CHESS GAME AS A TOOL FOR AUTHENTICATION SCHEME

 
CONTINUE READING
CHESS GAME AS A TOOL FOR AUTHENTICATION SCHEME
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue4 pp 076-083      July 2012                         www.ijsret.org           ISSN 2278 - 0882

       CHESS GAME AS A TOOL FOR AUTHENTICATION SCHEME
                                               Sandeep Kumar Pandey
                                          Department of Information Technology
                                         Institute of Technology and Management
                                                   Gorakhpur (U.P), India
                                             sandeeppandey8137@gmail.com

ABSTRACT                                                       resistant property is not strong. To overcome these
First phase for information security is authentication         problems,      we     propose     a     textual-graphical
and the main phase for authentication is memorability          authentication scheme which is based on certain rule
of password and rules that will be used for                    of chess game. It is based on the fact that an estimated
                                                               600 to 700 million people worldwide know that how to
authentication purpose. The most commonly used
                                                               play chess [1]. Hence it is easier for user’s to use this
scheme is textual scheme. However the strong                   scheme because it is based on certain rule of
password of textual scheme is hard to memorize and             worldwide playing game and the users who did not
normal passwords are vulnerable to many attacks.               know about game, they can easily memorize these
Hence, graphical authentication scheme has been                rules, because these rules are certain interesting rule of
proposed as an alternative solution, motivated                 a game. Hence this authentication scheme is propose to
                                                               increase the capability of strong password and security
particularly by the fact that humans can remember
                                                               for user, because high capability of scheme is mainly
images better than text. However, these are vulnerable         based on memorability. This scheme not only
to shoulder surfing attack. To overcome this problem           increases the memorability but also increase usability
many grid based authentication schemes has been                because it is based on a worldwide playing game. The
proposed. But, either these scheme’s shoulder surfing          proposed authentication scheme will strongly resist the
resistant property is not strong or these have many            many attacks such as shoulder-surfing, brute force
complex rules, which are hard to memorize. Hence, to           attack, dictionary attack, password stealing, hidden
                                                               cameras, random-click attack,. This paper is organized
overcome these problems we propose an
                                                               as follows. In Section 2 related work is discussed. In
authentication scheme which is based on chess game.            Section 3 the authentication scheme based on the tool
Since this scheme contains only two rules of chess,            and its enhanced variants are proposed. Section 4
hence easy to memorize.                                        represents the analysis and discussion. Section 5
                                                               represents user study and Section 6 represents
Keywords: Session password, Password pair,                     conclusion.
Memorability, Rook rule, Bishop Rule.
                                                                 II.    RELATED WORK
                                                               In old times, for securing communication between
  I.    INTRODUCTION                                           soldiers, watchwords are used. Through this they
The most commonly used schemes Textual scheme. In              would challenge who wishes to enter their territory.
this scheme, a simple string of password is used for           After some time, it was necessary to transmit these
password. However the strong password of textual               watchwords in very secure way [2].Alpha-numeric
scheme is hard to memorize and normal passwords are            passwords were first introduced in the 1960s as a
vulnerable to many attacks such as hidden camera               solution to security issues that became most commonly
attack, shoulder-surfing attack, brute force attack etc.       used password scheme for users. These are easy to use
To increase the memorability of password, a graphical          but vulnerable to many attacks such as dictionary
password scheme has been proposed. This scheme                 attack, shoulder-surfing etc. These attacks take too
based on the fact that human can remember images               much less time to break alpha-numeric or textual
better than text; hence the capability of password will        passwords. According to Adams and Sasses [3] users
be increased. But these are also vulnerable to many            tend to choose short and/or guessable passwords which
attacks such that shoulder surfing and hidden camera.          are easy to use and memorize. And these user’s acts
To overcome these problems, Biometric system and               make authentication scheme vulnerable. But they also
Textual-Graphical scheme have been proposed. But               came on conclusion that system developers and
biometric system’s devices are too much costly and             operators can move beyond blaming users towards
textual graphical methods either force to memorize too         developing security systems that users can actually
many text strings and rules or their shoulder surfing

                                                    IJSRET @ 2012
CHESS GAME AS A TOOL FOR AUTHENTICATION SCHEME
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue3 pp 076-083       July 2012                       www.ijsret.org           ISSN 2278 - 0882

use. Hence, many graphical schemes have been                   Jansen [18, 19] proposed a graphical password
proposed as an alternative to conventional textual             authentication scheme for mobile devices. During
based schemes. These schemes based on the fact that            password creation in registration phase, a user selects a
human can remember images better than textual                  theme consisting photos in thumbnail size and set a
password, and it is also based on assumption that              sequence of picture as password. But the password
images are too much worth than text Shepard                    space of this scheme is not large because the number
[4].Blonder [5] designed a graphical password scheme           of images is limited to 30. Syukri [20] develop a
in which a password is created by having the user click        technique where authentication is done by drawing
on several locations and during authentication; the user       user signature using mouse. But the main problem
must click on pre-defined location of image.                   associated with this scheme is that drawing with
Wiedenbeck et al. [6, 7, 8] proposed the “Pass Point”          mouse is not familiar to many people, because it is
system. This system extended Blonder’s idea by                 difficult to draw the signature in the same coordinates
allowing arbitrary images to be used and eliminating           or same perimeters at the time of registration. Man, et
the predefined boundaries. Hence, a user can click on          al. [21] proposed another shoulder surfing resistant
any place on an image (which is opposed to some pre-           algorithm in which user select a number of pictures as
defined areas) to create his/her password. In this             pass-objects. Each pass-object has several variants and
system, tolerance is calculated around each chosen             each variant is assigned a unique code. During
pixel. During authentication, the user must have to            authentication, the user is challenged with several
click within the tolerance of the chosen pixels.               scenes. Each scene contains several pass-objects and
Dhamija and Perrig [9] proposed a graphical                    many decoy objects. The user has to type in a string
authentication scheme where the user has to identify           with the unique code corresponding to the pass-object
the predefined images to prove user’s authenticity. In         variants present in the scene as well as code indicating
this system the user select a certain number of images         the relative location of the pass-objects in reference to
from a set of pictures during registration. Later during       a pair of eyes. The common weakness in these entire
login the user has to identify the pre-selected images         graphical password authentication schemes is that they
for authentication from a set of images. Passface [10]         are vulnerable to shoulder surfing attacks. Hong, et al.
is a technique based on the assumption that people can         [22] later expended this approach to allow users to
recall human faces from a face database as their future        assign their own codes to pass-object variants.
password. In this authentication scheme, the user is           Haichang et al. [23] proposed a new shoulder surfing
presented with grid of nine faces, consisting of one           resistant scheme, where the user is required to draw a
face previously chosen by the user and eight decoy             curve across their password images orderly rather than
faces. The user recognizes the faces and click                 clicking on them directly. However, these graphical
anywhere on known face. Since there are four user              schemes have complex rule to memorize or their
selected images, it is done for four times. Davis, et al.      shoulder-surfing resistant property are not strong.
[11] proposed a graphical authentication scheme that           More graphical password schemes have been
used images instead of faces. Weinshall and                    summarized in a recent survey paper [24]. To make
Kirkpatrick [12] proposed several authentication               password scheme shoulder- surfing resistance, many
schemes such as pseudo word recognition; object                Biometric and Textual-Graphical schemes have been
recognition and picture recognition. They conducted            proposed. But the devices of biometric system are too
many user studies on these recognitions and came on            much costly. Hence its usability is low. Zhao and Li
conclusion that pictures are most effective than the           [25] proposed a shoulder-surfing resistant scheme
other two proposed schemes. Jermyn, et al. [13]                “S3PAS”. In this scheme user create a textual
proposed a technique called “Draw A Secret (DAS)”,             password during registration and makes combination
where the user is required to re-draw the predefined           of three pass characters. And use these pass-characters
picture on 2D grid. The coordinates of this drawing on         to make session password by clicking inside the
the grid are stored in order. For valid authentication         triangle made by these pass-characters in a displayed
user have to redraw images which touches all                   grid. The main problem of this scheme is that it
coordinates of image in same sequence. Some further            contains three click-rules. Hence, forces user to
researches based on DAS were conducted [14, 15,                memorize too may rules. . M Srilatha et al. [26]
16].Goldberg [17] designed a technique known as                proposed two authentication schemes for session
“pass doodle”. In this graphical authentication scheme,        password using color and images. In his pair-based
stylus is used to draw handwritten design or text onto a       authentication scheme, user make textual password in
touch sensitive screen. They came on conclusion that           registration phase and use this password to make pass
order should be neglected because order in which               pair. The first symbol of pass pair is used to select the
password is drawn introduces too much complexity. S.           row and second symbol is used to select column on

