Volume -II , Issue -III, February 2016

COMPARATIVE STUDY ABOUT PASSWORD AUTHENTICATION SCHEMES FOR DATA SECURITY

Author(s) :

Uday Gobbur , Suhas Raut

Abstract

Textual passwords are the most common methods used for authentication. But textual Passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, To start with user login with permanent password and then text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.

Keywords

Authentication, session passwords, Circular password scheme

References
  1. Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
  2. Real User Corporation: Passfaces. www.passfaces.com
  3. G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  4. R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.
  5. W. Jansen, "Authenticating Users on Handheld Devices “in Proceedings of Canadian Information Technology Security Symposium, 2003.
  6. Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing
  7. W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
  8. Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
  9. Passlogix, site http://www.passlogix.com.
  10. A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-
  11. S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, “Design and longitudinal evaluation of a graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.
How to Cite this Paper? [APA Style]
Uday Gobbur , Suhas Raut, (2016), COMPARATIVE STUDY ABOUT PASSWORD AUTHENTICATION SCHEMES FOR DATA SECURITY, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=90&vid=15, (February, 2016)
Full Text in PDF

Full Article in PDF Format

Comment on this article...!!!

 
 
 
Previous Comments...
No previous comments.

Archive

Alert Me...!!!

When new article publish, article link will mail to your mail...

Enter Your Name :
Enter Your Email ID :

For Authors

For Readers