Enhanced Textual Password Scheme for Better Security and Memorability
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 7
Abstract
Traditional textual password scheme provides a large number of password combinations but users generally use a small portion of available password space. Complex textual passwords are difficult to remember, therefore most users choose passwords with small length and contain dictionary words. Due to the use of small password length and dictionary words, textual passwords become easy to crack through offline guessability attacks. Traditional textual passwords scheme is also weak against keystroke logger attacks because alphanumeric characters are directly inserted into the password field. In this paper, enhancements are proposed in the registration and login screen of the traditional textual password scheme for improving security against offline guessability attacks and keystroke logger attacks. The proposed registration screen also improve memorability of traditional textual passwords through visual cues or pattern-based approach. In the proposed login screen, passwords are indirectly inserted into the password field, to resist keystroke logger attacks. A comparative analysis between the passwords created in traditional and proposed pattern-based approach is presented. The testing results show that users create strong and high entropy passwords in the proposed pattern-based approach as compared to the traditional textual passwords approach.
Authors and Affiliations
Hina Bhanbhro, Shah Zaman Nizamani, Syed Asif Hassan, Sheikh Tahir Bakhsh, Madini O. Alassafi
E-Participation Modeling and Developing with Trust for Decision Making Supplement Purpose
ICT has been employed in various areas, including e-Participation to support citizen participation and achieve democracy ideal. Trust as a social behavior can be used as a method to model preferences and facilitate...
GIS Utilization for Delivering a Time Condition Products
As population is increasing rapidly all over the world, the need for delivering products is being more difficult especially for conditional products (products with life time). Many Customers require conditional products...
Secure user Authentication and File Transfer in Wireless Sensor Network using Improved AES Algorithm
The WSN technology is a highly efficient and effective way of gathering highly sensitive information and is often deployed in mission-critical applications, which makes the security of its data transmission of vital sign...
Cosine Based Latent Factor Model for Precision Oriented Recommendation
Recommender systems suggest a list of interesting items to users based on their prior purchase or browsing behaviour on e-commerce platforms. The continuing research in recommender systems have primarily focused on devel...
A New Mixed Signal Platform to Study the Accuracy/Complexity Trade-Off of DPD Algorithms
The increase in bandwidth of Power Amplifier (PA) input signals has led to the development of more complex behavioral PA models. Most recent models such as the Generalized Memory Polynomial (1) or the Polyharmonic distor...