Graphical Password Authentication
Graphical Password Authentication
ABSTRACT
1
Seminar Report
INTRODUCTION
Human factors are often considered the weakest link in a computer security
system. Point out that there are three major areas where human-computer interaction is
important: authentication, security operations, and developing secure systems. Here we
focus on the authentication problem. On the other hand, passwords that are hard to guess
or break are often hard to remember. Studies showed that since user can only remember a
limited number of passwords, they tend to write them down or will use the same
passwords for different accounts. To address the problems with traditional username-
password authentication, alternative authentication methods, such as biometrics, have
been used. In this paper, however, we will focus on another alternative: using pictures as
passwords.
2
Seminar Report
Token based techniques, such as key cards, bank cards and smart cards are
widely used. Many token-based authentication systems also use knowledge based
techniques to enhance security. For example, ATM cards are generally used together with
a PIN number.
Knowledge based techniques are the most widely used authentication techniques
and include both text-based and picture-based passwords. The picture-based techniques
can be further divided into two categories: recognition-based and recall-based graphical
techniques. Using recognition-based techniques, a user is presented with a set of images
and the user passes the authentication by recognizing and identifying the images he or she
selected during the registration stage. Using recall-based techniques, a user is asked to
reproduce something that he or she created or selected earlier during the registration
stage.
3
Seminar Report
Sobrado and Birget developed a graphical password technique that deals with the
shoulder-surfing problem. In the first scheme, the system will display a number of pass-
objects (pre-selected by user) among many other objects. To be authenticated, a user
needs to recognize pass-objects and click inside the convex hull formed by all the pass-
objects.In order to make the password hard to guess, Sobrado and Birget suggested using
1000 objects, which makes the display very crowded and the objects almost
indistinguishable, but using fewer objects may lead to a smaller password space, since the
resulting convex hull can be large. In their second algorithm, a user moves a frame (and
the objects within it) until the pass object on the frame lines up with the other two pass-
objects. The authors also suggest repeating the process a few more times to minimize the
4
Seminar Report
5
Seminar Report
Reproduce a drawing:
6
Seminar Report
RECALL BASED
7
Seminar Report
may contain hundreds to thousands of memorable points, the possible password space is
quite large.
8
Seminar Report
9
Seminar Report
It is more difficult to carry out a brute force attack against graphical passwords
than text-based passwords. The attack programs need to automatically generate accurate
mouse motion to imitate human input, which is particularly difficult for recall based
graphical passwords. Overall, we believe a graphical password is less vulnerable to brute
force attacks than a text-based password.
Dictionary attacks
Since recognition based graphical passwords involve mouse input instead of
keyboard input, it will be impractical to carry out dictionary attacks against this type of
graphical passwords. For some recall based graphical passwords it is possible to use a
dictionary attack but an automated dictionary attack will be much more complex than a
text based dictionary attack. More research is needed in this area. Overall, we believe
graphical passwords are less vulnerable to dictionary attacks than text-based passwords.
10
Seminar Report
Guessing
Shoulder surfing
Like text based passwords, most of the graphical passwords are vulnerable to
shoulder surfing. At this point, only a few recognition-based techniques are designed to
resist shoulder-surfing. None of the recall-based based techniques are considered should-
surfing resistant.
11
Seminar Report
Usability
One of the main arguments for graphical passwords is that pictures are easier to
remember than text strings. Preliminary user studies presented in some research papers
seem to support this. However, current user studies are still very limited, involving only a
small number of users. We still do not have convincing evidence demonstrating that
graphical passwords are easier to remember than text based passwords.
A major complaint among the users of graphical passwords is that the password
registration and log-in process take too long, especially in recognition-based approaches.
For example, during the registration stage, a user has to pick images from a large set of
selections. During authentication stage, a user has to scan many images to identify a few
pass-images.
Users may find this process long and tedious. Because of this and also because
most users are not familiar with the graphical passwords, they often find graphical
passwords less convenient than text based passwords.
Reliability
The major design issue for recall-based methods is the reliability and accuracy of
user input recognition. In this type of method, the error tolerances have to be set carefully
– overly high tolerances may lead to many false positives while overly low tolerances
may lead to many false negatives. In addition, the more error tolerant the program, the
more vulnerable it is to attacks.
12
Seminar Report
Graphical passwords require much more storage space than text based passwords.
Tens of thousands of pictures may have to be maintained in a centralized database.
Network transfer delay is also a concern for graphical passwords, especially for
recognition-based techniques in which a large number of pictures may need to be
displayed for each round of verification.
13
Seminar Report
CONCLUSION
The past decade has seen a growing interest in using graphical passwords as an
alternative to the traditional text-based passwords. In this paper, we have conducted a
comprehensive survey of existing graphical password techniques. The current graphical
password techniques can be classified into two categories: recognition-based and recall-
based techniques..
Although the main argument for graphical passwords is that people are better at
memorizing graphical passwords than text-based passwords, the existing user studies are
very limited and there is not yet convincing evidence to support this argument. Our
preliminary analysis suggests that it is more difficult to break graphical passwords using
the traditional attack methods such as brute force search, dictionary attack, or spyware.
However, since there is not yet wide deployment of graphical password systems, the
vulnerabilities of graphical passwords are still not fully understood.
Overall, the current graphical password techniques are still immature. Much more
research and user studies are needed for graphical password techniques to achieve higher
levels of maturity and usefulness.
14
Seminar Report
REFERENCES
[1] S. Patrick, A. C. Long, and S. Flinn, "HCI and Security Systems," presented at
CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA. 2003.
[2] A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise
computer security mechanisms and how to take remedial measures,"
Communications of the ACM, vol. 42, pp. 41-46, 1999.
[3] K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09,
2000.
15