Universal Multi-Factor Authentication Using Graphical Passwords
|
|
|
- Prudence Bradley
- 10 years ago
- Views:
Transcription
1 Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, {apirayes, Abstract In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user s personal handheld device as the password decoder and the second factor of authentication. In our methods, a service provider challenges the user with an image password. To determine the appropriate click points and their order, the user needs some hint information transmitted only to her handheld device. We show that our method can overcome threats such as key-loggers, weak password, and shoulder surfing. With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations without forcing the user to memorize different passwords or carrying around different tokens. 1. Introduction Authentication in the computer world refers to the act of confirming the authenticity of the user's digital identity claim. Currently, popular authentication mechanisms are mainly based the following factors: something that the user has (an object), knows (a secret), or uniquely represents him (biometric identifiers) [1]. In the simplest form, a system that requires authentication challenges the user for a secret, typically a pair of username and password. The entry of the correct pair grants access on the system s services or resources. Unfortunately, this approach is susceptible to several vulnerabilities and drawbacks. These shortcomings range from userselected weak or easily guessable passwords to more sophisticated threats such as malware and keyboard sniffers [2]. An adversary has an abundance of opportunities to compromise the text-based password authentication mechanisms. For long time the computer industry has been in a quest for better alternatives but without popular success: most of our current systems still use the primitive text-based authentication schemes. To amend the some of the shortcomings of the textual passwords, researchers turned their attention to passwords that utilize graphical objects [3, 4, 5]. Graphical authentication has been proposed as a user-friendly alternative to password generation and authentication [6, 7]. The main difference to textual passwords is the use if a device with graphical input: the user enters the password by clicking on a set of images, specific pixels of an image, or by drawing a pattern in a pre-defined and secret order. The proposed systems claim to provide a superior space of possible password combinations compared to traditional 8-character textual passwords [4]. This property alone renders attacks including dictionary attacks and keyboard sniffers computationally hard increasing our ability to defend against brute-force attacks. Furthermore, according to Picture Superiority Effect Theory [8], concepts are more likely to be recognized and remembered if they are presented as pictures rather than as words. Thus, graphical password presumably delivers a higher usability compare to text-based password. Another way of enhancing the security of the common text-based password is employing multifactor authentication. In general, multi-factor authentication is a way of authentication in which two or more independent factors are used as part of the user credentials. Multi-factor authentication is usually accomplished by combining the traditional text-based authentication with another factor. These factors can include smart cards, USB tokens, handheld devices, or one-time password tokens. Having two or more factors strengthens but also complicates the authentication process. More specifically, two-factor authentication has been with us for a quite time. Popular examples of two-factor authentication systems are the ATM machines: to complete any transaction, the bank customer has to carry both a bank-issued card (credit or debit card) and her personal identification number (PIN). We propose a system that leverages both graphical passwords and multi-factor authentication. Our approach overcomes the limitations of the traditional password (either textual or graphical) systems. To that end, we employ graphical password
2 combined with a handheld device to form a novel method of multi-factor authentication. As a result, we are able to provide a secure authentication via unsecure terminal. The rest of the paper has been organized as follows: section 2 explains the background of graphical authentication, two factor authentication mechanisms, and the benefits of using handheld device as the second factor of authentication. In section 3, we define some of the main key concepts of our approach. In addition, we discuss three alternative communication methods between the authenticator and user in section 4. Section 5 provides in-depth details about our authentication model and explanation about different types of password image and their strength. The security enhancements of the proposed scheme are analyzed in section 6. In section 7, we discuss the related work and differentiate our approach from previously proposed work. In the remainder of the paper, we briefly describe our prototype implementation and our future plans. 