<fmt:message key='jsp.layout.header-default.alt'/>  
 

DSpace@UM >
Faculty of Computer Science and Information Technology >
Masters Dissertations: Computer Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/1812/982

Title: An analytical study of 4-way recognition based sequence reproduction scheme in graphical password
Authors: Farmand, Samaneh
Keywords: Computer security
Network security
Textual password
Graphical passwords
Issue Date: Jun-2010
Publisher: University Malaya
Abstract: Computer and Network security is a very crucial issue of growing concern impacting user authorisation where textual passwords are widely used when accessing computers, networks, accounts and websites. A big drawback of the textual password is its inability to resist against several forms of password attacks such as guessing, dictionary attack, key-loggers, shouldersurfing and social engineering. Other than being able to be secure against these attacks, passwords should be easy to memorise and recall. Therefore, usability and security are two important issues of concern when working with passwords. Graphical Password seems to be the solution for the conventional type of authentication, text-based passwords, which will be briefly described throughout this document. Graphical authentication schemes originally contain pictures that either the user has to click on parts of it or choose different shapes and images. Researchers have also made possible for users to draw their own image on grids. Despite the high standards of Graphical Passwords, they are still vulnerable to some kinds of attacks. Our goal is to propose a new Graphical Password scheme that takes advantage of graphical input display capabilities to achieve higher security and better usability levels than can be achieved through text-based passwords. The proposed research is an approach to enhance existing Graphical Password techniques and make it resistant against attacks like Shoulder Surfing. This system has been improved to provide a wider password space in such a way that more server variables are involved such as the inclusion of a date and its combinations when choosing the password. A waterfall model is used to perform the software development life cycle phases because is the most adequate model for implementing small to mid size projects. On top of that other techniques for gathering data such as questionnaires and surveys are used to assess the security and usability features of the system [See Chapter Six, Tables 6.5 and 6.6]. Overall, based on the results of the evaluation of the system it is concluded that users were satisfied using the system; therefore it can be concluded that most of the usability features have been achieved, as well as the mentioned security parameters that is being resistant to shoulder surfing and guessing attacks. The study on the robustness of the system against Sniffing and the provision of a facility for users to upload their own pictures as another alternative for a password is also suggested for further study.
Description: Dissertation (M.I.T.) -- Faculty of Computer Science & Information Technology, Universiti Malaya, 2010.
URI: http://dspace.fsktm.um.edu.my/handle/1812/982
Appears in Collections:Masters Dissertations: Computer Science

Files in This Item:

File Description SizeFormat
Dissertation- Samaneh Farmand.pdfFull Thesis1.48 MBAdobe PDFView/Open


This item is protected by original copyright



Your Tags:

 

  © Copyright 2008 DSpace Faculty of Computer Science and Information Technology, University of Malaya . All Rights Reserved.
DSpace@UM is powered by MIT - Hawlett-Packard. More information and software credits. Feedback