Professional Documents
Culture Documents
PASSWORDS
By B.NIKHITHA, P.PRIYANKA, R.SUMA
ANDHRA LOYOLA INSTITUTE OF ENGINEERING AND TECHNOLOGY
Abstract:
Authentication of an user is a highly severe menance to any computing device. The
most commonly used authentication techniques till today are alphanumeric, image
passwords, graphical passwords, biometrics e.t.c. Each and every technique
discussed above are having their own drawbacks, and these passwords are prone to
dictionary attacks, eavesdropping, shoulder surfing, and social engineering.
Although the graphical passwords are more user-friendly and increase the level of
security, they are vulnerable to shoulder surfing.
To address this problem we propose a new technique dual passwords for higher
authentication
This technique contains a text field for user name,
field with binary entries and numeric grid layout along with a toggle button which
provide a two way high level and user friendly authentication .
KEYWORDS:
authentication, grid passwords, binary password, graphical passwords, dictionary attacks, eaves
dropping attack, shoulder surfing ,user friendly, man-in-the-middle, attack, toggle button,
password identification pattern, non-trivial pips.
1.1 Base
1. Introduction:
1.2
Problem
techniques:
with
existing
1.3 Objective:
The main objective of this
technique is to provide security to the
systems. The possible attacks like phishing,
sniffing, social attacks and shoulder surfing
can be remove. As soon as the session
expires, the password is the no longer valid.
1.4
Solutions
technique:
through
this
2. Description:
This technique generate session password
are resistant to dictionary attack, brute force
Layout:
The complete layout of this technique
consists of common username filed which
takes the username specified during
registration.
There exists a password entry which
contains two row of first block, an empty
text blocks in the first 1 row of characters
blocks and other row empty text blocks for
binary entries. The no. of blocks in a row
depends on the length of the password. Next
comes, the grid where we mainly use
hotspots technique i.e grid position to
authenticate the user. The size of the grid
will be selected prior at the registration
phrase the level f security increases with the
increases in size of the grid. As the is a dual
password authentication technique, both the
password must be provided accurately. Fig
2.1 gives the layout of the login screen
Submi
t
3. Implementation:
3.1 Phases:
3.1.1 Registration Phase:
During this phase, user enters his password.
Minimum length of the password is 6 and
can be up to 12 characters. The password
can contain even or odd number of
characters. The user is asked to select the
size of grid and then the hotspots are to be
selected. Moreover, basic details like first
name, last name, mobile number and emailid are given by the user. Clicking the
submit button in the registration form, all
the information inserted by the user is stored
on to the database. The whole procedure
3.2 Authentication:
3.2.1Binary Digit Authentication:
procedure of authentication
3x3
4x4
5x5
6x6
7x7
8x8
Digits
Special symbols
Punctuations
Uppercase and lowercase letters
Non-trivial PIPS
5.Conclusion:
The
simple-to-
use
access,
and
it
offers
several
than PINs or complex and constantlychanging passwords. Each time a user logs
6. Future scope:
traditional
1-factor
and
2-factor
reduced
traditional
when
two-factor
compared
solutions
to
.This
also
be
developed
as
windows
7. Acknowledgement:
We are using this opportunity to express my
gratitude to everyone who supported us
throughout. I am thankful for their aspiring
8. References:
1.