TAILIEUCHUNG - A novel two step random colored grid process: Graphical password authentication system

In this paper we propose this 2 step random coloured grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications. | International Journal of Computer Networks and Communications Security VOL. 4, NO. 2, FEBRUARY 2016, 52–55 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Novel Two Step Random Colored Grid Process: Graphical Password Authentication System Purushothaman and K2 1 Department of Information science, New Horizon College Of Engineering, Bangalore, India E-mail: 1apurusothr1212@, ABSTRACT Security in the computer is largely supported by passwords for authentication process. Alphanumeric passwords still remain as the most common Authentication method. This conventional authentication method has been shown to be susceptible security threats such as phishing attack, brute force attack, dictionary attack, spyware attack etc. To overcome the vulnerabilities of traditional methods, a numerous graphical password authentication systems have been designed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this 2 step random coloured grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications. Keywords: Recall based graphical passwords, computer security, attack pattern, knowledge based password, authentication. 1 INTRODUCTION Authentication is a process by which system verifies the identity of a user. Authentication is the main step of any security system. Text passwords remain the most common method for several reasons [13-14]. This method is susceptible to various predominant attacks like phishing, spyware attacks etc. To address the problem with conventional models alternative .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.