220 likes | 478 Views
Article Title: “ Token-based Graphical Password Authentication ”. International Journal of Information Security , 2011. Authors: John Charles G yorffy Andrew F. Tappenden James Miller. Presenter: Patrick Centanni. Security Issues. Three Types of Malware: 1.) Information Stealing
E N D
Article Title: “Token-based Graphical Password Authentication” International Journal of Information Security, 2011 Authors: John Charles Gyorffy Andrew F. Tappenden James Miller Presenter: Patrick Centanni
Security Issues • Three Types of Malware: 1.) Information Stealing 2.) Activity Altering 3.) Entire System Compromising
Problems with Conventional Passwords • LOW-ENTROPY PASSWORDS: • Users tend to pick passwords that are easy to remember. • 86% of passwords are case-insensitive and do not use special characters, meaning that users tend to rely on a stable of about 36 characters (as opposed to the 95 available to them). • YOU GOT ONE, YOU GOT ‘EM ALL. • TOO MANY PASSWORDS!
The Goals of an Improved Password System • To significantly decrease the likelihood of a user’s login credentials being stolen. • To fortify the security of user accounts by increasing the entropy (degree of randomness) associated with login passwords. • To use one easy-to-remember password for everything. • To combat malware, in particular information stealing malware.
What About Password Vaults, Though? • A password vault indexes a user’s various passwords with their corresponding URLs, fetching the passwords when needed. • This type of system may actually put the user in an even worse bind than having a single password compromised. • “The encryption is only as strong as the main password into the vault.”
Previous Work • Passfaces Problem: Excessive Login Time, Potential for Shoulder Surfing • Eye-tracing Password Systems & Pressure-based Click Point Systems Problem: Poor Password Recall Rates
The Proposed Solution • A system that employs a graphical password. • The software for the authentication system resides on a Trojan and virus-resistant embedded device. • User selects a personal image and selects points on the image. • Image is hashed and provided as input to a cryptosystem that returns a password. • Points selected are stretched into a long alphanumeric password, with a high degree of entropy and uniqueness.
Where Does The System Reside? *Uses a special client web browser on a low-cost USB device with read-only, protected flash memory. *No sensitive information stored on the drive. Only data on the drive are: 1.) graphical password chosen by user 2.) unique set of true random numbers generated at the time of production
Increasing Entropy • Users typically select words or dates for alphanumeric passwords, which clearly decreases entropy. • Entropy increases significantly when using images: • The sample set of all possible images a user could select is HUGE. • The password developed by the system also includes a set of unique random numbers.
Password Space Difference A staggering testimonial for the implementation of graphical-based passwords: Alphanumerical Password Space (95 characters): 6.6 x 1015 But don’t forget, users typically only rely on 36 characters, so this reduces the password space significantly. Graphical Password Space (8 points): 1.1 x 1018
Cryptography Terminology • Message: The data to be encrypted. • Cryptographic hash function: A function that generates a unique (collision-free) value for the data to be encrypted. • Message Digest: The hashed value used for encryption (in this case, the generated password).
Contents of Hash Message • 128 bytes: • The 8 characters selected by the user for 8 bytes • 8 x-coordinates, 8 y-coordinates, 2 bytes each for 32 bytes. • Behind each click point is a diameter of 10 pixels. • These are averaged, and a four-byte value for each pixel is found: 3 bytes for the color, 1 byte for alpha/opacity channel. This makes a total of 32 bytes. • The remaining 56 bytes come from a histogram image hash.
The Message Digest Formula • H∗(H(image)+CP+RNG) = P256 • Where: • H is the histogram image hash. • CP is the user-entered click-point data. • RNG values are randomly generated, and are the only values stored on the USB device.
Results • Hamming Distance: The number of positions in which two strings differ.
Summary * Three-tiered approach to system security: 1.) The token: the USB device, itself. 2.) The graphical password to log in to the device. 3.) A separate graphical password to perform secure transactions over the Internet. * This system cannot deal with system compromising malware since the system’s software originates on a user-level device.
Future Work • The possibility of using this technology on smart phones and tablets (have to decrease the dimension of the image).
References for Images Used in this Presentation "Bank Vault." Wikipedia. Wikimedia Foundation, 15 Jan. 2014. Web. 23 Jan. 2014. "Cryptographic Hash Function." Wikipedia. Wikimedia Foundation, 14 Jan. 2014. Web. 23 Jan. 2014. "Giving You The Password Secret to Success." MyJobKiller. N.p., n.d. Web. 23 Jan. 2014. Gyorffy, John C., Andrew F. Tappenden, and James Miller. "Token-based Graphical Password Authentication." International Journal of Information Security 10.6 (2011): 321-36. Academic Search Complete. Web. 16 Jan. 2014. "Malware | Microtech." Microtech RSS. N.p., n.d. Web. 23 Jan. 2014. "Password Protection: How to Create Strong Passwords." PCMAG. N.p., n.d. Web. 23 Jan. 2014. "Revelations on Passwords. Did You Get a Pass from PCI DSS!" OmegaSecure. N.p., n.d. Web. 23 Jan. 2014. "Tablets and Smart Phones Harbor More Bacteria and Germs." Smacus. N.p., n.d. Web. 23 Jan. 2014. "TECH Glitz." Top 25 Most Popular (Worst) Passwords of 2012. N.p., n.d. Web. 23 Jan. 2014. "Top 3 Questions About Small Business Blogging." Local Marketing Advice from SuperMedia. N.p., n.d. Web. 23 Jan. 2014.