Loading

Protection against Online Password Guessing Attacks by Using Graphicals Passwords
Kiran Babu T.S1, Ragav Krishna.R2

1Kiran Babu T.S, Assistant Professor, Department of Computer Science & Engineering, CMR Institute of Technology, Bangalore (Karnataka), India.
2Ragav Krishna R, B.E Scholar, Department of Computer Science & Engineering, CMR Institute of Technology, Bangalore (Karnataka), India.
Manuscript received on 8 December 2013 | Revised Manuscript received on 18 December 2013 | Manuscript Published on 30 December 2013 | PP: 185-187 | Volume-3 Issue-7, December 2013 | Retrieval Number: G1393123713/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Usable security has unique usability challenges because the need for security often means that standard human computer-interaction approaches cannot be directly applied. A very pivotal usability goal for authentication systems is to support users in selecting secure passwords. Users often create predictable and easy to remember passwords that are easy for attackers to hack or guess, but system-assigned passwords which are inherently strong are difficult for users to remember. We are proposing alternative methods wherein graphical pictures are used as security agents (passwords). Graphical passwords fundamentally use images or representation of images as passwords. Pictures are more lucid and easy to remember for the human brain than textual character. There for, this paper merges persuasive cued click points and password guessing resistant protocol. The pith and main intent of this work is to reduce the guessing attacks as well as encouraging users to select passwords that are random and thus logically become more difficult to guess. The rudimentary security threats including brute force attacks and dictionary attacks can be successfully abolished using this method.
Keywords: Authentication, Graphical Passwords, Guessing Attacks, Computer Security.

Scope of the Article: Advanced Computer Networking