Secured Passward
Secured Passward
PROF. A.V.DEORANKAR
Computer Science and Engineering, Government College of Engineering, Amravati, India, [email protected]
145 | P a g e
NOVATEUR PUBLICATIONS
International Journal of Research Publications in Engineering and Technology [IJRPET]
ISSN: 2454-7875
VOLUME 3, ISSUE 3, March-2017
C. PASSPOINTS: B. Login indicator generator module:
Pass Points [19] scheme is introduced in 2005 by It generates a login indicator consisting of several
Susan Wiedenbeck et al. at that time the hand held devices distinguishable characters (such as alphabets and
have high graphical resolutions and color pictures. In this numbers) or visual materials (such as colors and icons) for
scheme the user has to click on the set of predefined pixels user during the authentication phase. One principle is to
on the predestined photo, as shown in Figure 3, with the keep the indicators secrete from the people other than the
correct sequence and within their tolerant squares during user.
the login stage. As in this scheme user has to select the C. Horizontal and vertical axis control module:
pixels by using the mouse click, the scheme is vulnerable to There are two scroll bars: a horizontal bar with a
the shoulder surfing attack. One of the advantages of the sequence of letters and a vertical bar with a sequence of
PassPoints scheme is that user can select any random numbers. This control module provides drag and scroll
image, as compared to the work done previously in this functions for users to control both bars. Users can scroll
kind of techniques. either bar using the arrows provided to shift one
alphanumeric at a time. They can also shift several checks
at a time by dragging the bar for a distance. Both the bars
are circulative.
D. Communication module:
This module is in charge of all the information
transmitted between the client devices and the
authentication server. Any communication is protected by
SSL (Secure Socket Layer) protocol and thus, is safe from
being eavesdropped and intercepted.
Fig. 3 Pixel squares selected by users in PassPoints [19]. E. Password verification module:
This module verifies the user password during the
III. PROPOSED SYSTEM: authentication phase. Pass square acts similar to a
The proposed system is based on the PassMatrix password digit in the text-based password system. The
scheme which has been recently developed by Hung-Min user is authenticated only if each pass-square in each pass-
Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and Chia-Yun Cheng image is correctly aligned with the login indicator.
in 2016. In this authentication scheme to make it shoulder F. Upload/Download module:
surfing resistant scroll bars are used and one time As the authentication system is implemented as an
password is generated. The following figure shows the authentication for the web application which provides the
components of the System. The system is proposed to be storage space to the user as the cloud service. The user is
implemented on the web. The difference in this method going to have his/her personal space over the cloud in
and the earlier proposed method is that, the login indicator which one can upload or download his/her files.
is generated once, and all the images for authentication is G. Database
displayed on a single web page. The database server contains several tables that
stores user accounts, passwords (ID numbers of pass
images and the positions of pass squares), and the time
duration each user spent on both registration phase and
login phase. Using FHE the contents in the database is
encrypted, and to efficiently check the equality the FHE
scheme done the equality check without decryption. This
module plays an important role in improving the security
in the database.
The system includes two phases, registration
phase and authentication phase. In registration phase the
Fig. 4 System Components user is allowed to select the grid layout as per his/her
choice, then the user is supposed to be selecting the pass
A. Image discretization module: image, which is used as the password in the authentication
This module divides the image into squares, from phase. Here the more complex the grid selection is, the
which user would choose one as the pass square. The more complex is the password. At the authentication
smaller the image is discretized the more the password phase, a login indicator has been generated, and given to
space is. the user through various ways, such as audio, visual or
146 | P a g e
NOVATEUR PUBLICATIONS
International Journal of Research Publications in Engineering and Technology [IJRPET]
ISSN: 2454-7875
VOLUME 3, ISSUE 3, March-2017
text. Then the user is supposed to be setting the scroll bars Protecting smartphone authentication from shoulder
to the particular known position of the password, by using surfers,” in Proceedings of the 32Nd Annual ACM
the horizontal and vertical axis control module. Conference on Human Factors in Computing Systems,
ser. CHI ’14. New York, NY, USA: ACM, 2014, pp. 2937–
IV. CONCLUSION: 2946.
We have done a survey on various authentication 11) E. von Zezschwitz, A. De Luca, and H. Hussmann,
techniques, which in result leads us to develop such “Honey, i shrunk the keys: Influences of mobile devices
graphical authentication scheme, which is very simple in on password composition and authentication
user point of view, but difficult in attacker point of view. performance,” in Proceedings of the 8th Nordic
This work is all about the proposed system which in future Conference on Human-Computer Interaction: Fun,
can be implemented as a web application. The work we Fast, Foundational, ser. NordiCHI ’14. New York, NY,
have done has been totally done by taking the ease of use USA: ACM, 2014, pp. 461–470.
