You are on page 1of 6

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

BALLARY INSTITUTE OF TECHNOLOGY AND


MANAGEMENT, BELLARY

MISSION10X TECHNOLOGY LEARNING CENTRE

A GRAPHICAL PASSWORD AUTHENTICATION


SYSTEM

M
T

BATCH -1

I
B

PROJECT ASSOCIATES
Ashwini G S

Baakhira Sultana

Vipul Chandraker

PROJECT GUIDE
Mr, Paniramprasad
Associate Professor
Dept. of CSE

MTLC, BITM BELLARY

Page 1

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

VISION
To Design and Develop an Extremely secure Graphical Password Authentication
System using UTLK kit in Normal mode.

MISSION
To implement Graphical Password Authentication System using ARM Processor
along with GLCD, CLCD, 7-SEGMENT Display and Console in Normal mode.

OBJECTIVES
To design a graphical authentication system.
To allow the user to access accounts through image based password.

M
T

To provide secured password to the users.

I
B

To provide easily memorable password to the users.


ABSTRACT

Authentication in the computer world refers to the act of confirming the authenticity
of user's digital identity claim. It is a fundamental component in most security contexts and
provides the basis for access control and user's accountability.
While there are various types of user authentication systems, alphanumerical
username/passwords are the most common type of user authentication. Text passwords have
to satisfy the requirements like passwords have to be easily remembered by the user and have
to be hard to guess by the attacker. But the text based username and password is vulnerable to
guessing, dictionary attack, key loggers, shoulder-surfing.
To overcome some of the shortcomings of the textual passwords, graphical
objects are to be utilized. A graphical password is an authentication system that works by
having the user select from images, in a specific order, presented in a graphical user interface
(GUI). Graphical passwords may offer better security than text-based passwords because

MTLC, BITM BELLARY

Page 2

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

many people, in an attempt to memorize text-based passwords, use plain words, rather than
the recommended jumble of characters.
In this project, Graphical authentication has been

proposed as a user-friendly

alternative to password generation and authentication. In this approach the user enters the
password by clicking on a set of images followed by specific pixels of image(point of
interest). Passwords are more likely to remember and recognized if they are presented as
pictures rather than as words. Thus, graphical password presumably delivers a higher
usability compared to text-based passwords.

LITERATURE SURVEY
1. A GRAPHICAL PASSWORD AUTHENTICATION SYSTEM
Ahmad Almulhem

Graphical passwords provide a promising alternative to traditional alphanumeric


passwords. They are attractive since people usually remember pictures better than words. In

M
T

this extended abstract, we propose a simple graphical password authentication system. We


describe its operation with some examples, and highlight important aspects of the system.
2. GRAPHICAL PASSWORD
CUED CLICK POINT
Iranna A M, Pankaja Patil

AUTHENTICATION

I
B

USING

PERSUASIVE

The paper focuses on the integrated evaluation of the Persuasive Cued Click Points
graphical password authentication system, including usability and security. An important
usability goal for authentication systems is to support users in selecting better passwords, thus
increasing security by expanding the effective password space. In this paper the users are
encouraged to select more random, and hence more difficult to guess, click-points on the
image.
3. GRAPHICAL PASSWORD
Nirbhay kumar jha

This paper discuss about Graphical passwords that may offer better security than textbased passwords, because many people, in an attempt to memorize text-based passwords, use
plain words (rather than the recommended jumble of characters). In case of graphical
password, If there are 100 images on each of the 8 pages in an 8-image password, there are
1008, or 10 quadrillion (10,000,000,000,000,000), possible combinations that could form the
graphical password! If the system has a built-in delay of only 0.1 second following the
selection of each image until the presentation of the next page, it would take (on average)
millions of years to break into the system by hitting it with random image sequences.

MTLC, BITM BELLARY

Page 3

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

4. AUTHENTICATION USING GRAPHICAL PASSWORDS: BASIC RESULTS


Susan Wiedenbeck, Jean-Camille, Birget Alex Brodskiy

In this paper the Pass-Points system is discussed, A key area in security research is
authentication, the determination of whether a user should be allowed access to a given
system or resource. Traditionally, alphanumeric passwords have been used for authentication,
but they are known to have security and usability problems. Today other methods, including
graphical passwords, are possible alternatives. This paper reports on research aimed to design
a new kind of graphical password system, empirically test its usability, and compare it to
alphanumeric passwords. The significance of this research is the provision of a flexible
graphical password system with extensive human factors data to support it.
5. SECURITY ANALYSIS OF GRAPHICAL PASSWORDS OVER THE
ALPHANUMERIC PASSWORDS
G. Agarwal1, S. Singh, R.S. Shukla

M
T

This paper gives comparison between the different graphical password schemes and
the alphanumeric passwords. The passwords require the following fundamentally
requirements so that the problems with passwords arises.

I
B

(a) Passwords should be easy to remember, and the user authentication protocol
should be executable quickly and easily by humans.

(b) Passwords should be secure, i.e. they should look random and should be hard to
guess.

POTENTIAL USERS
1. Universities and Colleges
2. Banks-For ATM Usage
3. On-line Transactions
4. Smart phone Users
Brain Storming Session on potential Users
1. What are the requirements of alphanumeric password?
Alphanumerical passwords are required to satisfy two contradictory requirements.
They have to be easily remembered by a user, while they have to be hard to be guessed by
an impostor
MTLC, BITM BELLARY

Page 4

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

2. What are the problems with Text based passwords.


The main problem with the alphanumeric passwords is that once a password
has been chosen
and learned the user must be able to recall it to log in.
3. Does users forget their passwords?
But, people regularly forget their passwords. If a password is not frequently used
it will be even more susceptible to forgetting.
4. What type of passwords user selects?
The recent surveys have shown that users select short, simple passwords that are
easily guessable. Example personal names of their family members, names of pets, date
of birth etc.

5. What are the fundamental requirements of the passwords?


Passwords should be easy to remember, and the user authentication protocol

M
T

should be executable quickly and easily by humans.

Passwords should be secure, i.e. they should look random and should be hard
to guess.

I
B

6. What are Graphical Passwords?

Graphical passwords refer to using pictures (also drawings) as passwords. Graphical


passwords are easier to remember, since humans remember pictures better than words.

7. Why Graphical Passwords are needed?


Graphical Passwords are easier to recall, less likely to be written down and have the
potential to provide a richer symbol space than text based passwords.

8. How to use Graphical Passwords?


a user might authenticate by clicking a series of points on an image, selecting a series of
tiles, or by drawing a series of lines on the screen.

9. Why Graphical Passwords?


Graphical passwords have been designed to try to make passwords more memorable
and easier for people to use and, therefore, more secure. Using a graphical password,
users click on images rather than type alphanumeric characters

MTLC, BITM BELLARY

Page 5

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

10. What are different types of Graphical Passwords?


graphical passwords techniques are classified into two main categories: recognition-based
and recall based
graphical techniques

11. What is recognition-based technique?


In recognition-based techniques, a user is authenticated by challenging him/her to
identify one or more images he or she chooses during the registration stage.
12. What is recall-based technique?
In recall-based techniques, a user is asked to reproduce something that he or she
created or selected earlier during the registration stage.

13. Which method is used for the project?


This project is based on recall based Technique

M
T

I
B

MTLC, BITM BELLARY

Page 6