SlideShare une entreprise Scribd logo
1  sur  14
GRAPHICAL PASSWORD


            PRESENTED BY
          MANISH KUMAR BHADE
           GGITS, JABALPUR
CONTENTS
   INTRODUCTION.
   WHAT IS PASSWORD?
   WHAT IS GRAPHICAL PASSWORD?
   COMPARISION BETWEEN ALPHA-NUMERIC &
    GRAPHICAL PASSWORDS.
   WHAT IS ALPHA-NUMERIC PASSWORDS?
   ADVANTAGES OF GRAPHICAL PASSWORDS.
   A SIMPLE GRAPHICAL PASSWORD SCHEME.
   DRAWBACKS.
   THE SHOULDER SURFING PROBLEM.
   SOLVING THE SHOULDER SURFING PROBLEM.
PASSWORDS

   The most commonly used form of user authentication.
   The weakest links of computer security systems.
   Two conflicting requirements of alphanumeric
    passwords
        (1) Easy to remember and
        (2) Hard to guess.
    Many people tend to ignore the second requirement
    which lead to weak passwords. Many solutions have been
    proposed. Graphical password is one of the solutions.
GRAPHICAL PASSWORDS

   A GRAPHIICAL PASSWORD is an
    authentication system that works by having the user
    select from images, in a specific order, presented in
    a graphical user interface (GUI). For this reason, the
    graphical-password approach is sometimes called
    graphical user authentication (GUA).
    An example of a system that we developed uses an
    image on the screen and lets the user choose a few
    click points; these click points are the "password",
    and the user has to click closely to these points again
    in order to log in.
COMPARISION BETWEEN ALPHA-NUMERIC
& GRAPHICAL PASSWORDS:

Commonly used guidelines for alpha-numeric passwords
  are:
 The password should be at least 8 characters long.
 The password should not be easy to relate to the user (e.g.,
  last name, birth date).
 The password should not be a word that can be found in a
  dictionary or public directory.
 Ideally, the user should combine upper and lower case
  letters and digits.
But in graphical passwords, which consist of some actions
  that the user performs on an image. Such passwords are
  easier to remember & hard to guess.
Graphical Passwords - What A Concept!


   The concept is simple: You
    pick several icons to represent
    your password. Then when you
    want to authenticate a screen is
    drawn as a challenge to which
    you must respond. The screen
    has numerous icons, at some
    of which are your private
    password icons. You must
    locate your icons visually on
    the screen and click somewhere
    directly inside the perimeter
    they create -- but not on the
    icons themselves
A SIMPLE GRAPHICAL PASSWORD
SCHEME

                 The user chose these regions
                 when he or she created the
                 password. The choice for the
                 four regions is arbitrary, but
                 the user will pick places that he
                 or she finds easy to remember.
                 The user can introduce his/her
                 own pictures for creating
                 graphical passwords. Also, for
                 stronger security, more than
                 four click points could be
                 chosen.
ADVATAGES OF GRAPHICAL
PASSWORDS

   Graphical password schemes provide a way of making
    more human-friendly passwords while increasing the level
    of security.
   Here we use a series of selectable images on successive
    screen pages, if there are 100 images on each of the 8
    pages in an 8-image password, there are 100^8, or 10
    quadrillion (10,000,000,000,000,000), possible
    combinations that could form the graphical password! If
    the system has a built-in delay of only 0.1 second, it
    would take (on average) millions of years to break into the
    system by hitting it with random image sequences.
    Dictionary attacks are infeasible
DRAWBACKS

THE SHOULDER SURFING PROBLEM
 As the name implies, shoulder surfing is watching over
  people's shoulders as they process information. Examples
  include observing the keyboard as a person types his or
  her password, enters a PIN number, or views personal
  information.
 Because of their graphic nature, nearly all graphical
  password schemes are quite vulnerable to shoulder
  surfing. Most of the existing schemes simply circumvent
  the problem by stating that graphical passwords should
  only be used with handheld devices or workstations set up
  in such a way that only one person can see the screen at
  the time of login.
OUR GOAL

   Due to this vulnerability to shoulder surfing, it
    would appear that graphical passwords could
    never be used in environments where view of the
    screen is not exclusive to the person logging in.
    However, it is possible to create schemes that
    counter the shoulder surfing problem.
SOLUTION TO SHOULDER
       SURFING PROBLEM

       (1) TRIANGLE SCHEME




(For clarity, this collection contains only a little over 100 objects. Typical screens can fit over 1000.)
(2) MOVABLE FRAME SCHEME
CONCLUSION

   Graphical passwords are an alternative to textual
    alphanumeric password.
   It satisfies both conflicting requirements i.e. it is
    easy to remember & it is hard to guess.
   By the solution of the shoulder surfing problem, it
    becomes more secure & easier password scheme.
   By implementing other special geometric
    configurations like triangle & movable frame, one
    can achieve more security.
THANK YOU


      QUERRIES?