2. Background Text-based username and password is vulnerable to guessing, dictionary attack, key-loggers, shouldersurfing and social engineering [9-11]. As mentioned before, to overcome the shortcomings of text-based password, techniques such as two-factor authentication and graphical password have been employed. In most of the schemes, graphical password employs graphical presentations such as icons, human faces or custom images to create a password [3]. Graphical password techniques can be classified into two categories: recognition-based and recall-based [12]. In recognition-based systems, a series of images are presented to the user and a successful authentication requires a correct images being clicked in a right order. In recall-based systems, the user is asked to reproduce something that he or she created or selected earlier during the registration. These methods assume if the number of possible pictures is sufficiently large, the possible password space of a graphical password scheme may exceed that of text-based password and therefore it is virtually more resistance to attacks such as dictionary attacks. Also, from the usability standpoint, the graphical password claims to be superior to textbased password due to the fact that humans can remember pictures better than text. Since the graphical password is not widely deployed in real systems vulnerabilities of graphical passwords are still not fully understood. However there are a handful of research papers on this subject that we have summarized their results in Table 1 [12-14]. Table 1: Comparing the security of graphical and text-based passwords Vulnerability/Issues Text-Based Password Graphical Password Dictionary Attack Guessing Spyware/Key-logger Shoulder-surfing Social Engineering Multi-factor authentication is supposed to deliver a higher level of security assurance. For example business networks may require users to provide a password and a random number from a security token to pass the authentication. Knowing the password and having the security token at the same time provides a higher degree of confirmation about the identity of a person. However, the two-factor authentication raises some new challenges, especially in the area of usability. One of the usability challenges is that twofactor authentication is not standardized. There are a handful of different authentication factors with various implementations. At the same time, the same authentication factor employed by different institutions is not necessarily interoperable. As the result, usually users are expected to remember dozens of unique passwords and carry multiple physical items as the second authentication factor. Cell phone is such a popular technology that it is safe to assume nowadays almost everybody carries a cell phone. Embedded technologies such as RFID, GPS, Bluetooth, pointing and touching sensors, digital cameras, and image and voice recognition offer new applications for cell phones to go beyond voice communication. As a result, cell phones are quickly taking over many personal computing tasks, among them authentication. As a matter of fact, an emerging authentication technologies based on cell phones are appearing which transforms the cell phone into an authentication device by using SMS messaging or an interactive telephone call [15]. Using cell phone in such a way eliminates the need for a separate hardware token which in turn positively impacts the usability of the authentication scheme. Contrary to previous approaches, we employ a cell phone as the second factor of authentication in conjunction with graphical password. This enhances the overall scheme and strengthens the entire authentication process against known types of attacks. Our work is unique because it is the first to leverage graphical password as a second factor for authentication. In addition, our method can effectively address the guessing and shoulder-surfing issue of other image-password methods. Before delving into more details about our systems, we introduce the terminology used for the rest of the paper.
3 uses to reach to the services provided by the Challenger. The terminal can be public or private. Using the public terminal might be riskier but the nature of threats on both public and private terminals are the same. The authentication comes in the form of two images. The first image is the password image which is sent to the user s terminal as a challenge for password. The password image can be plain or encrypted. The password image is encrypted, if and only if it contains some information about click points. In this case the password image and key image are identical. 3. Terminology Password Image Key Image Figure 1: A password image and its corresponding key image For our approach, the user s handheld is a computing resource that can be conveniently be carried in the user s pocket. In some of our communication scenarios, the handheld device is used to store cryptographic keys and execute encryption-related calculations. Additionally, the handheld must be capable of displaying graphical images. Although we use cell phones for our implementation, for the sake of generality, in the rest of this paper, we will refer to the term handheld meaning any mobile device that is equipped with a display. We will also define a challenger to be a typical online service provider. The challenger offers potential authentication mechanisms to the user. To be authorized and gain access to resources, the user has to successfully complete one of the presented authentication mechanisms. On the other hand, by Terminal, we refer to the computing resource with a graphical screen and pointing input device or