MULTIPLE PASSWORD AUTHENTICATIONS
#1

[attachment=6108]


Introduction

The Dramatic increase of computer usage has given rise to many security concerns. One major security concern is authentication, which is the process of validating who you are to whom you claimed to be. The password is a very common and widely authentication method still used up to now but because of the huge advance in the uses of computer in many applications as data transfer, sharing data, login to emails or internet, some drawbacks of normal password appear like stolen the password, forgetting the password, week password, etc so a big necessity to have a strong authentication way is needed to secure all our applications as possible, so researches come out with advanced password called multiple password techniques where they tried to improve the password techniques and avoid the weakness of normal password. ( Sobrado and Birget, 2007), today, many networks, computer systems and Internet-based environments used this technique to authenticate their users. The vulnerabilities of this technique have been well known generally. Dictionary attack is the commonly method used by hackers to break or crack the alphanumeric password, such attack is very efficient mechanism because its only need a little time to discover the users passwords. Another major drawback of this method is the difficulty of remembering the passwords. Recent studies (Dhamija et al, 2000) showed that humans are only capable to memorize a limited number of passwords, because of this syndrome, they often to write down, share and use the same passwords for different current account. Graphical password techniques have been proposed as an alternative to conventional based techniques. It has been designed to overcome the known weakness of conventional password. It also designed to make the passwords more memorable, easier for people to use and therefore more secure. Based on the two assumptions; first, humans can remember pictures better than alphanumeric characters and second, a picture worth a thousand passwords.

As known generally, the main drawbacks for the current graphical password schemes are the shoulder-surfing problem and usability problem. Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authentication systems which have both the security and usability elements is yet another example of what making the challenge of Human Computer Interaction (HCI) and security communities. Even though the main argument for graphical passwords is that humans are better at memorizing graphical passwords than conventional passwords, the existing user studies are very limited and there is not yet convincing the fact to support this argument. We have found that the existing recognition base graphical passwords schemes does not have attractive usability features for the users which mean that the usability features needed to be studied more and develop more usable systems for the Graphical Password.

Current authentication systems suffer from many weaknesses. The vulnerabilities of the textual password have been well known. Users tend to pick short passwords or passwords that are easy to remember, which makes the passwords unprotected for attackers to break. Furthermore, textual password is vulnerable to guessing, dictionary attack, key-loggers, and social engineering, shoulder surfing, hidden-camera and spy ware attacks. To conquer the limitations of text-based password, techniques such as two-factor authentication and graphical password have been put in use. Other than that, applications and input devices such as mouse, stylus and touch-screen that permit make the appearance of the graphical user authentication techniques possible.

However, they are mostly vulnerable to shoulder-surfing as well. Passwords possess many useful properties as well as widespread legacy deployment; consequently we can expect their use for the foreseeable future. Unfortunately, today’s standard methods for password input are subject to a variety of attacks based on observation, from casual eavesdropping (shoulder surfing), to more exotic methods. Shoulder-surfing attack occurs when using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information. As well as when a user enters information using a keyboard, mouse, touch screen or any traditional input device, a malicious observer may be able to acquire the user’s password credentials.

A collection of usability features will be implemented in the multiple password prototype to be more usable for the users where this usability set includes more secure, the easy of use, memorize, creation, learning and satisfaction. Finally we propose a new multiple password authentications scheme.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: authentications and adaptive security for dns, authentications, surfing, shoulder surfing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,625 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,953 18-03-2013, 12:25 PM
Last Post: computer topic
  Project Report on IPAS: Implicit Password Authentication System computer girl 0 2,116 08-06-2012, 11:27 AM
Last Post: computer girl
  EFFICIENT ROUTING IN INTERMITTENTLY CONNECTED MOBILE NETWORKS: THE MULTIPLE COPY CASE electronics seminars 6 4,805 23-02-2012, 04:47 PM
Last Post: seminar paper
  Controlling Data Dictionary Attacks using Graphical password and Data Hiding in Video seminar surveyer 1 2,368 10-02-2012, 10:53 AM
Last Post: seminar addict
  Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User Projects9 0 854 23-01-2012, 04:36 PM
Last Post: Projects9
  Estimating Parameters of Multiple Heterogeneous Target Objects Using Composite Sensor Projects9 0 653 23-01-2012, 04:16 PM
Last Post: Projects9
  Three Party Authentications for key Distributed Protocol using Implicit and Explicit mechanical engineering crazy 5 3,404 19-10-2011, 09:44 AM
Last Post: seminar addict
  AUTOMATIC LINE MATCHING AND 3D RECONSTRUCTION OF BUILDINGS FROM MULTIPLE VIEWS smart paper boy 0 1,061 02-08-2011, 04:12 PM
Last Post: smart paper boy
  Record Matching over Query Results from Multiple Web Databases seminar class 0 2,030 05-05-2011, 11:50 AM
Last Post: seminar class

Forum Jump: