A survey of Possible Attacks on Text & Graphical Password Authentication Techniques
Keywords:
Phishing, bots, OCR, PINAbstract
The process of verifying a user`s identity is typically referred to as user authentication. Information Security and Authentication is now a key issue in the world. Gradually end users of Internet improved. General uses of the Internet are searching, e-mail, social networking, e-banking, e-governance, etc. User Authentication is the process of determining whether the user should be authorized to access information or not. Alphanumeric or text passwords are mostly used mechanism for authentication. But these are susceptible to a dictionary, brute force and guessing attacks. Resolution is to use Graphical Password, is more secure, reliable technique for authentication. Graphical passwords allow users to remember pictures/images instead of text which helps them to remember the passwords easily. But these are also vulnerable to the dictionary, brute force and guessing attacks. In this paper, Text-based password and graphical password techniques for Authentication are just discussed, and possible attacks on them are summarized.
References
Adams, A., and Sasse, M. A., "Users are not the enemy: why userscompromise computer security mechanisms and how to take remedialmeasures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
Herley, C., Van Oorschot, P. and Patrick, A., “Passwords: If We‟re So Smart,Why Are We Still Using Them?” in Financial Cryptography and DataSecurity, LNCS 5628, Springer, 2009.
Ives, B., Walsh, K.R., Schneider. H., The domino effect of password reuse,Communications of the ACM 47, 75-78, 2004.
Hayashi, E. and N. Christin, Use Your Illusion: Secure Authentication Usable Anywhere, in Proceedings of the 4th symposium on Usable privacy and security (SOUPS).2008,ACM.
Lawrence O‟Gorman. Comparing Passwords, Tokens, and Biometrics for User Authentication.Proceedings of the IEEE, Vol. 91, NO. 12, Pages 2022-2033.December 2003.
Monrose, F. and Reiter, M. Graphical passwords. Security and Usability:Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel,Eds. O‟Reilly Media, Chapter 9, 157–174. 2005.
Renaud, K. “Evaluating authentication mechanisms,” Security and Usability:Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel,Eds. O‟Reilly Media, 2005, ch. 6, pp. 103–128.
Renaud, K. “Guidelines for designing graphical authentication mechanisminterfaces”, International Journal of Information and Computer Security, vol.3, no. 1, pp. 60–85, June 2009.
Sasse, M., Brostoff, S., and Weirich, D., Transforming the ‟Weakest Link‟ - AHuman/Computer Interaction Approach to Usable and Effective Security. BTTechnology Journal, 19(3):122–131, 2001.
Chiasson, S., et al., Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords. ACM,2009
Suo, X., Zhu, Y. and Owen, G., Graphical passwords: A survey. Annual Computer Security Applications Conference (ACSAC), December 2005
Vu, K.-P. L., Proctor, R., Bhargav-Spantzel, A., Tai, B.-L., Cook, J., andSchultz, E.2007.Improving password security and memorability to protectpersonal and Organizational information.International Journal of Human-Computer Studies 65, 744–757.
Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A. and Memon, N.,PassPoints: Design and longitudinal evaluation of a graphical passwordsystem. International Journal of Human-Computer Studies, 63(1-2):102/127,2005.2):102/127,2005.
Sonia Chiasson, P.C. van Oorschot, and Robert Biddle” Graphical Password Authentication Using Cued Click Points”
Jain, A., Ross, A. and Pankanti, S., “Biometrics: a tool for information security,” Transactions on Information Forensics and Security (TIFS), vol. 1,no. 2, pp. 125–143, 2006.
Monrose, F. and Reiter, M. Graphical passwords. Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds. O‟Reilly Media, Chapter 9, 157–174. 2005
Arash Habibi Lashkari, Samaneh Farmand1”A new algorithm on Graphical User Authentication(GUA) based on multi-linegrids
S. Chiasson, P. C. van Oorschot, and R. Biddle, “A second lookat the usability of click-based graphical passwords,” in Proc.3rd Symp.Usable Privacy and Security (SOUPS), Pittsburgh,PA, 2007.
D. Davis, F. Monrose, and M. Reiter, “On user choice ingraphical password schemes,” in 13th USENIX SecuritySymposium, 2004.
Passlogix, "www.passlogix.com," last accessed in June 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.