touchscreen capability. This is the device that that user Key image is a copy of password image which is always encrypted and signed by challenger and can be validated and decrypted on user s handheld device. The key image contains enough information to show the click spots to the owner of handheld. There are some clickable areas in the password image. The user s password is the click points and their order. The click points are clickable areas in the password image which a user can identify them by looking at the key image. The click points and their order are either highlighted in the key image or the user can determine them with some prior knowledge. To make guessing the password more difficult, the number of clickable areas in the password image might be more than the click points. Figure 1 shows an example of password images and the corresponding key images prior to encryption or after decryption. 4. Communication Alternatives In the public terminal, the user receives and the screen displays a random password image with multiple clickable areas on terminal screen. At the same time, the key image with information about click points appear on the screen of user s handheld which is linked to the identity of the user. Therefore the user learns about the click points and their order if and only if she has access to her handheld. There are several ways to transfer the encrypted password image to the user s handheld which are explained in the followings. 4.1 Direct Communication The challenger sends a password image to the terminal. At the same time, the challenger prepares the key image, encrypts it, digitally signs the encrypted image and s it to the user s handheld. The user s handheld verifies the signature and decrypts the image. For every authentication, the key image changes but the password image may or may not change. Figure 2 illustrates the transactions
4 between challenger, terminal, handheld and the user in this method. Figure 2: Challenger-Handheld Direct Communication 4.2 Photographic Communication The challenger prepares a key image, encrypts it and sends it to the user s terminal. Using the handheld s camera, the user takes a photo of the encrypted key image which the handheld can decrypt it. At this point the user is able to click on the appropriate spots on the password image. The image on the screen remains unencrypted and doesn t match what the user sees on the handheld. However what is important here is the click points and not the actual image. Figure 3 illustrates the transactions between challenger, terminal, handheld and the user in this method. Figure 4: Challenger-Handheld Indirect Communication 4.3 Indirect Communication Similar to method 2, the challenger prepares a key image, encrypts it and sends it to the user s terminal. The user s handheld and terminal are able to communicate via Bluetooth or USB and transfer a copy of the password image to the handheld and decrypt it. At this point, the user is able to click on the appropriate spots on the password image. The image on the screen remains unencrypted and doesn t match what the user sees on the handheld. Again, what is important here is the click points and not the actual image. Figure 4 illustrates the transactions between challenger, terminal, handheld and the user in this method. 6. Discussion 6.1 Recognition-based or recall-based? Figure 3: Challenger-Handheld Photographic Communication The approach we take belongs to neither recognition nor recall-based system categories. It does borrow, however, elements from both. In the case the user selects a pin or a secret to be incorporated in the graphical password, our system can be categorized as recall-based. On the other hand, if we allow user to pick her own image, then the image can work similar to PassMark [16] (used as Anti-Phishing mechanism of Bank Of America [17]) which adds a flavor of Recognition-based systems to our proposed system.
5 6.2 Security Analysis and key-space With the introduction of the notion of random click points, it is computationally harder to perform attacks that depend on exhaustive search or password eavesdropping. More precisely, brute force, dictionary attacks, shoulder-surfing, and social engineering against the proposed scheme becomes arbitrarily hard. The number of unique clickable areas in the password image and the number of minimum click points required define completely the combinatorial complexity of the authentication scheme. The size of the key space grows both with the number of clicks and with the number of clickable areas. If the image has α clickable areas and p click points, there exist α P possible valid password combinations. Therefore, the probability of guessing a password is 1/α P. For instance, if there are 32 areas and the password length is 6 clicks then the total number of potential combinations is: α P = 32 6 = and conversely the probability of success is approximately 1/ The same calculation but for 64 areas and 8 password clicks produces approximately 2.8x10 15 combinations. A possible option to make the click areas easy to identify, is to use a user-defined PIN or password. This password can be incorporated into the image key. We can then prepare password image and key image such as the one shown in Figure 5. With 94 characters valid for passwords, a 10 by 10 matrix would be more than sufficient for our purpose. We continue by examining each one of the attacks independently. Table 2 compares the vulnerabilities of our suggested method with other graphical passwords. as screen recording. Contrary to plain graphical passwords, in our scheme, the attackers cannot utilize the screen capturing technique to expose our password. They can, however, use the captured clicks to mount a single access attack. To address that, for our future work, we plan to involve the hand-held device to verify the sites where we submit our authorization credentials. 