Professional Documents
Culture Documents
Volume 1, Special Issue, March 2015. Impact Factor: 1.036, Science Central Value: 26.54
ABSTRACT
Textual passwords generally are used for
authentication. Graphical password is
introduced opposite techniques to textual
passwords. As most users are more
familiarized with textual passwords than
pure graphical passwords. Shoulder-surfing
is a known risk where an attacker can
capture a password by direct show or by
listening the authentication session. Text can
be combined with alphabet, digit, images or
colors to generate session passwords for
authentication. Session password can use
only once time because every time a new
password is generate. Session Password is
support graphical password schemes and
Pair based scheme is both secure and
efficient. In this paper, we propose an
improved text-based shoulder surfing
resistant graphical password scheme by
using graphical and pair based scheme is
used for alphabet, digit or symbols The user
can easily and efficiently login system.
Proposed system we analyze the security and
usability of the proposed scheme, and show
the support of the scheme to shoulder
surfing and accidental login.
Keywords: - Secret Pass Key, Shoulder
Surfing, Brute Force Attack, Guessing,
Dictionary attacks, Graphical Scheme, Pair
Based scheme, Session password.
I. INTRODUCTION
The Shoulder surfing attacks can perform by
password over a shoulder at the time of user
entering password. Graphical passwords are
1 | 2015, IJAFRSE and JCON 2015 All Rights
Reserved
www.ijafrse.org
www.ijafr
III. DEFINITION
A] Dictionary Attack
A Dictionary Attacks is a technique for defeating
a cipher or authentication mechanism by trying
to determine its decryption key. It is a method of
breaking into a password protected system by
systematically entering every word in a
dictionary as password.
B] Shoulder Surfing Attack
Shoulder Surfing Attack is a password are
identified by looking over a persons shoulder.
Both text and graphical password are
vulnerable.
C] Brute Force Attack
Brute Force Attack can
combination of password.
produce
every
[D] Guessing
It seems that graphical passwords are often
predictable, a serious problem typically
associated with text-based password.
a) Even Method
b) Odd Method
1] Graphical Authentication scheme:
We will make Graphical User Interface circle and
circle is dividing in 8 equal parts, each part is
called as sector. Circle consists of 8 sectors
having 8 arcs, each arc has different color assign
and user color can be select at the time of
registration.
We will describe a simple and efficient shoulder
surfing support graphical password scheme
based on alphabets, digits, special symbol and
color. The alphabet used in the propose scheme
contains 64 characters, including 10 decimal
digits, 26 upper case letters, 26 lower case
letters, and any two symbols are used like . and
/. Graphical scheme is perform in 3 phases, the
registration phase, login Phase, verification
phase which can be described as in the
following.
www.ijafrse.org
B. Login phase:
www.ijafrse.org
Step 3:
The user has to rotate the sector containing the
ith pass-character of his password K, denoted by
Ki, into his pass-color sector, and then clicks the
Confirm button. Let i = i + 1.
Step 4:
If i< L, the system randomly permutes all the 64
characters displayed, and then GOTOs Step 3.
Then the user has to click the Login button to
complete the login process.
C. Verification Phase:
After successfully registration of new user then
this user can login process to entering User ID
and password and this password is correct or
not then perform by verification scheme.
2] Pair Based Scheme:
At the time of registration user can submits
password. Minimum length of the password is 8
and it can be called as secret key. The secret
passkey consists of either even or odd number of
www.ijafrse.org
www.ijafrse.org
VI. ADVANTAGES
A. Easy to register
In this system new user register. Then new user
can register such as fill the data such as
username, E-mail address, birth date, gender,
local address, city, mobile number, password,
first name, last name etc.
B. More secure
Textual password scheme are when any user is
enter the password then this password seen by
other persons. In textual password scheme
passwords should be easy to remember and the
easy to cracked. But in graphical and pair-based
scheme password guessing is not easily done. So
it is more secure.
C. Easy To Use
This system is very easy to use because new user
can register and use this method.
D. Very Difficult To Hack
Very little research has been done to study the
difficulty of cracking graphical passwords.
Because graphical passwords are not widely
used in practice, there is no report on real cases
of breaking graphical passwords. Passwords
should be secure, i.e., they should look random
and should be hard to guess, they should be
changed frequently the password, also we avoid
many dictionary attack and this methods are
7 | 2015, IJAFRSE and JCON 2015 All Rights
Reserved
difficult to hack.
VII. APPLICATION
1. In mobile pattern lock, we use this system is
more secure.
2. In Military we use to secure confidential data.
3. In Companies store secret data and all
important information with maximum
security.
VIII. CONCLUSION
We have concluded that to avoiding shoulder
surfing, brute force and dictionary attacks by
using this scheme. We have proposed a simple
text-based shoulder surfing support graphical
password, in which the user can efficiently,
easily complete the login process without
attacks. The operation of the proposed scheme is
very simple, easy to learn and easy to use for
users familiarized with textual passwords. The
user can easily or efficiently to login the system
without using any physical keyboard. We have
analyzed the supporting the proposed scheme to
shoulder surfing.
IX. REFERENCES
[1]
[2]
www.ijafrse.org
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
www.ijafrse.org