Password Authentication Using Text and Colors
Password Authentication Using Text and Colors
Password Authentication Using Text and Colors
ABSTRACT
There are numbers of methods used for
authentication purpose; textual password is most
common one. But these passwords are susceptible to the
various attacks like glossary attack, shoulder surfing,
eves dropping. Later graphical password scheme
introduced but the graphical passwords have their own
disadvantages like they require more time to authenticate
and the usability issues. Thus we introduced a session
password scheme in which the passwords are used only
once for each session and when session is completed the
password is no longer in use. The proposed session
password scheme uses colors and text for generating
session password. Here we introduced two session
password schemes pair-based textual authentication
scheme and color code-based authentication scheme.
Keywords: Color Code-based Authentication scheme;
Pair-based Textual Authentication scheme; Session
password; shoulder surfing.
1. INTRODUCTION
Authentication is any set of rules or process that
permits one entity to institute the identity of another
entity, so authentication must be secured in order to
protect user accounts. The common method which we
used earlier is a textual password in which the passwords
which are lengthy is consider as secured password but
the lengthy passwords are difficult to remember thus the
user picks short password but short passwords are easily
cracked or hacked. The new technique is proposed which
is graphical password. This graphical password
technique overcomes the shoulder surfing problem in
textual password but this technique has also some
limitations like more time is required for authentication
and its quite expensive.
Thus
we
proposed
new
password
authentication technique which uses session password.
Two new schemes are introduced color code-based
authentication scheme and pair-based textual
authentication scheme. It gives the options for user to
select the password as a color or alphanumerical grid.
When user logins into the system new session is
generated and that session remains until user gets log
www.ijsret.org
278
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
2. PROPOSED SYSTEM
Authentication technique consists of four phases:
1. Registration phase
2. Login phase
3. Verification phase
4. Recovery phase
During registration, user rates the colors in the
first method or enters his password in the second
method. During login phase, the user has to put the
password based on the interface displayed on the screen.
The entered password verifies by the system by
comparing with content of the password generated
during registration. During recovery phase, if user
forgets his password, he may recover the password by
answering security questions which user had selected
during registration phase.
2.1. Color Code-based Authentication Scheme:
In color code-based authentication scheme users
have to get his password with the help of colors. During
registration phase, user should fill up all his information
and also rate colors as shown in figure2.1. The User
www.ijsret.org
279
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
pair has black and green colors. The black color rating is
2 and green color rating is 8. So the first letter of session
password is 2nd row and 6th column intersecting
element i.e. 1. The same method is followed for other
pairs of colors. For figure 2.2 the password is 17548.
Instead of digits, alphabets can be used. For each login,
both the number grid and the color grid get randomizes
so the session password changes for every session.
But for every user its impractical to remember the
rating of the colors so for that a second technique is
proposed in which during registration user have to
submit a simple text as a password that technique is
called as a Pair-based Textual Authentication Scheme
which we will discussed as below.
2.2. Pair-based Textual Authentication Scheme:
In this scheme, during registration user submits
his password. The maximum length of the password is 8
and it can be called as secret pass. The secret pass should
contain even number of characters. Session passwords
are created based on this secret pass. When the user
enters login an interface consisting of a grid is displayed
during the login phase. The grid is of size 6 x 6 and it
contains of alphabets and numbers. These are randomly
placed on the grid and the interface changes every time.
The grid will be appeared as shown in below
figure 2.3. Depending upon the password which is
submitted during the registration phase, user has to enter
the password. Users have to consider his password in
terms of pairs. The session password consists of
alphabets and digits. Now the user have to enter his
authentic password which is the intersection part of that
submitted password which is signify in the following
figure 2.3 Suppose we have to submit the password
during registration as a ADMIN123".
Consider the above example of submitted
password ADMIN123 in which 4 pairs are taken as a
password. The first letter in the pair is used to select the
row and the second letter is used to select the column.