6.3 Shoulder surfing When users enter their graphical passwords on a public terminal, there is always the risk of attackers stealing their password by direct observation. There has been previous research that we can apply on how to make the graphical passwords resistant against shoulder surfing [13]. In our solution, the terminal screen doesn t help the shoulder-surfer because each time the click points appear at different location of the password image. At the same time, smaller size screen of handheld device significantly diminishes the potential of shoulder surfing. 6.4 Terminal key-loggers and Malware? Graphical password scheme appear to immediately solve the key-logger security issue by replacing the keystrokes with clicks; so does our proposed scheme. Unfortunately, graphical password schemes do remain susceptible to more sophisticated attacks such Figure 5: An Password Image and Key Image for more complicated secrets 6.5 What if the handheld gets lost or stolen? The proposed system is resistant against physical security threats. If the click points are explicitly marked, then anybody who has access to the handheld can authenticate as the real owner of the handheld. For example, while the click points are marked in the key image, the order of clicks can be something that only the handheld owner knows. So
6 while having the handheld can reveal the click points, no knowledge about the click order will be provided. Figure 1 depicts an example supporting our argument: if the authentication system needs user to click on the clickable areas in just in order, then anybody who has access to the handheld can su the authentication. However, if the order is defined by a secret word (i.e. 5 digit pin) then having access to the handheld and consequently the key image is not sufficient for successful authentication. 6.6 Brute-force attacks Previous studies have shown that many password images have popular points. These points are more likely to be chosen by users as part of their passwords. These popular spots can be guessed or can be exploited by attackers using different techniques [14, 18]. In our system the clickable areas are randomly chosen by the system. Therefore, due to no human involvement all the areas in the image have equal possibility to be part of a clickable area and guessing become completely irrelevant. Another benefit of this system is that the terminal never learns any thing about the user password. For example, an ATM machine in the bank learns about user PIN number during the transaction. In our system, it only learns about some clickable areas which are randomly scattered on the image and will change for the next transaction. Table 2: Comparing security of our graphical password with other solutions Vulnerability/Issues Graphical Password Our Suggested method Dictionary Attack Guessing Spyware/Key-logger Shoulder-surfing Social Engineering 7. Related Work On of the seminal papers on the topic of graphical password goes back to 1996 which has been patented under United States Patent 5,559,961 [3]. The patent explains an authentication system that displays pieces of graphical image in a mosaic work fashion. Rather than entering a textual password, to successfully authenticate, the user must click on predetermined areas of an image in a correct sequence. User selects the click points and their order during the enrollment and they get stored in the system as the user s password. Since then, many other graphical password schemes have been proposed [12]. Déjà Vu [5] is a famous one form University of California at Berkeley which authenticates a user through her ability to recognize previously seen images. In Déjà Vu, images are randomly generated using a hash visualization technique. The enrolment contains password selection and a training phase to improve the user s recognition. In contrast, our proposed solution is more of a recall-based scheme. We don t need to train our users because the users learn about the click points by looking at the decrypted key image on her handheld device. While we randomly choose our image from a limited set of images, with a little bit change and add an image generator subsystem, we can mount machinegenerated images. PassPoint is another famous graphical password scheme [7] which allows arbitrary images to be used. As a result, a user can click on any place on an image to create a password. A picture contains hundreds to thousands of memorable points, so the possible password space is quite large. Our idea is very close to PassPoint except the click points are picked by the system not user. Passfaces [19] is a commercial authentication product based on the graphical password. Users are given a random set of faces (typically 3 to 7) to serve as their secret authentication code. They are then taken through a familiarization process. During the authentication process, users should pick out their assigned faces, one at a