2. Graphical Passwords
(1) Why graphical passwords?
Pictures are easy to remember or recognized
than text..
(2) Are graphical passwords as secure as text
passwords?
(3) What are the major design and implementation
issues for
graphical passwords?
3. Random Image
Based on hash visualization techniques.
13. Attack on Graphical Passwords
(1) Brute force search
(2) Dictionary attacks
(3) Guessing
* dierent person has dierent choice.
* human have some common selections.
(4) Spy ware
(5) Shoulder surfing
(6) Social engineering
14. Research on Graphical Passwords
(1) Design a new graphical password scheme
* can return a random length text password
(2) Use graphical password in public key
cryptosystem.
* User generate a big number from graphical
password.
* Convert the big number into a signing private
key.
* Get a certificate from CA with the generated
key.
* Embed graphical password into application
such as webmail.
* User log on webmail, generate his signing key