<fmt:message key='jsp.layout.header-default.alt'/>  

DSpace@UM >
Faculty of Computer Science and Information Technology >
Masters Dissertations: Computer Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/1812/959

Title: A new algorithm for graphical user authentication based on rotation and resizing
Authors: Habibi Lashkari, Arash
Keywords: Graphical User Authentication
Graphical password
Multifactor graphical
Strong Password
Usability Features in graphical password
Security Features in graphical password
Issue Date: May-2010
Publisher: University Malaya
Abstract: It is now beyond any doubt that USER AUTHENTICATION is the most critical element in the field of Information Security. To date, Text Based Password Authentication (TBPA) has shown some difficulties that users have tended to write passwords down manually or save them on hard disc. This tendency is caused by the passwords being strong and thus difficult to memorize in most cases. This has inadvertently given rise to security issues pertaining to attack. Graphical User Authentication (GUA) has two symbiotic pillars as its foundation: USABILITY & SECURITY. The macro-concept of GUA is based on the human psychological factor that is images are more readily committed to memory than would TBPA’s. All GUA algorithms are made up of both usability and security aspects. Unfortunately none of the existing algorithms are able to cover both of these aspects at the same time. The main purpose of this thesis is an algorithm that combines the usability & security features. by Rotating and Resizing the Images. This algorithm process on the images which user select during login phase and show a different picture the original password of the user into a GUA. Whereas previously the GUA’s were at the log-in stage, this algorithm would be at the registration stage. On the other hand, unlike previous graphical user authentication algorithms, in this algorithm the images selected as passwords in the registration phase will be different from the images in log-in phase. The usability features of implemented algorithm will be checked by a questionnaire survey based on ISO usability features that are defined in literature review. The attack resistance features will be evaluated by calculating the “Password Entropy” and “Password Space” and compared with the previous algorithms. These are the two major evaluation methods for graphical passwords. A comparison table for analysis will be created to compare previous algorithms with the proposed algorithm.
Description: Dissertation (M.C.S.) -- Faculty of Computer Science & Information Technology, University Malaya, 2010
URI: http://dspace.fsktm.um.edu.my/handle/1812/959
Appears in Collections:Masters Dissertations: Computer Science

Files in This Item:

File Description SizeFormat
thesis.pdfFull thesis2.75 MBAdobe PDFView/Open

This item is protected by original copyright

Your Tags:


  © Copyright 2008 DSpace Faculty of Computer Science and Information Technology, University of Malaya . All Rights Reserved.
DSpace@UM is powered by MIT - Hawlett-Packard. More information and software credits. Feedback