time, from successive groups of nine faces. There are some security concerns about graphical passwords. For example, in recall-based schemes such as PassPoint there are some areas in the image which are more likely to be selected by the users, known as hotspots [14]. Our proposed scheme is not vulnerable to hotspots because the click points are randomly selected. In addition, the graphical passwords are resistant against traditional key-loggers because the keystrokes have been replaced with clicks. However, more sophisticated spywares capable of screen recording [20] still can capture the user password. Our solution is resistant to this type of attack because we have separated the password entry from the password itself. The idea of using the handheld device as the second factor of authentication is not new either. There are some commercial products [15] [21] as well as many published paper such as [22]. Our work is different than any previous work as we are expanding the idea of graphical password into the two-factor authentication area. To our knowledge, this is something that hasn t been done in any other previous work. Some studies [23, 24] assume the user s handheld is a trusted device and they secure user s session on public terminals using the trusted handheld. While we agree that the personal handheld device might be
7 more secure and private than a public terminal, however we believe neither device is trustworthy enough to reveal the password to. We believe the physical security of the handheld devices is the greatest concern and any solution based on handheld devices should factor this risk. 8. Implementation As a proof of concept, we developed a web-based authentication system based on Microsoft.Net technology. We implemented three different types of password images: 1) Random images with random clickable areas. 2) User picked image with random clickable areas. 3) A grid of clickable squares. The clickable areas are implemented using widely deployable browser-independent server-side HTML Image Maps with circular or rectangular hot spots. Every clickable area is associated with a random code which is meaningful only for the authentication server. This code will be send to the authentication server when a clickable area is clicked. For the communications, we implemented a prototype of the direct communication (section 4.1) and the other methods are left for future developments. When the key image is displays on the user handheld, it indicates to the user the clickable areas. 9. Conclusion In this paper, we propose a new authentication scheme based on graphical password and multifactor authentication. Our approach can be effectively and securely used as user-friendly authentication mechanism for public and un-trusted terminals. Our proposed solution is unique in many ways: 1. It is the first graphical password solution that employs two-factor authentication. 2. We never assume the handheld device is trusted. 3. Our solution resists screen recording attacks. 4. Our method doesn t need a familiarization or a lengthy password setup process. 5. Lost or stolen handheld doesn t expose a security risk. We can apply our system to more than just authentication mechanisms: our system is applicable anywhere that there is a need to enter sensitive or private data. For instance, Social Security Number can be entered via our system without leaking or revealing any directly usable information to the terminal or even the handheld device. 9. References [1] "Authentication," in Wikipedia, the free encyclopedia [2] "Amecisco Inc.," [3] G. E. Blonder, "Graphical passwords," US Patent 5,559,961, [4] N. J. D. Kirovski, and P. Roberts, "Click Passwords," in IFIP International Information Security Conference, [5] R. Dhamija and A. Perrig, "Déjà Vu: a user study using images for authentication," USENIX Association Berkeley, CA, USA, 2000, pp [6] T. Pering, M. Sundar, J. Light, and R. Want, "Photographic authentication through untrusted terminals," Pervasive Computing, IEEE, vol. 2, pp , [7] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies, vol. 63, pp , [8] D. L. Nelson, Reed, U. S., & Walling, J. R., "Pictorial superiority effect," Journal of Experimental Psychology: Human Learning & Memory, vol. 2, pp , [9] D. V. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proceedings of the USENIX UNIX Security Workshop,(Portland), pp. 5-14, [10] V. Roth, K. Richter, and R. Freidinger, "A PINentry method resilient against shoulder surfing," Proceedings of the 11th ACM conference on Computer and communications security, pp , [11] M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd, "Reducing shoulder-surfing by using gaze-based password entry," Proceedings of the 3rd symposium on Usable privacy and security, pp , [12] X. Suo, Y. Zhu, and G. S. Owen, "Graphical Passwords: A Survey," IEEE Computer Society Washington, DC, USA, 2005, pp [13] S. Wiedenbeck, J. Waters, L. Sobrado, and J. C. Birget, "Design and evaluation of a shouldersurfing resistant graphical password scheme," in Proceedings of the working conference on Advanced visual interfaces, Venezia, Italy, 2006, pp [14] J. Thorpe and P. C. van Oorschot, "Human- Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords," in Proceedings of the 16 thannual Usenix Security Symposium, [15] "Positive Networks, the company, PhoneFactor," [16] D. Geer, "Security technologies go phishing," Computer, vol. 38, pp , 2005.
