260 likes | 292 Views
This paper explores various graphical password authentication techniques as an alternative to text-based passwords. It discusses recognition-based and recall-based methods, along with their strengths, limitations, and future research directions. The survey covers token-based, biometric-based, and knowledge-based authentication methods. Specific schemes like Dhamija and Perrig, Sobrado and Birget, Draw-A-Secret, and PassPoint are analyzed in detail. The paper also addresses the security and usability aspects of graphical passwords.
E N D
Graphical PasswordA Survey Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen Presented by: Lin Jie
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Introduction • How about text-based passwords ? • Difficulty of remembering passwords • easy to remember -> easy to guess • hard to guess -> hard to remember • Users tend to write passwords down or use the same passwords for different accounts • An alternative: Graphical Passwords • Psychological studies: Human can remember pictures better than text
Graphical Password Scheme • If the number of possible pictures is sufficiently large, the possible password space may exceed that of text-based schemes, thus offer better resistance to dictionary attacks. • can be used to: • workstation • web log-in application • ATM machines • mobile devices
In this paper • Conduct a comprehensive survey of the existing graphical password techniques • Discuss the strengths and limitations of each method • Point out future research directions
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Overview of the Authentication Methods • Token based authentication • key cards, band cards, smart card, … • Biometric based authentication • Fingerprints, iris scan, facial recognition, … • Knowledge based authentication • text-based passwords, picture-based passwords, … • most widely used authentication techeniques
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
The survey : two categories • Recognition Based Techniques • a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage • Recall Based Techniques • A user is asked to reproduce something that he created or selected earlier during the registration stage
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Recognition Based Techniques • Dhamija and Perrig Scheme Pick several pictures out of many choices, identify them later in authentication. • using Hash Visualization, which, given a seed, automatically generate a set of pictures • take longer to create graphical passwords password space: N!/K! (N-K)! ( N-total number of pictures; K-number of pictures selected as passwords)
Recognition Based Techniques • Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects. • authors suggeated using 1000 objects, which makes the display very crowed and the objects almost indistinguishable. password space: N!/K! (N-K)! ( N-total number of picture objects; K-number of pre-registered objects)
Recognition Based Techniques • Other Schemes Using human faces as password • Select a sequence of images as password
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Recall Based Techniques • Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing • redrawing has to touch the same grids in the same sequence in authentication • user studies showed the drawing sequences is hard to Remember
Recall Based Techniques • “PassPoint” Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence. • can be hard to remember the sequences Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )
Recall Based Techniques • Other Schemes Grid Selection Scheme Signature Scheme
Schemes Not In This Paper Using images with random tracks of geometric graphical shapes Using distorted images to prevent revealing of passwords
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Security • Is a graphical password as secure as text-based passwords? • text-based passwords have a password space of 94^N (94 – number of printable characters, N- length of passwords). Some graphical password techniques can compete: Draw-A-Secret Scheme, PassPoint Scheme. • Brute force search / Dictionary attacks The attack programs need to automatically generate accurate mouse motion to imitate human input, which is more difficult compared to text passwords. • Guessing • Social engineering • …
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Usability • Pictures are easier to remember than text strings • Password registration and log-in process take too long • Require much more storage space than text based passwords
Outline • Introduction • Overview of the Authentication Methods • The survey • Recognition Based Techniques • Recall Based Techniques • Discusssion • Security • Usability • Conclusion
Conclusion • main argument for graphical passwords: people are better at memorizing graphical passwords than text-based passwords • It is more difficult to break graphical passwords using the traditional attack methods such as:burte force search, dictionary attack or spyware. • Not yet widely used, current graphical password techniques are still immature
Thanks • Questions?