                                                     IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue3 pp 076-083       July 2012                       www.ijsret.org           ISSN 2278 - 0882

displayed grid, and the intersection of row and column
is the session password for login phase. The main
problem with this scheme is that in this length of
textual password should be even and there should be
no pass pair having both symbol identical i.e. “SS”. In
his Hybrid textual authentication scheme, the user has
to rate the color. The first color of every pair in color      Fig1 (a).Bishop Movement Fig 1(b).Rook Movement
grid represents row and second represents column of
the number grid. The number in the intersection of the
row and column of the grid is part of the session              For Bishop Movement, I always select longest
password. However, this method forces the user to              diagonal for movement. This will be called as bishop
memorize color rating and not applicable for color             rule. To make ease for user, so that he/she can select
blindness user.        To increase usability many              longest diagonal too easily; we divide the grid into
authentication schemes has been proposed which are             four quadrant and give the direction to each quadrant.
based on games. Hai Tao and Adams [27] proposed                Hence, for Bishop Movement, user has to see that
graphical scheme on the basis of ancient game “Pass-           his/her original password is in which quadrant, and
Go”. As the name implies, Pass-Go is a grid-based              then select the movement according to the direction
scheme. However, different from DAS, Pass-Go                   given in respective quadrant. The fallowing figure
requires a User to select (or touch) intersections             (Figure 2) shows the respective quadrant and direction
instead of cells, as a way to input a password.                with grid.
Consequently, the coordinate system refers to a matrix
of intersections, rather than cells as in DAS.
Malempati and Mogalla [28] proposed an
authentication scheme based on ancient Indian game.
This scheme increase usability as well as memorability
than other graphical scheme. But the main drawback of
these two schemes is that they are vulnerable to
shoulder surfing attack and to overcome these problem
they perform some mapping through which they can
make session password. These extra mapping not only
increase complexity but also decrease the
memorability and usability because due to use of these
mapping, user have to remember many rules.

III.    AUTHENTICATION SCHEME USING                            Figure 2.Quadrants and respective direction for
        “CHESSGAME”                                            selecting longest diagonal in Bishop Rule
This authentication scheme contains three phase:
Registration, Login and Verification. In registration
phase, user has to submit his/her user name and                3.1. Notation
Password. The minimum length of password should be             There are the fallowing notations, which will be used
7. In login phase, an interface of grid (10×10 or              throughout the paper for analysis and discussion.
12×12) will be displayed, through which user have to
make his session password by using certain rule of                    S: Set of all printable symbols which are used
chess game (i.e. Bishop Rule and Rook rule). The                        in grid.
verification phase will verify the password of user and
allow him/her to access their account. The two pieces                 |S|: Total number of printable symbolic grid.
of chess, whose rules used in this authentic cation                   K: Original password which is Special
scheme, are Bishop and Rook. In chess, the bishop can                   combination of printable symbol.
move any number of squares diagonally. And Rook                       |K|: Total number of printable symbol in
can move any number of squares along any rank or                        original password.
file, or can move any number of square vertically or
                                                                      |P|: Total number of Priority set.
horizontally. I called it Rook rule. The movement of
Bishop and Rook are shown in figure 1(a) and 1(b)                     |L|: Length of session password in Enhanced
respectively.                                                           Scheme(i.e. based on priority set)

                                                     IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue3 pp 076-083      July 2012                       www.ijsret.org            ISSN 2278 - 0882

