A New Approach towards Secure Password Authentication Based on CARP

نویسنده

  • Shanmuga Sundari
چکیده

The Most of the protected resources are based on difficult math issues. How to use hard Artificial Intelligence issues for protection is growing as an exciting new paradigm, but has been under-explored. We apply a new protection resource are based on hard personal Artificial Intelligence issues. CARP also provides a new technique to address the famous image hotspot issue in popular graphical password systems, such as Pass-Points that most often lead to weak password choices. A CARP password scheme can be found only probabilistically by automatic online guessing attacks, also if the password is in the search set. Novel relatives of graphical password systems built on top of the Captcha technology, which we call Captcha As graphical passwords (CARP). CARP is both a Captcha and a graphical password technique. CARP addresses a number of protection issues, such as online guessing attacks, replay attacks, and, in addition, if combined with dual-view technologies, shouldersurfing attacks. CARP is not a solution, but it also offers reasonable protection and usability and appears to fit well with some practical applications for improving online protection. CARP also provides a new technique to address the famous image hotspot issue in popular graphical password systems, such as Pass-Points that most often lead to weak password choices. A CARP password scheme can be found only probabilistically by automatic online guessing attacks, also if the password is in the search set. Index Terms — Graphical password, hotspots, Password, CaRP, Captcha, dictionary attack, password guessing attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Advancements in Password-based Cryptography

Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite increasing efforts to move to supposedly more secure alternatives, password-based authentication is most likely to stay for the foreseeable future due to its user experience and convenience. However, although secure cryptographic protocols for password-based authenticat...

متن کامل

An Efficient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet

Authenticated key agreement protocols, aiming at solving the problems to set up a secure channel over public Internet, can achieve authentication of the corresponding participants and confidentiality of data transmission. Nowadays, most of the authenticated key agreement protocols pay close attention to security, efficiency and user friendly at the same time. One-time password-authenticated alg...

متن کامل

CAPCHA as Graphical Password

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. In this paper, we conduct a comprehensive survey of the existing graphical password ...

متن کامل

Destructible Password Functionality Authentication Protocol

One of the biggest challenges that face the use of password as a security token is its low entropy. Researchers have proposed a cryptographic approach in an attempt to strengthen the security of password systems. In this paper, we investigate a new approach using irreducible polynomial in prime field GF (2) to build a secure password system that transforms the text of the password with every tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015