You are on page 1of 9

ABSTRACT

As the globe is growing so fast it is to guess; they should be changed


necessary that we have to be secure. The frequently, and should be different on
modern world is highly computerized and different accounts of the same user. They
hence forth we have to move on with it. In should not be written down or stored in
order to increase the security usually the plain text.
password technique is used. The commonly Here we discuss graphical passwords, which
used password is of the type text. Still there are consist of some actions that the user performs
so many disadvantages in it. on an image. Such passwords are easier to
Here we present to you a new password remember, but are vulnerable to shoulder
technique of the type Graphical which deals surfing. We present a few graphical password
with authentication through image. The schemes that offer resistance to shoulder
graphical data represents billions of bytes of surfing.
information and thus provide lot of password
Text Password
space. Thus graphical password provides a way
Alpha-numeric passwords were first
of making more human friendly passwords
introduced in the 1960s as a solution to security
while increasing the level of security.
issues that became evident as the first multi-
Introduction user operating systems were being developed.
Passwords are the most commonly used As the name indicates, an alpha-numeric
method for identifying users in computer and password is simply a string of letters and digits.
communication systems. Typically, passwords Although almost any string can serve as a
are strings of letters and digits, i.e., they are password, these passwords only offer good
alpha-numeric. Such passwords have the security as long as they are complicated
disadvantage of being hard to remember. The enough so that they cannot be deduced or
passwords are expected to comply with two guessed. Commonly used guidelines for alpha-
conflicting requirements: numeric passwords are:
 Passwords should be easy to remember,  The password should be at least 8
and the user authentication protocol characters long.
should be executable quickly and easily  The password should not be easy to
by humans. relate to the user (e.g., last name, birth
 Passwords should be secure, i.e., they date).
should look random and should be hard
 The password should not be a word that strings, for example, choosing the name of a
can be found in a dictionary or public relative/friend as password, keeping the same
directory. password for all accounts and services, noting
 Ideally, the user should combine upper down passwords in a diary and the like.
and lower case letters and digits. The top 20 passwords are (in order):
Since the best password would be a completely password1, abc123, myspace1, password,
random one, people have devised ways to blink182, qwerty1, creative, 123abc, baseball1,
create pseudo-random passwords. One such football1, 123456, soccer, monkey1,
method is to take a common word and perform liverpool1, princess1, jordan23, slipknot1,
certain actions on it. superman1, iloveyou1 and monkey. The most

Using the word Creative as an example, users common password, “password1,” was used in

often create passwords such as 0.22 percent of all accounts. The frequency
drops off pretty fast after that: “abc123″ and
 CrEaTiVe (by alternating upper and
“myspace1″ were only used in 0.11 percent of
lower case),
all accounts, “soccer” in 0.04 percent and
 eViTaErC (by reversing the string), “monkey” in 0.02 percent.
 aCEriTVe(by shuffling the string), Another drawback of alpha-numeric
 3a8tive (combining numbers and password is the dictionary attack. Because of
letters). the difficulty in remembering random strings of

However, the better the password is, the harder characters, most users tend to choose a

