CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Study of Various Passwords Authentication Techniques

Published on February 2015 by Aakansha Gokhale, Vijaya Waghmare
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2014 - Number 3
February 2015
Authors: Aakansha Gokhale, Vijaya Waghmare
6c15a1e4-d171-4266-b079-2f769d8c0b8c

Aakansha Gokhale, Vijaya Waghmare . A Study of Various Passwords Authentication Techniques. International Conference on Advances in Science and Technology. ICAST2014, 3 (February 2015), 1-5.

@article{
author = { Aakansha Gokhale, Vijaya Waghmare },
title = { A Study of Various Passwords Authentication Techniques },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2015 },
volume = { ICAST2014 },
number = { 3 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icast2014/number3/19482-5030/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Aakansha Gokhale
%A Vijaya Waghmare
%T A Study of Various Passwords Authentication Techniques
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2014
%N 3
%P 1-5
%D 2015
%I International Journal of Computer Applications
Abstract

Information and computer security is supported by passwords. Password is the principal part of authentication process. The traditional authentication method is to use text-based password which is also called alphanumeric password. But it has significant drawbacks. So to overcome vulnerabilities of this traditional password scheme a graphical password scheme is developed. But major drawback of graphical scheme is it is vulnerable to shoulder surfing attack and also sometimes to spyware attack. So alternative technique to graphical password a Captcha technique is developed. The major advantage of Captcha is that it can not be identified by bots. Captcha gives the protection from unwanted bots. Also there are some limitations of Captcha, and to overcome those after Captcha for more robust security a new technique is developed which is CaRP (Captcha as gRaphical Passwords). This paper will explore all the passwords techniques for security.

References
  1. K. Renaud. "Evaluating authentication mechanisms". In L. Cranor and S. Garnkel, editors, Security and Usability: Designing Secure Systems That PeopleCanUse, chapter 6, pp. 103-128. O'Reilly Media, 2005.
  2. A. Adams and M. A. Sasse. "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures". Communications of the ACM, 42:41-46, 1999.
  3. D. Feldmeier and P. Karn. "UNIX Password Security-Ten Years Later". In Crypto'89, August 1989.
  4. R. Morris and K. Thompson. "Password Security: A Case History". Communications of the ACM,22(11):594-597, 1979.
  5. D. Florencio and C. Herley. "A large-scale study of WWW password habits". In 16th ACM International World Wide Web Conference (WWW), May 2007.
  6. A. Adams, M. A. Sasse, and P. Lunt. "Making passwords secure and usable". In HCI 97: Proceedings of HCI on People and Computers, pp. 1-19, London, UK, 1997. Springer-Verlag.
  7. Xiaoyuan Suo, Ying Zhu, G. Scott. Owen, "Graphical Passwords: A Survey", Department of Computer Science Georgia State University
  8. Blonder G. (1996) In Lucent Technologies, Inc. , Murray Hill, NJ, United States Patent 5559961.
  9. R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9 USENIX Security Symposiums, 2000.
  10. Real User Corporation (2007) Passfaces T M , http//:www. realuser. com.
  11. L. Sobrado and J. C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002
  12. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
  13. S. Sariou, S. D. Gribble, and H. M. Levy. Measurement and Analysis of Spyware in a University Environment. In Proceedings of the ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco CA, 2004
  14. D. Weinshall. Cognitive Authentication Schemes Safe Against Spyware. In Symposium on Security and Privacy, 2006.
  15. J. Yan and A. S. El. Ahmad. Usability of CAPTCHAs - Or, Usability issues in CAPTCHA design. In the 4th Symposium on Usable Privacy and Security, Pittsburgh, USA, July 2008.
  16. R. Lin, S. -Y. Huang, G. B. Bell, and Y. -K. Lee, "A new CAPTCHA interface design for mobile devices," in Proc. 12th Austral. User Inter. Conf. , 2011, pp. 3–8.
  17. S. Chiasson, P. C. van Oorschot, and R. Biddle, "Graphical password authentication using cued click points," in Proc. ESORICS, 2007,pp. 359–374.
Index Terms

Computer Science
Information Sciences

Keywords

Captcha Carp Graphical Password Text-based Password.