Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: IPAS: Implicit Password Authentication System
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
IPAS: Implicit Password Authentication System


[attachment=22805]

INTRODUCTION

Authentication is a process of determining whether a
particular individual or a device should be allowed to access
a system or an application or merely an object running in a
device. This is an important process which assures the basic
security goals, viz. confidentiality and integrity. Also,
adequate authentication is the first line of defense for
protecting any resource. It is important that the same
authentication technique may not be used in every scenario.
For example, a less sophisticated approach may be used for
accessing a “chat server” compared to accessing a
corporate database. Most of the existing authentication
schemes require processing both at the client and the server
end. Thus, the acceptability of any authentication scheme
greatly depends on its robustness against attacks as well as
its resource requirement both at the client and at the server
end. The resource requirement has become a major factor
due to the proliferation of mobile and hand-held devices.



Recall-Based Systems

In recall-based systems, the user is asked to reproduce
something that he/she created or selected earlier during the
registration phase. Recall based schemes can be broadly
classified into two groups, viz: pure recall-based technique
and cued recall-based technique.

Pure Recall-Based Techniques

In this group, users need to reproduce their passwords
without any help or reminder by the system. Draw-A-Secret
technique [8], Grid selection [9], and Passdoodle [10] are
common examples of pure recall-based techniques.
In 1999, Jermyn et al. [8] proposed DAS (Draw-ASecret)
scheme, in which the password is a shape drawn on
a two-dimensional grid of size G * G as in Figure 1. Each
cell in this grid is represented by distinct rectangular
coordinates (x, y). The values of touch grids are stored in
temporal order of the drawing.


Cued Recall-Based Techniques

In this technique, the system gives some hints which
help users to reproduce their passwords with high accuracy.
These hints will be presented as hot spots (regions) within
an image. The user has to choose some of these regions to
register as their password and they have to choose the same
region following the same order to log into the system. The
user must remember the “chosen click spots” and keep them
secret. There are many implementations, such as Blonder
algorithm [12] and PassPoint scheme [13].


PROBLEMS WITH THE EXITING SCHEMES

Traditional alphanumeric passwords are always
vulnerable to guessing and dictionary attack. There may
even be a rogue program that may record the key strokes
and publish it on a remote website. In order to overcome the
key logger based attacks, newer systems may show a
graphical keyboard and the user has to press the correct
password using “mouse clicks”. This may also be defeated
if the attacker uses a screen capture mechanism, rather than
using a key logger. Since new video-codec is providing
higher compression ratio, an attacker may use a screen
capture program and record a short video clip and send it to
a remote server for publishing.


IPAS Implementation Framework
The bank will have a set of 100 to 200 questions. Every
user selects a set of 10 to 20 questions at the time of
registration and provides their individual answer. For each
question, the system then either creates an authentication
space (the space that represents implicit answers for the
questions using images) if it is not available or add the new
user’s answer to the existing authentication space. Once the
authentication space is created, the system is ready for
authenticating a user.
IPAS: Implicit Password Authentication System

[attachment=29616]

Abstract

Authentication is the first line of defense against
compromising confidentiality and integrity. Though traditional
login/password based schemes are easy to implement, they
have been subjected to several attacks. As an alternative, token
and biometric based authentication systems were introduced.
However, they have not improved substantially to justify the
investment. Thus, a variation to the login/password scheme,
viz. graphical scheme was introduced. But it also suffered due
to shoulder-surfing and screen dump attacks. In this paper, we
introduce a framework of our proposed (IPAS) Implicit
Password Authentication System.


INTRODUCTION

Authentication is a process of determining whether a
particular individual or a device should be allowed to access
a system or an application or merely an object running in a
device. This is an important process which assures the basic
security goals, viz. confidentiality and integrity. Also,
adequate authentication is the first line of defense for
protecting any resource. It is important that the same
authentication technique may not be used in every scenario.
For example, a less sophisticated approach may be used for
accessing a “chat server” compared to accessing a
corporate database. Most of the existing authentication
schemes require processing both at the client and the server
end. Thus, the acceptability of any authentication scheme
greatly depends on its robustness against attacks as well as
its resource requirement both at the client and at the server
end. The resource requirement has become a major factor
due to the proliferation of mobile and hand-held devices.

Pure Recall-Based Techniques

In this group, users need to reproduce their passwords
without any help or reminder by the system. Draw-A-Secret
technique [8], Grid selection [9], and Passdoodle [10] are
common examples of pure recall-based techniques.
In 1999, Jermyn et al. [8] proposed DAS (Draw-ASecret)
scheme, in which the password is a shape drawn on
a two-dimensional grid of size G * G as in Figure 1. Each
cell in this grid is represented by distinct rectangular
coordinates (x, y). The values of touch grids are stored in
temporal order of the drawing. If exact coordinates are
crossed with the same registered sequence, then the user is
authenticated. As with other pure recall-based techniques,
DAS has many drawbacks. In 2002, Goldberg [11]
conducted a survey which concluded that most users forget
their stroke order and they can remember text passwords
easier than DAS. Also, the password chosen by users are
vulnerable to graphical dictionary attacks and replay attack.

IMPLICIT PASSWORD AUTHENTICATION SYSTEM

In this section, we propose our Implicit Password
Authentication System. IPAS is similar to the PassPoint
scheme with some finer differences. In every “what you
know type” authentication scheme we are aware of, the
server requests the user to reproduce the fact given to the
server at the time of registration. This is also true in
graphical passwords such as PassPoint. In IPAS, we
consider the password as a piece of information known to
the server at the time of registration and at the time of
authentication, the user give this information in an implicit
form that can be understood only by the server. We explain
this through a Mobile Banking case-study.

Study Case of IPAS (Mobile Banking)

In our case study, we consider mobile banking as our
domain. However, our proposed (IPAS) may also be
implemented in any client-server environment, where we
need to authenticate a human as a client (IPAS will not work
in machine-to-machine authentication). We also assume that
the server has enough hardware resources like RAM and
CPU. This is not un-realistic as high-end servers are
becoming cheaper day-by-day. The bank may have a
database of 100 to 200 standard questions. During the time
of registration, a user should pick 10-20 questions from the
database (depending upon the level of security required) and
provide answers to the selected questions.

CONCLUSION AND FUTURE DIRECTIONS

In this paper, we have proposed a new Implicit Password
Authentication System where the authentication information
is implicitly presented to the user. If the user “clicks” the
same grid-of-interest compared with the server, the user is
implicitly authenticated. No password information is
exchanged between the client and the server in IPAS. Since
the authentication information is conveyed implicitly, IPAS
can tolerate shoulder-surfing and screen dump attack, which
none of the existing schemes can tolerate. The strength of
IPAS lies in creating a good authentication space with a
sufficiently large collection of images to avoid short
repeating cycles. Compared to other methods reviewed in
our paper, IPAS may require human-interaction and careful
selection of images and “click” regions. IPAS may also
need user training.