130 likes | 214 Views
Securing SignSupprt F ocusing on user authentication and data encryption. Student name: Lindokuhle Duma Supervisor: Prof. Tucker. Proposed overall solution. P attern authentication. Visual for Deaf users instead of text Deaf people are accustomed to signed language
E N D
Securing SignSupprtFocusing on user authentication and data encryption Student name: Lindokuhle Duma Supervisor: Prof. Tucker
Pattern authentication • Visual for Deaf users instead of text • Deaf people are accustomed to signed language • Easy to remember visuals than text [1]
Disadvantages of pattern password • Smudge attack [2] • Over shoulder surfing[3]
Better solution for Encryption • Files should stay Encrypted • Only encrypt the file’s content in memory
Low level Design • Read the input from the file • Generate a random key • Ensure that the key is of the correct bits • Encrypt the input data into cipher text • Return cipher text
References • [1] Jansen, W. (2004). Authenticating mobile device users through image selec-tion. The Internet Society: Advances in Learning, Commerce and Security,1, 183-194. • [2] Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference • [3] CA Technologies (2011),authentication-system CE technolo-gies,Advanceauthentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf • [4] Mallow, Christopher. (2007) Authentication Methods and Tech-niques. Global Information Assurance Certication. http://www.giac.org/resources/whitepaper/access/2.php. Retrieved on October 17, 2007.