A new algorithm on Graphical User Authentication (GUA) based on multi-line grids

Lashkari, Arash Habibi and Gani, Abdullah and Sabet, Leila Ghasemi and Farmand, Samaneh (2010) A new algorithm on Graphical User Authentication (GUA) based on multi-line grids. Scientific Research and Essays, 5 (24). pp. 3865-3875. ISSN 1992-2248,

[img]
Preview
PDF
2010_A_New_Algorithm_on_Graphical_User_Authentication_(GUA)_based_on_Multi-_Line_Grids.pdf

Download (1MB)
Official URL: http://www.academicjournals.org/sre/PDF/pdf2010/18...

Abstract

Today user authentication stands out as one of the most essential areas in information security which has several ways of being implemented. From time in memorial authentication schemes that apply strong text-based passwords have been typically expected to offer some assurance of security. But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. As a means of thwarting such habits, graphical authentication has been proposed as a replacement for text-based authentication. This has been spurred by the fact the humans have a natural inclination to remember images more easily than text. Most Information Communication and Telecommunication (ICT) environments in the last 20 years have tried to implement graphical user authentication schemes. The effectiveness of a graphical password is measured by its level of usability and security. Despite there being many existing algorithms most have failed to achieve both aspects simultaneously. To start with this paper reviews the pure and cued recall-based algorithms graphical password authentication schemes together with their shortcomings and probable attacks. Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. This is then followed by a discussion on the newly proposed algorithm that is based on a multi size grid and its evaluation by an attacker team. Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.

Item Type: Article
Funders: UNSPECIFIED
Additional Information: Lashkari, Arash Habibi Gani, Abdullah Sabet, Leila Ghasemi Farmand, Samaneh
Uncontrolled Keywords: Recall-based GUA; Pure recall-based algorithm; Cued recall-based algorithm; Graphical password; Usability; Security; Attack patterns
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms Maisarah Mohd Muksin
Date Deposited: 15 Jan 2013 02:45
Last Modified: 12 Oct 2018 01:46
URI: http://eprints.um.edu.my/id/eprint/4472

Actions (login required)

View Item View Item