S3PAS:A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication
#1

[attachment=3131]

Abstract
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords or pass- words that are easy to remember, which makes the pass- words vulnerable for attackers to break. Furthermore, tex- tual password is vulnerable to shoulder-surng, hidden- camera and spyware attacks. Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder- surng. In this paper, we propose a Scalable Shoulder- Surng Resistant Textual-Graphical Password Authentica- tion Scheme (S3PAS). S3PAS seamlessly integrates both graphical and textual password schemes and provides nearly perfect resistant to shoulder-surng, hidden-camera and spyware attacks. It can replace or coexist with con- ventional textual password systems without changing ex- isting user password proles. Moreover, it is immune to brute-force attacks through dynamic and volatile session passwords. S3PAS shows signicant potential bridging the gap between conventional textual password and graphical password. Further enhancements of S3PAS scheme are pro- posed and briey discussed. Theoretical analysis of the se- curity level using S3PAS is also investigated.

Base paper Presented By:
Huanyu Zhao and Xiaolin Li
Scalable Software Systems Laboratory
Department of Computer Science
Oklahoma State University, Stillwater, OK 74078, USA

Introduction
The most common user authentication method is the text-based password scheme that a user enters a login name and a password. The vulnerabilities of this method have been well known. Users tend to pick short passwords or passwords that are easy to remember, which makes the passwords vulnerable for attackers to break. To resist bruteforce search and dictionary attacks, users are required to use long and random passwords. Unfortunately, such passwords are hard to remember. Furthermore, textual password is vulnerable to shoulder-surfing, hidden-camera and spyware attacks. Graphical password schemes have been proposed as a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text .In addition, the possible password space of a graphical password scheme may exceed that of textbased schemes and thus presumably offer higher level of security. It is also difficult to devise automated attacks for graphical passwords. As a result, graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security. Due to these advantages, there is a growing interest in graphical password. However, existing graphical passwords are far from perfect. Typically, system requirements and communication costs for graphical passwords are significantly higher than text-based passwords. In addition, few graphical systems support keyboard inputs. More importantly, most current graphical passwords are more vulnerable to shoulder-surfing attacks than textual passwords.

Read full report
http://s3lab.cs.okstate.edu/publication/ubisafe07.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar presentation on graphical password authentication, seminar slide for graphical password authentication, overcome password hacking through graphical paassword authentication seminar report, slide for graphical password, earthquke resistant, authentication by 3d password pdf, slides for graphical password authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,569 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Ar 1 1,051 15-02-2017, 04:39 PM
Last Post: jaseela123d
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,936 18-03-2013, 12:25 PM
Last Post: computer topic
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 1,968 29-10-2012, 05:31 PM
Last Post: seminar details
  Project Report on IPAS: Implicit Password Authentication System computer girl 0 2,106 08-06-2012, 11:27 AM
Last Post: computer girl
  ZIGBEE WIRELESS VEHICLE IDENTIFICATION AND AUTHENTICATION SYSTEM full report project topics 11 7,826 13-03-2012, 11:06 AM
Last Post: seminar paper
  MABS: Multicast Authentication Based on Batch Signature seminar class 15 10,361 29-02-2012, 10:06 AM
Last Post: seminar paper
  Controlling Data Dictionary Attacks using Graphical password and Data Hiding in Video seminar surveyer 1 2,361 10-02-2012, 10:53 AM
Last Post: seminar addict
  A Two-Dimensional Low-Diameter Scalable On-Chip Network for Interconnecting Thousands Projects9 0 636 23-01-2012, 05:11 PM
Last Post: Projects9

Forum Jump: