TwoStep: An Authentication Method Combining Text and Graphical Passwords

被引:0
|
作者
van Oorschot, P. C. [1 ]
Wan, Tao [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
Graphical Passwords; User Authentication; Phishing; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords ill favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text passwords, recognition-based graphical passwords, and a two-step process, to provide increased security with fewer rounds than Such graphical passwords alone. A variation of this two-step authentication method, which we have implemented and deployed, is in use ill the real world.
引用
收藏
页码:233 / 239
页数:7
相关论文
共 50 条
  • [31] Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
    Rass, Stefan
    Schuller, David
    Kollmitzer, Christian
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 166 - +
  • [32] Bend Passwords on BendyPass: A User Authentication Method for People with Vision Impairment
    Faustino, Daniella Briotto
    Girouard, Audrey
    [J]. ASSETS'18: PROCEEDINGS OF THE 20TH INTERNATIONAL ACM SIGACCESS CONFERENCE ON COMPUTERS AND ACCESSIBILITY, 2018, : 435 - 437
  • [33] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [34] Graphical passwords: Behind the attainment of goals
    Vaddeti, Ankitha
    Vidiyala, Deepthi
    Puritipati, Vineetha
    Ponnuru, Raveendra Babu
    Shin, Ji Sun
    Alavalapati, Goutham Reddy
    [J]. SECURITY AND PRIVACY, 2020, 3 (06):
  • [35] Graphical passwords based on robust discretization
    Birget, Jean-Camille
    Hong, Dawei
    Memon, Nasir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) : 395 - 399
  • [36] Balancing Usability and Security of Graphical Passwords
    Lapin, Kristina
    Siurkus, Manfredas
    [J]. DIGITAL INTERACTION AND MACHINE INTELLIGENCE, MIDI 2021, 2022, 440 : 153 - 160
  • [37] The Pattern-richness of Graphical Passwords
    Vorster, Johannes S.
    van Heerden, Renier P.
    Irwin, Barry
    [J]. 2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 69 - 76
  • [38] Graphical passwords for older computer users
    Carter, Nancy
    Li, Cheng
    Li, Qun
    Stevens, Jennifer A.
    Novak, Ed
    Qin, Zhengrui
    [J]. International Journal of Security and Networks, 2018, 13 (04) : 211 - 227
  • [39] On Coloring/Labelling Graphical Groups For Creating New Graphical Passwords
    Yao, Bing
    Sun, Hui
    Zhao, Meimei
    Li, Jingwen
    Yan, Guanghui
    Yao, Bing
    [J]. PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1371 - 1375
  • [40] Multimedia Graphical Grid Based Text Password Authentication For Advanced Users
    Agrawal, Shivani
    Ansari, Adil Zafar
    Umar, M. Sarosh
    [J]. 2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2016,