3.2. Basic Authentication Scheme                                    4. Bob finds his characters of pair-pass “S” and
This scheme contains mainly two variants, which are                    “1”, since the movement through Bishop Rule
designed for different security and environment. The                   and vertical movement of Rook have a
basic authentication scheme is one of them. In                         common square, hence click or input the
registration phase, user has to submit his password just               session character (i.e., “L”).
like conventional textual password i.e. K. This
password will be known as original password, which
has to be memorized to user. In this scheme, user has
to consider his original password in term of pair of
password or pass pair. To generate pass pair, let us
take a K, which is set of character K1,K2,K3.....,Km, m
= |K|(where K1 is first symbol of string K, K2 is second
symbol,K3 is third symbol and so on). User has to
consider his original pass in terms of pairs. First pair
will be K1K2, second will be K3K4 and so on. If |K| is
odd then last pair will be K1Km. The first symbol of
pass pair will be used for Bishop Rule, and the second
symbol will be used for movement of Rook in vertical
direction. The common square of these movements
(i.e. intersection symbol of these movements) will be
session password. If there is no common square, then                Figure 3(a).Common square for “SA” Pass-pair
move Rook in horizontal direction. If both symbol of
pass pair are identical then using Bishop rule, select
the third-next symbol from symbol of pass pair(i.e. for
top two quadrant, next will be going downward in
diagonal and for other two quadrant will be going
upward) as session password.

To show the login process, let us take an example. I
assume that the user Bob’s original password K is
“SANDEE1”. Since the length of the password is, |K|
= 7, based on the Basic authentication scheme rule,
Bob has to click four times correctly in the right
sequence to be authenticated. Since the |K| is odd, the
first three combinations pair pass in order are “SA”,
“ND”, “EE” and last will be “S1”. The login procedure               Figure 3(b).Common square for “ND” Pass-pair
consists of the following four steps and is also shown
in Figure 3(a) to (d).

    1. Bob finds his characters of pair-pass “S” and
       “A”, since the movement through Bishop rule
       and vertical movement of Rook is not
       intersecting, we move Rook in horizontal and
       find the common square of movements as
       session character (i.e., “R”).
    2. Bob finds his characters of pair-pass “N” and
       “D”, since the movement through Bishop Rule
       and vertical movement of Rook, have a
       common square, hence click or input the
       session character (i.e., “j”).
    3. Bob finds his characters of pair-pass “E” and
       “E”, since they are identical, hence click at                    Figure 3(c).Square for “EE” Pass-pair
       third- next symbol from character of pass –pair
       in diagonal using Bishop Rule or input the
       session character (i.e., “b”).

                                                    IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue3 pp 076-083        July 2012                        www.ijsret.org             ISSN 2278 - 0882

         Figure 3(d).Square for “S1” Pass-pair

In this example, Bob’s original password is
“SANDEE1”, and his session password is four clicks
in sequence or printable password “RjbL”. He has to
click four times using certain chess rule (i.e. Bishop
and Rook rule) or input the session passwords “RjbL”                         Figure 4.Example of Priority Set
to be authenticated.

    3.3 Enhancement                                              In the Basic scheme, if password is |K| in length, then
We increase the N in grid by using images instead of             user has to click             times, which releases her
text in grid layout. The increase in |S| not only                password length to attackers. However, users can
decrease the success probability of Random-click                 protect their password length information well by the
attack but also decrease success probability of Guess            Priority set rule. In addition, it could be easier for users
because |S| is inversely correlated to Guess and success         to remember their own interest of selected Priority set.
probability of Random click attack(see section 4).               This enhanced scheme can be used for high capability
Hence it will not only increase capability but also              and high security because it will decrease success
increase security.                                               probability of all attack.

3.3.1. Priority-based Scheme                                     IV.     ANALYSIS AND DISCUSSION
In this scheme, we can set priority as we want e.g. if           In this scheme, session password is used for login.
we want to move rook first or set priority for                   Since, interface changes at every login, session
horizontal or vertical move of Rook, then we can set             password will be unique for each login. Hence, once
priority according to it. We use only 16 priority set, i.e.      the session terminated, session password will be
|P|=16. The priority set can be increased by increasing          invalid.Hence this scheme is resistant to Shoulders
Rule for identical symbol. The priority set which we             surfing, Hidden cameras, Random click attack, Brute
use are shown in figure 4.                                       force attack, Guessing, Dictionary attack etc.