it is to remember. common word, or a name. Unfortunately, there


are several tools that allow an individual to
crack passwords by automatically testing all
Pitfalls of Text Password
the words that occur in dictionaries or public
We use passwords for opening our e- directories. This attack will usually not uncover
mail box, withdrawing money from an ATM, the password of a predetermined user; but
accessing our web-based e-mail account, studies have shown that this attack is usually
getting into our office Intranet, logging-in to successful in finding valid passwords of some
our favourite web sites, etc. When the mind is users of a given system.
already flooded with hundreds of tasks,
remembering these passwords is a laborious
and unnecessary job. To lighten this burden,
most of us take recourse to some small tricks
such as selecting easily recallable password
Graphical password a map of the world), the city of Nice (from a
The idea of graphical passwords, first map of France), a white stucco house with
described by Greg Blonder [G. Blonder, arched doorways and red tiles on the roof, a
Graphical Passwords, United States Patent green plastic cooler with a white lid, a package
(1996)], is to let the user click (with a mouse or of Gouda cheese, a bottle of grape juice, and a
a stylus) on a few chosen regions in an image pink paper cup with little green stars around its
that appears on the screen. Because human upper edge and three red bands around the
beings live and interact in an environment middle.
where the sense of sight is predominant for Graphical passwords may offer better
most activities, our brains are capable of security than text-based passwords because
processing and storing large amounts of many people, in an attempt to memorize text-
graphical information with ease. While we may based passwords, use plain words (rather than
find it very hard to remember a string of fifty the recommended jumble of characters). A
characters, we are able easily to remember dictionary search can often hit on a password
faces of people, places we visited, and things and allow a hacker to gain entry into a system
we have seen. These graphical data represent in seconds. But if a series of selectable images
millions of bytes of information and thus is used on successive screen pages, and if there
provide large password spaces. A graphical are many images on each page, a hacker must
password is an authentication system that try every possible combination at random. If
works by having the user select from images, there are 100 images on each of the 8 pages in
in a specific order, presented in a graphical an 8-image password, there are 1008, or 10
user interface (GUI). For this reason, the quadrillion, possible combinations that could
graphical-password approach is sometimes form the graphical password! If the system has
called graphical user authentication (GUA). a built-in delay of only 0.1 second following
the selection of each image until the
Advantages of Graphical Password presentation of the next page, it would take
A graphical password is easier than a millions of years to break into the system by
text-based password for most people to hitting it with random image sequences.
remember. Suppose an 8-character password is
necessary to gain entry into a particular A simple graphical password scheme
computer network. Instead of w8KiJ72c, for This example, while very
example, a user might select images of the unsophisticated, illustrates how a simple
earth (from among a screen full of real and graphical password matches the security of its
fictitious planets), the country of France (from alpha-numeric counterparts. To login, the user
is required to click within the 4 circled red Due to this vulnerability to shoulder
regions in this picture. The user chose these surfing, it would appear that graphical
regions when he or she created the password. passwords could never be used in environments
The choice for the four regions is arbitrary, but where view of the screen is not exclusive to the
the user will pick places that he or she finds person logging in. However, we have found
easy to remember. The user can introduce his that by applying the concept of challenge
own pictures for creating graphical passwords. response it is possible to create schemes that
Also, for stronger security, more than four counter the shoulder surfing problem.
click points could be chosen.
The shoulder surfing problem
As the name implies, shoulder surfing
is watching over people's shoulders as they
process information. Examples include
observing the keyboard as a person types his or
her password, enters a PIN number, or views
personal information. Because of their graphic
nature, nearly all graphical password schemes
are quite vulnerable to shoulder surfing. Most
of the existing schemes simply circumvent the
problem by stating that graphical passwords
should only be used with handheld devices or
workstations set up in such a way that only one
person can see the screen at the time of login.
While it is usually possible to ensure
that there are no people looking over one's
shoulder at the time of login, the value of
Perhaps the biggest drawback for graphical passwords as an alternative to alpha-
current graphical passwords is the shoulder numeric passwords diminishes somewhat if
surfing problem. Although graphical passwords they can only be used in environments set up to
are hard to guess, a person who gets to observe prevent shoulder surfing. To resolve this here
a few login sessions could, depending on the we introduce three schemes
scheme, eventually figure out the password.
The above example reveals the password to  Challenge response authentication
anybody watching the login session.  Triangle scheme
 Movable frame scheme Adapting challenge response to graphical
passwords
Challenge response authentication The challenge response authentication
Challenge response authentication that we just described is not intended to be
enables an entity (B) to prove to an entity (A) used directly by humans to authenticate
that (B) knows a secret shared by both (A) and themselves to a system, because it requires
(B). However, this proof of knowledge is done many calculations to evaluate an alpha-numeric
in such a way that the actual secret is not one-way function for some random value.
revealed to any third party who may be However, we can use the human ability to
listening in. process graphical information. The goal is to
create a graphical one-way function that will
Typical challenge response session
User (B) sends a login request to
server (A), which in turn sends back a random
number r. The challenge for the user is to
evaluate f(n+r). The user's identity is accepted
if the last message received from (A)
corresponds to f(n+r). A user who knows n
can easily compute f(n+r). On the other hand,
prevent an adversary from obtaining the secret
an eavesdropper who captures r and f(n+r)
even if he or she has full view of the value of
cannot deduce n in a realistic amount of time.
the graphic one-way function.
In addition, the use of a random number r
prevents the reuse of previously recorded
sessions.

As the figure illustrates, all the adversary


would see is r and r. And although f is publicly
available, the secret n is required to solve the
next random challenge. However, unlike
typical challenge response, the secret n is not
alpha-numeric but rather a geometric pattern
n is the secret shared by A and B.
used to evaluate r. Similarly, r and r are
f is a public one-way function.
graphical. The evaluation of f(n+r) is done
without any computation and can be easily
performed by a user in a reasonable amount of
time. Instead of sending a random number for
each challenge, we can obtain the same
functionality by performing certain random
operations on an image (e.g., rotation, changes
in position, perspective and shading).

