    Wang, Ding
    Wang, Ping
    Li, Zeng-Peng
    Ma, Chun-Guang
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01): : 191 - 204
  • [10] Investigating the Viability of Multifactor Graphical Passwords for User Authentication (vol 23, pg 10, 2014)
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 251 - 251