Contenu connexe

Tendances

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDKarishma Khan
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 

Tendances (20)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Browser security
Browser securityBrowser security
Browser security
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 

En vedette

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkarsamarai_apoc
 
Improving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingImproving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingAnna Russo
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Managing database project with Visual Studio SSDT and TFS
Managing database project with Visual Studio SSDT and TFSManaging database project with Visual Studio SSDT and TFS
Managing database project with Visual Studio SSDT and TFSHarry Zheng
 
Lap Around Visual Studio 2010 Ultimate And TFS 2010
Lap Around Visual Studio 2010 Ultimate And TFS 2010Lap Around Visual Studio 2010 Ultimate And TFS 2010
Lap Around Visual Studio 2010 Ultimate And TFS 2010Ed Blankenship
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Dinesh Jogdand
 
Project report on mobile shop management
Project report on mobile shop managementProject report on mobile shop management
Project report on mobile shop managementDinesh Jogdand
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller NotesDr.YNM
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 

En vedette (19)

Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Major_Project
Major_ProjectMajor_Project
Major_Project
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
SSDT unleashed
SSDT unleashedSSDT unleashed
SSDT unleashed
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkar
 
Improving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingImproving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester Training
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Managing database project with Visual Studio SSDT and TFS
Managing database project with Visual Studio SSDT and TFSManaging database project with Visual Studio SSDT and TFS
Managing database project with Visual Studio SSDT and TFS
 
Soloway.company.2
Soloway.company.2Soloway.company.2
Soloway.company.2
 
Lap Around Visual Studio 2010 Ultimate And TFS 2010
Lap Around Visual Studio 2010 Ultimate And TFS 2010Lap Around Visual Studio 2010 Ultimate And TFS 2010
Lap Around Visual Studio 2010 Ultimate And TFS 2010
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)Project report On MSM (Mobile Shop Management)
Project report On MSM (Mobile Shop Management)
 
Project report on mobile shop management
Project report on mobile shop managementProject report on mobile shop management
Project report on mobile shop management
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 

Similaire à Graphical password

Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...IRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical PasswordsZhi Guan
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 

Similaire à Graphical password (20)

Synopsis
SynopsisSynopsis
Synopsis
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Nilesh
Nilesh Nilesh
Nilesh
 
3D - password
3D - password3D - password
3D - password
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 

Dernier

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Graphical password

  • 1. GRAPHICAL PASSWORD PRESENTED BY MANISH KUMAR BHADE GGITS, JABALPUR
  • 2. CONTENTS  INTRODUCTION.  WHAT IS PASSWORD?  WHAT IS GRAPHICAL PASSWORD?  COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS.  WHAT IS ALPHA-NUMERIC PASSWORDS?  ADVANTAGES OF GRAPHICAL PASSWORDS.  A SIMPLE GRAPHICAL PASSWORD SCHEME.  DRAWBACKS.  THE SHOULDER SURFING PROBLEM.  SOLVING THE SHOULDER SURFING PROBLEM.
  • 3. PASSWORDS  The most commonly used form of user authentication.  The weakest links of computer security systems.  Two conflicting requirements of alphanumeric passwords (1) Easy to remember and (2) Hard to guess. Many people tend to ignore the second requirement which lead to weak passwords. Many solutions have been proposed. Graphical password is one of the solutions.
  • 4. GRAPHICAL PASSWORDS  A GRAPHIICAL PASSWORD is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).  An example of a system that we developed uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
  • 5. COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS: Commonly used guidelines for alpha-numeric passwords are:  The password should be at least 8 characters long.  The password should not be easy to relate to the user (e.g., last name, birth date).  The password should not be a word that can be found in a dictionary or public directory.  Ideally, the user should combine upper and lower case letters and digits. But in graphical passwords, which consist of some actions that the user performs on an image. Such passwords are easier to remember & hard to guess.
  • 6. Graphical Passwords - What A Concept!  The concept is simple: You pick several icons to represent your password. Then when you want to authenticate a screen is drawn as a challenge to which you must respond. The screen has numerous icons, at some of which are your private password icons. You must locate your icons visually on the screen and click somewhere directly inside the perimeter they create -- but not on the icons themselves
  • 7. A SIMPLE GRAPHICAL PASSWORD SCHEME The user chose these regions when he or she created the password. The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.
  • 8. ADVATAGES OF GRAPHICAL PASSWORDS  Graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security.  Here we use a series of selectable images on successive screen pages, if there are 100 images on each of the 8 pages in an 8-image password, there are 100^8, or 10 quadrillion (10,000,000,000,000,000), possible combinations that could form the graphical password! If the system has a built-in delay of only 0.1 second, it would take (on average) millions of years to break into the system by hitting it with random image sequences.  Dictionary attacks are infeasible
  • 9. DRAWBACKS THE SHOULDER SURFING PROBLEM  As the name implies, shoulder surfing is watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.  Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing. Most of the existing schemes simply circumvent the problem by stating that graphical passwords should only be used with handheld devices or workstations set up in such a way that only one person can see the screen at the time of login.
  • 10. OUR GOAL  Due to this vulnerability to shoulder surfing, it would appear that graphical passwords could never be used in environments where view of the screen is not exclusive to the person logging in. However, it is possible to create schemes that counter the shoulder surfing problem.
  • 11. SOLUTION TO SHOULDER SURFING PROBLEM (1) TRIANGLE SCHEME (For clarity, this collection contains only a little over 100 objects. Typical screens can fit over 1000.)
  • 13. CONCLUSION  Graphical passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.
  • 14. THANK YOU QUERRIES?