priority in consideration. Graphical passwords are more 12) A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, “The
popular among non-technical users, so more research can phone lock: Audio and haptic shoulder-surfing resistant
be done in the field of graphical authentication. Graphical pin entry methods for mobile devices,” in Proceedings
authentication is best for handheld devices, but in this of the Fifth International Conference on Tangible,
work it has been shown that a simple but effective Embedded, and Embodied Interaction, ser. TEI ’11.
graphical authentication scheme can be developed for New York, NY, USA: ACM, 2011, pp. 197–200.
other platforms also, such as web applications. 13) A. Bianchi, I. Oakley, and D. S. Kwon, “The secure
haptic keypad: A tactile password system,” in
REFERENCES: Proceedings of the SIGCHI Conference on Human
1) “55% of net users use the same password for most, if Factors in Computing Systems, ser. CHI ’10. New
not all, websites. When will they learn?” York, NY, USA: ACM, 2010, pp. 1089–1092.
https://nakedsecurity.sophos.com/2013/04/23/use 14) I. Oakley and A. Bianchi, “Multi-touch passwords for
rs-same-password most-websites/ mobile device access,” in Proceedings of the 2012 ACM
2) K. Gilhooly, “Biometrics: Getting back to business,” Conference on Ubiquitous Computing, ser. UbiComp
Computerworld, May, vol. 9, 2005. ’12. New York, NY, USA: ACM, 2012, pp. 611–612.
3) S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of 15) Passfaces Corporation. The science behind Passfaces.
password authentication schemes: Current status and White paper, http://www.passfaces.com/ enterprise/
key issues,” in Methods and Models in Computer resources/white_papers.htm, accessed July 2009.
Science, 2009. ICM2CS 2009. Proceeding of 16) F. Tari, A. Ozok, and S. Holden. A comparison of
International Conference on, Dec 2009, pp. 1–7. perceived and real shoulder-surfing risks between
4) R. Dhamija and A. Perrig, “Deja vu: A user study using alphanumeric and graphical passwords.
images for authentication,” in Proceedings of the 9th 17) In 2nd ACM Symposium on Usable Privacy and
conference on USENIX Security Symposium-Volume Security (SOUPS), 2006.
9. USENIX Association, 2000, pp. 4–4. 18) D. Davis, F. Monrose, and M. Reiter. On user choice in
5) “Realuser,” http://www.realuser.com/. graphical password schemes. In 13th USENIX
6) I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Security Symposium, 2004.
Rubin, “The design and analysis of graphical 19) P. Dunphy, J. Nicholson, and P. Olivier. Securing
passwords,” in Proceedings of the 8th Passfaces for description. In 4th ACM Symposium on
7) conference on USENIX Security Symposium-Volume Usable Privacy and Security (SOUPS), July 2008.
8. USENIX Association, 1999, pp. 1–1. 20) D. Davis, F. Monrose, and M. Reiter. On user choice in
8) Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and graphical password schemes. In 13th USENIX
Chia-Yun Cheng “A Shoulder Surfing Resistant Security Symposium, 2004.
Graphical Authentication System” IEEE Transactions 21) S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N.
on Dependable and Secure Computing 2015. Memon, “Passpoints: Design and longitudinal
9) G. E. Blonder, “Graphical passwords”, in Lucent evaluation of a graphical password system,”
Technologies, Inc.,Murray Hill, NJ, U. S. Patent- International Journal of Human-Computer Studies,
5559961, Ed. United States, 1996. vol. 63, no. 1-2, pp. 102–127, 2005.
10) A. De Luca, M. Harbach, E. von Zezschwitz, M.-E.
Maurer, B. E. Slawik, H. Hussmann, and M. Smith,
“Now you see me, now you don’t:
147 | P a g e