Triangle scheme
The system randomly scatters a set of N
objects on the screen. In practice, the number N
could be a few hundred or a few thousand, and
the objects should be different enough so that
the user can distinguish them. In addition, there The number of possible passwords is
is a subset of K pass-objects previously chosen the "binomial coefficient" (choose any K
and memorized by the user. At login the objects among N). When N = 1000 and K = 10,
system will randomly choose a placement of the number of possible passwords is hence
the N objects. However, the system first approximately 2.6 * 1023. This is a little more
randomly chooses a patch that covers half the than the number of alpha-numeric passwords of
screen, and randomly places the K chosen length 15 (3615 2.2 * 1023 ). Having N =
objects in that patch. To login, the user must 1000 objects is not unreasonable (compare with
find 3 of the pass-objects and click inside the the "Where is Waldo" puzzles, where there are
invisible triangle created by those 3 objects. typically tens of thousands of little persons in a
This is equivalent to saying that the user must picture). Moreover, one can expect a user to
click inside the convex hull of the pass-objects choose the K objects fairly randomly; or, at
that are displayed. In addition, for each login least, an attacker (especially a computerized
this challenge is repeated a few times using a attacker) cannot predict much about which K
different display of some of the N objects. objects a user will choose. On the other hand,
Therefore, the probability of randomly clicking the large number of possible alpha-numeric
in the correct region in each challenge is very passwords (3615 2.2 * 1023) is an illusion:
low. users do not choose alpha-numeric passwords
randomly at all.

After an attacker sees one click on the


screen from the user, the attacker learns that
the K pass-objects are such that their convex them is placed in a movable frame as depicted
hull contains the click point. This rules out all below. Which pass-object is displayed within
the K-tuples that do not have the click point in the frame is completely arbitrary.
their convex hull. However, when N = 100 and
K = 10, the set of ruled-out K-tuples is atleast The task of the user is to move the frame (and
> 2 * 1020, which is much too large to be the objects within it, like a tape) by dragging
remembered in any computer memory the mouse around the frame until the pass
(compare e.g., with the Avogadro number NA object on the frame lines up with the other two
6 * 1023 atom/mole) Hence the attacker can pass-objects. As before, this procedure is
only remember a negligible amount of what he repeated a few more times to minimize the
learns in each shoulder surfing observation. As likelihood of logging in by randomly moving
a consequence, the attacker cannot accumulate the frame.
knowledge of the user's password. This shows
that an exhaustive-search attack is physically Facepass
infeasible; moreover, when passwords are Another scheme of graphical passwords
chosen truly randomly, exhaustive-search is the Pass face which has been advertised all
attacks are the only possible attacks. around the globe through various media. All of
An improved version of this system us have an innate capability to instantaneously
would display only objects (N / 2 N) among recognize pictures. If we were shown an old
which are pass-objects (with 3 K). This group-photograph and asked to identify a
simplifies the login of the user, while making person whose face we already know, most of
attacks harder. us would point our finger at the correct face. It
is widely accepted that people have a
Movable frame scheme remarkable ability to recognize human faces.
Using the same ideas and assumptions
as in the previous scheme, the user must now Pass faces is a unique authentication

locate 3 out of K pass-objects. This time system offering easy and secure logon. It is a

however, graphic

only 3 pass- verification

objects are technology

displayed at that uses

any given faces rather

time and than everyday

only one of images. This


patented approach, cognometrics, takes There are other types of passwords such
advantage of the brain's innate ability to as biometrics and eye password. An eye
recognize and recall faces. And since we password requires your physical presence
"never forget a face", password resets are before the eye detector. Moreover the cost of
virtually eliminated the eye detector is on the higher side. So
practically it is not possible for all kind of users
to authenticate through eye passwords. But
comparatively Graphical passwords is of no
cost which makes users feel more comfortable.
Biometrics is also of the similar type but
instead of the physical presence the
physiological or behavioral characteristics of
the person concerned is studied and
authenticated. This requires lots of work to be
done in order to process the activities of the
person and confirm his authentication. So
Graphical passwords are easier to be handled
as well as at a low cost.

Conclusion
The past decade has seen a growing interest in
This feature is skillfully deployed in the
using graphical passwords as an alternative to
creation of the authentication tool called the
the traditional text-based passwords. In this
pass face, instead of the word-based entry pass,
paper, we have conducted a comprehensive
here we have a `face'-based entry pass. Here
survey of existing graphical password
the pass phrase is not a string of alphanumeric
techniques. Although the main argument for
characters but a string of face images. You can
graphical passwords is that people are better at
select an image combination and whenever you
memorizing graphical passwords than text-
try to access a service based on this
based passwords, the existing user studies are
authentication method, the system will show
very limited and there is not yet convincing
you a set of faces from which you need to
evidence to support this argument. Our
select the ones that belong to your password
preliminary analysis suggests that it is more
string.
difficult to break
Other solutions
Graphical passwords using the traditional
attack methods such as brute force search,
dictionary attack, or spy ware. However, since
there is not yet wide deployment of graphical
password systems, the vulnerabilities of
graphical passwords are still not fully
understood. Overall, the current graphical
password techniques are still immature. Much
more research and user studies
are needed for graphical password techniques
to achieve higher levels of maturity and
usefulness.

Links to our source:

 rutgersscholar.rutgers.edu/volume04/so
brbirg/sobrbirg.html
 http://searchsecurity.techtarget
.com/sDefinition/0,290660,sid14_
gci1001829,00.html

You might also like