TwoStep: An Authentication Method Combining Text and Graphical Passwords

被引:0
|
作者
van Oorschot, P. C. [1 ]
Wan, Tao [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
Graphical Passwords; User Authentication; Phishing; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords ill favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text passwords, recognition-based graphical passwords, and a two-step process, to provide increased security with fewer rounds than Such graphical passwords alone. A variation of this two-step authentication method, which we have implemented and deployed, is in use ill the real world.
引用
收藏
页码:233 / 239
页数:7
相关论文
共 50 条
  • [1] Authentication by Graphical Passwords Method 'Hope'
    Zujevs, Nikita
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99
  • [2] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [3] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [4] An Innovative User Authentication Method: Replacements of Text Based Passwords
    Shukla, Varun
    Dixit, Shivani
    Kumar, Ravi
    Patidar, Manish
    [J]. INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 : 210 - 224
  • [5] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [6] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [7] Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
    Chiasson, Sonia
    Forget, Alain
    Stobert, Elizabeth
    van Oorschot, P. C.
    Biddle, Robert
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 500 - 511
  • [8] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632
  • [9] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [10] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386