The intersection letter is part of the session password.
This is repeated for all pairs of submitted password.
Figure 2.3 shows that the letter 2 is the intersection letter
of the password pair AD. Similarly the letter M is the
intersection of MI and latter K is the intersection for
pair M1and latter 7 is the intersection for pair 23.So
this 4 intersections letters make the session password so
for the pairADMIN123. The intersection letters
2MK7 is the session password.
280
3. RESULT ANALYSIS
Here we propose two authentication schemes i.e.
pair based textual authentication schemes and color code
based authentication schemes.
By studying these two techniques we get
information that according to time to login ,the pair
based textual authentication scheme is better the an color
code authentication scheme, but according to more
security e.g. If we are using this proposed system in
banking for password of account, then color code based
authentication scheme is better than pair based
authentication scheme.
Both scheme i.e. pair based textual authentication
scheme and color code based authentication scheme are
good. The following table shows comparison with
existing system.
Authenti Textu Graph Pair
Color code
cation
al
ical
based
Based
schemes
passw passw textual
authentication
&
ord
ord
authenti scheme
Paramete
cation
rs
scheme
Less
Very
Very High
Usability High
high
compli Easy
LessComplicate
Impleme Easy
cated
d
ntation
Quite
Less
Less
Password More
less
space
Brute
Should Sometim Sometime
Attacks
force,
er
e
shoulder surfing
diction surfing shoulder
ary,
,
surfing
guessi guessin
ng
g
High
Low
Moderate
Time to Low
login
Very
Low
High
Very high
Security
low
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
4. CONCLUSION
Both the techniques, the pair-based textual
authentication
scheme
and
color
code-based
authentication scheme generates session password that
are resistant to brute force attack, dictionary attack and
shoulder surfing. These techniques creates grid for
session password generation. For color code-based
scheme, rating should be given to color. According to
time to login the pair based textual authentication
scheme is better than color code based authentication
scheme. But according to more security color code based
authentication scheme is better than pair based
authentication scheme. These schemes are completely
new to the user and the proposed authentication
technique should be verified generally. This technique
can be used for external authentication to connect the
application to a database or also it can be used to provide
security to any windows application.
ACKNOWLEDGMENT
I would like to thank everyone, who ever remain
a source of help and inspiration for this presentation.
REFERENCES
[1] Priyanka S. Kedar, Vrunda Bhusari, Using PBKDF2
Pair & Hybrid technique for Authentication,
International Journal of Emerging Research in
Management & Technology (ISSN) 2278-9359,
Volume-3, Issue-5, May 2014.
[2] M Shashi, M Anirudh, MD Sultan Ahamer, V
Manoj Kumar, Authentication Schemes for Session
Password using colors and Images, International
Journal of Network Security & Its Applications (IJNSA),
Vol.3, No.3, May 2011.
[3] Priti Jadhao, Lalit Dole, Survey on Authentication
Password Techniques, International Journal of Soft
Computing and Engineering (IJSCE) ISSN: 2231-2307,
Volume-3, Issue-2, May 2013.
[4] Z. Zheng, X. Liu, L. Yin, Z. Liu A Hybrid
password authentication scheme based on shape and
text, Journal of Computers, vol.5, no.5 May 2010.
[5] D.Aruna Kumari, Design, Implementation of
Network Based Authentication Mechanisms, Advances
in Information Technology and Management, vol.1,
no.2, pp.44-48, 2012.
[6] H. Zhao and X. Li, "S3PAS: A Scalable ShoulderSurfing
Resistant
Textual-Graphical
Password
Authentication Scheme," in 21st International
Conference on Advanced Information Networking and
Applications Workshops (AINAW 07), vol. 2. Canada,
2007, pp. 467-472.
[7] M Sreelatha, M Shashi, M Anirudh, MD Sultan
Ahamer, V Manoj Kumar Authentication Schemes for
www.ijsret.org
281