TAILIEUCHUNG - A novel two step random colored grid process: Graphical password authentication system
In this paper we propose this 2 step random coloured grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications. | International Journal of Computer Networks and Communications Security VOL. 4, NO. 2, FEBRUARY 2016, 52–55 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Novel Two Step Random Colored Grid Process: Graphical Password Authentication System Purushothaman and K2 1 Department of Information science, New Horizon College Of Engineering, Bangalore, India E-mail: 1apurusothr1212@, ABSTRACT Security in the computer is largely supported by passwords for authentication process. Alphanumeric passwords still remain as the most common Authentication method. This conventional authentication method has been shown to be susceptible security threats such as phishing attack, brute force attack, dictionary attack, spyware attack etc. To overcome the vulnerabilities of traditional methods, a numerous graphical password authentication systems have been designed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this 2 step random coloured grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications. Keywords: Recall based graphical passwords, computer security, attack pattern, knowledge based password, authentication. 1 INTRODUCTION Authentication is a process by which system verifies the identity of a user. Authentication is the main step of any security system. Text passwords remain the most common method for several reasons [13-14]. This method is susceptible to various predominant attacks like phishing, spyware attacks etc. To address the problem with conventional models alternative .
đang nạp các trang xem trước