8 [17] "SiteKey at Bank of America," in [18] S. Chiasson, R. Biddle, and P. C. van Oorschot, "A second look at the usability of click-based graphical passwords," in Proceedings of the 3rd symposium on Usable privacy and security Pittsburgh, Pennsylvania 2007, pp [19] "Passfaces, the company," [20] "e-surveiller," in SurveilleTech LLC [21] "RSA, the company, RSA mobile," in [22] S. G. M Wu, R Miller "Secure Web Authentication with Mobile Phones," in DIMACS Workshop on Usable Privacy and Security Software, [23] R. Sharp, J. Scott, and A. Beresford, "Secure mobile computing via public terminals," in Proceedings of the International Conference on Pervasive, Dublin, Ireland, [24] M. Mannan and P. C. van Oorschot, "Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer," Financial Cryptography and Data Security (FC 07), 2007.
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Securing ATM Using Graphical Password Authentication Scheme
Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Pass-Image Authentication Method Tolerant to Video-Recording Attacks
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 767 773 ISBN 978-83-60810-22-4 Pass-Image Authentication Method Tolerant to Video-Recording Attacks Yutaka Hirakawa
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
International Journal of Computer Science and Applications Technomathematics Research Foundation Vol. 9, No. 3, pp. 20 36, 2012 PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT Waraporn Viyanon Computer Science Program, Department of Mathematics Faculty of Science, Srinakharinwirot University Bangkok,
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, April 2012, vol. 17, no. 1 (http://www.arraydev.com/commerce/jibc/)
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Shoulder Surfing attack in graphical password authentication
Shoulder Surfing attack in graphical password authentication ARASH HABIBI LASHKARI Computer Science and Data Communication (MCS), University Malaya (UM) Kuala Lumpur, Malaysia [email protected] SAMANEH
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune.
SECUREZZA Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune Abstract The current security systems and authentication systems have much weakness and are prone to break through. Textual
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
A Three Level Graphical Password Scheme for Providing High Degree of Security
A Three Level Graphical Password Scheme for Providing High Degree of Security Pranita H. Mokal 1, R. N. Denikar 2 1 Pune University, Amrutvahini College of Engineering, Sangamner-422605 2 Professor, Pune
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication Mohd Anwar and Ashiq Imran Department of Computer Science North Carolina A&T State University [email protected],
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao 1, Aditya Gaykar 2, Rohit Jha 3, Vipul Honrao 4 Department of Computer Engineering, Fr. C.R.I.T., Vashi,
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Securing Network Input via a Trusted Input Proxy
Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash University of Michigan {kborders, aprakash}@umich.edu Abstract The increasing popularity of online transactions involving sensitive
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Securing Cloud Applications with Two-Factor Authentication
Institute of Parallel and Distributed Systems University of Stuttgart Universitätsstraße 38 D 70569 Stuttgart Master Thesis Nr. 3452 Securing Cloud Applications with Two-Factor Authentication Umair Ashraf
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Keywords Authentication, Biometric, GAIT, Graphical Password, Multi-Factor Authentication, Usability- Deployability-Security Framework, ZEBRA.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Analysis
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
How Secure is Authentication?
FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site
Guidance on Multi-factor Authentication
Guidance on Multi-factor Authentication June 2006 Guidance on Multi-factor Authentication Guidance on Multi-factor Authentication State Services Commission June 2006 Version 1.0 ISBN 0-478-24466-5 Crown
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Authentication Methods Used for Banking. Seth Thigpen. East Carolina University
Banking Authentication 1 BANKING AUTHENTICATION METHODS Authentication Methods Used for Banking Seth Thigpen East Carolina University Banking Authentication 2 Abstract Banks are storehouses of personal
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
2 FACTOR + 2. Authentication WAY
2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