During registration phase, the user has to select one of         4.1. Complexity
the Priority set. The primary advantage of this
                                                                 Complexity of this scheme is mainly depend son
enhanced scheme is that, this scheme will hide the rule
                                                                 original password because all clicks for session
of clicking. In the basic scheme, the click-rule is open
                                                                 passwords are related to original password. Hence,
to public, while in Enhanced scheme, only the users
                                                                 complexity for original password of length |K| will be
themselves know their “Priority Set Rule”. Hence, it
                                                                 |S||K|.
will be become extremely hard for attackers to break
user’s password using password analysis techniques.
Further, the Priority-based scheme hides the length |K|          4.2. Shoulder Surfing Attack
of user’s password.                                              A shoulder-surfing attack consists of a deliberate
                                                                 attempt to gain knowledge of protected information

                                                       IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
Volume 1 Issue3 pp 076-083              July 2012                 www.ijsret.org           ISSN 2278 - 0882

through observation [29]. This kind of attack is also           4.6. Guessing
commonly known as a peeping attack [30].This                    Guessing is not possible for this scheme, because there
scheme is shoulder surfing resistance because we use            is          possible combination of original password
grid and session password, which changes at every               for Basic scheme and |P|×        for Enhanced scheme.
login. Hence, hacker will be not able to gain the
original password.
                                                                 V.     USER STUDY
4.3. Brute Force Attack                                         Is elected 30 students randomly, and told them about
It involves systematically checking all possible                rules and showed diagrams. These students were
combination of symbol until the correct combination is          divided into three subgroups, one who knew about
found. But, due to use of changing interface and                playing chess, second who knew only mathematics and
session password, it is not possible. Hence, Brute force        third who didn’t knew anything about both (i.e. chess
attack is not possible in this scheme.                          and math). The first subgroup had 3 students and they
                                                                knew about playing chess. The second subgroup had
4.4. Random Click Attack                                        18 students and they knew about math. And the third
In this scheme, we choose the common squareand use              subgroup has 9 students. I had divided groups into
it as the session password. However, attackers have the         these categories because chess is directly correlated to
chance to click the right common squarejust by                  math. The memorability of these groups is given in
random-click even though they do not really know the            below table for two subsequent weeks.
password. This kind of attack is called “random-click
attack.”Due to uniqueness of common square, success                                   TABLE 1
of random click is too much less or negligible.                             RESULT OF MEMORABILITY
i.e. success of probability of random click attack for             Subgroup      Memorability      Memorability
basic scheme is given by,                                                       after First Week   after Second
                                                                                                       Week
             P (B) =         =             ×|S|-|K|             first subgroup 1                 1

                                                                second           0.96                0.94
And success of probability of random click attack for           subgroup
Enhanced scheme is given by,
                                                                third            0.83                0.78
 P (E) =         =|L|×|P| ×|S| , Where |L| ≥
                        -1       -|K|
                                                      .         subgroup

                                                                Hence, I saw that first subgroup can easily memorize
Hence, in our Basic scheme, Maximum success of
                                                                because they had to only learn about pairing concept
probability of random click attack (i.e. when |S|= 100,
                                                                which was also too much easy. This scheme was also
|K| =7) will be, Maximum P (B) =4×           , which is
                                                                easy for second subgroup because they were already
too much less or negligible.                                    knows about horizontal, vertical and diagonal concept,
                                                                they had to memorize only rule concept. The third
Similarly, for Enhanced scheme, Maximum success of              subgroups have slightly less memorability because
probability of random click attack (i.e. when |S|= 144,         they had to remember rules, but, since it is based on
|K| =7 and |P|=16) will be, Maximum P (E) =                     direction. It is also easy for them.
4.87×        |L|, which is also negligible. This success        I found that 90% student of this groups are interested
probability is Maximum because as we increase the |K|           in this authentication scheme, 80% want to use it for
or |N|, success probability will decrease. Hence,               high security purpose and only 10% are neither
Random click attack is not possible in this scheme.             interested in game nor want to use it for high security
                                                                purpose.
4.5. Dictionary Attack
A dictionary attack tries only those possibilities which        VI.     CONCLUSION
are most likely to succeed and these are typically              Propose an Authentication scheme which not only
derived from a list of words. But this attack fails             increase security but also increase memorability and
towards our authentication scheme, because our                  usability. This scheme over comes the entire problems
scheme uses session password. Hence, due to change              (i.e. which are discussed in section 3). Hence this
in grid and session password, manipulation of “list of          scheme contains only two rules and no extra mapping
word” is not possible.                                          is required for shoulder surfing resistance or hidden

