Security analysis method of recognition-based graphical password

One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall...

Full description

Bibliographic Details
Main Authors: Khodadadi, Touraj, Alizadeh, Mojtaba, Gholizadeh, Somayyeh, Zamani, Mazdak, Darvishi, Mahdi
Format: Article
Published: Penerbit UTM Press 2015
Subjects:
_version_ 1796860138896752640
author Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
author_facet Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
author_sort Khodadadi, Touraj
collection ePrints
description One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented.
first_indexed 2024-03-05T19:37:29Z
format Article
id utm.eprints-55374
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T19:37:29Z
publishDate 2015
publisher Penerbit UTM Press
record_format dspace
spelling utm.eprints-553742017-11-01T04:17:02Z http://eprints.utm.my/55374/ Security analysis method of recognition-based graphical password Khodadadi, Touraj Alizadeh, Mojtaba Gholizadeh, Somayyeh Zamani, Mazdak Darvishi, Mahdi TA Engineering (General). Civil engineering (General) One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. Penerbit UTM Press 2015 Article PeerReviewed Khodadadi, Touraj and Alizadeh, Mojtaba and Gholizadeh, Somayyeh and Zamani, Mazdak and Darvishi, Mahdi (2015) Security analysis method of recognition-based graphical password. Jurnal Teknologi, 72 (5). pp. 57-62. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3941 DOI:10.11113/jt.v72.3941
spellingShingle TA Engineering (General). Civil engineering (General)
Khodadadi, Touraj
Alizadeh, Mojtaba
Gholizadeh, Somayyeh
Zamani, Mazdak
Darvishi, Mahdi
Security analysis method of recognition-based graphical password
title Security analysis method of recognition-based graphical password
title_full Security analysis method of recognition-based graphical password
title_fullStr Security analysis method of recognition-based graphical password
title_full_unstemmed Security analysis method of recognition-based graphical password
title_short Security analysis method of recognition-based graphical password
title_sort security analysis method of recognition based graphical password
topic TA Engineering (General). Civil engineering (General)
work_keys_str_mv AT khodadaditouraj securityanalysismethodofrecognitionbasedgraphicalpassword
AT alizadehmojtaba securityanalysismethodofrecognitionbasedgraphicalpassword
AT gholizadehsomayyeh securityanalysismethodofrecognitionbasedgraphicalpassword
AT zamanimazdak securityanalysismethodofrecognitionbasedgraphicalpassword
AT darvishimahdi securityanalysismethodofrecognitionbasedgraphicalpassword