Enhanced Textual Password Scheme for Better Security and Memorability
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 7
Abstract
Traditional textual password scheme provides a large number of password combinations but users generally use a small portion of available password space. Complex textual passwords are difficult to remember, therefore most users choose passwords with small length and contain dictionary words. Due to the use of small password length and dictionary words, textual passwords become easy to crack through offline guessability attacks. Traditional textual passwords scheme is also weak against keystroke logger attacks because alphanumeric characters are directly inserted into the password field. In this paper, enhancements are proposed in the registration and login screen of the traditional textual password scheme for improving security against offline guessability attacks and keystroke logger attacks. The proposed registration screen also improve memorability of traditional textual passwords through visual cues or pattern-based approach. In the proposed login screen, passwords are indirectly inserted into the password field, to resist keystroke logger attacks. A comparative analysis between the passwords created in traditional and proposed pattern-based approach is presented. The testing results show that users create strong and high entropy passwords in the proposed pattern-based approach as compared to the traditional textual passwords approach.
Authors and Affiliations
Hina Bhanbhro, Shah Zaman Nizamani, Syed Asif Hassan, Sheikh Tahir Bakhsh, Madini O. Alassafi
MRPPSim: A Multi-Robot Path Planning Simulation
Multi-robot path planning problem is an interesting problem of research having great potential for several optimization problems in the world. In multi-robot path planning problem domain (MRPP), robots must move from the...
Performance Evaluation of Two-Hop Wireless Link under Nakagami-m Fading
Now-a-days, intense research is going on two-hop wireless link under different fading conditions with its remedial measures. In this paper work, a two-hop link under three different conditions is considered: (i) MIMO on...
Cost-Effective, Cognitive Undersea Network for Timely and Reliable Near-Field Tsunami Warning
The focus of this paper is on developing an early detection and warning system for near-field tsunami to mitigate its impact on communities at risk. This a challenging task, given the stringent reliability and timeliness...
Image Processing Based Customized Image Editor and Gesture Controlled Embedded Robot Coupled with Voice Control Features
In modern sciences and technologies, images gain much broader scopes due to the ever growing importance of scientific visualization (of often large-scale complex scientific/experimental data) like microarray data in gene...
Feedback Optimal Control of Low-thrust Orbit Transfer in Central Gravity Field
Low-thrust trajectories with variable radial thrust is studied in this paper. The problem is tackled by solving the Hamilton- Jacobi-Bellman equation via State Dependent Riccati Equation( STDE) technique devised for nonl...