                                                      IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
  Volume 1 Issue3 pp 076-083       July 2012                         www.ijsret.org          ISSN 2278 - 0882

  cameras. My user study is based on paper work. This         [12] D. Weinshall and S. Kirkpatrick, "Passwords You’ll
  user study is done mainly to show memorability of this             Never Forget, but Can’t Recall," in Proceedings of
  scheme. To find time requirement (i.e. maximum and                 Conference on Human Factors in Computing
  minimum time of each phase) of this scheme are my
                                                                     Systems (CHI). Vienna, Austria: ACM, 2004, pp.
  future work.
                                                                     1399-1402.
  REFERENCE                                                   [13]   I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and
 [1] http://en.citizendium.org/wiki/chess                            A.D. Rubin in Proceeding of Design and Analysis of
 [2] Polybius, The General History of Polybius Volume 3              Graphical password. In the 8th USENIX Security
     – The Roman Military System, Public                             Symposium, 1999.
     domaintranslation by N.S.Gill.                           [14]   J. Thorpe and P. C. v. Oorschot, "Graphical
     http://ancienthistory.about.com/library/bl/bl_text_pol          Dictionaries and the Memorable Space of Graphical
     ybius6.htm                                                      Passwords," in Proceedings of the 13th USENIX
 [3] Adams and M.A. Sasse. Users are not the enemy.                  Security Symposium. San Deigo, USA: USENIX,
     Why users compromises computer security                         2004.
     mechanism & how to take remedial measures.               [15]   J. Thorpe and P. C. v. Oorschot, "Towards
     Communication of the ACM.                                       SecureDesign Choices for Implementing Graphical
    42:41-46, 1999                                                   Passwords," in Proceedings of the 20th Annual
 [4] R. N. Shepard, "Recognition memory for words,                   Computer Security Applications Conference.
     sentences,and pictures," Journal of Verbal Learning             Tucson, Arizona, 2004.
     and VerbalBehavior, vol. 6, pp. 156-163, 1967.           [16]   D. Nali and J. Thorpe, "Analyzing User Choice in
 [5] G.E. Blonder. Graphical Passwords. United State                 Graphical Passwords," Technical Report, School of
     Patent.                                                         Information Technology and Engineering,
    559961, 1996                                                     University of Ottawa, Canada May 27 2004.
 [6] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy,     [17]   J. Goldberg, J. Hagman, and V. Sazawal, "Doodling
     and N. Memon, "Authentication using graphical                   Our Way to Better Authentication," presented at
     passwords: Basic results," in Human-                            Proceedings of Human Factors in Computing
     ComputerInteraction International (HCII 2005). Las              Systems (CHI), Minneapolis, Minnesota, USA,
     Vegas, NV, 2005                                                 2002.
 [7] S. Wiedenbeck, J. Waters, J. C. Birget, A.               [18]   W. Jansen, "Authenticating Users on Handheld
     Brodskiy,and N. Memon, "Authentication using                    Devices “in Proceedings of Canadian Information
     graphical passwords: Effects of tolerance and image             Technology Security Symposium, 2003.
     choice," in Symposium on Usable Privacy and              [19]   W. Jansen, "Authenticating Mobile Device User
     Security (SOUPS). Carnegie-Mellon University,                   through Image Selection," in Data Security, 2004.
     Pittsburgh, 2005.                                        [20]    F. Syukri, E. Okamoto and M. Mambo, “A User
 [8] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy,            Identification System Using Written with Mouse,” in
     and N. Memon, "PassPoints: Design and                           Australian Conference on Information Security and
     longitudinal evaluation of a graphical password                 Privacy (ACISP): Springer-Verlag Notes in
     system,"International Journal of Human Computer                 Computer Science (1438), 1998, pp. 403-441.
     Studies, to appear.                                      [21]   S. Man, D. Hong, and M. Mathews, "A shoulder
 [9] R. Dhamijaand A. Perrig. “De’ja’ Vu: A user study               surfing resistant graphical password scheme," in
     using images for Authentication”. In 9th USENIX                 Proceedings of International conference on security
     security symposium, 2000.                                       and management. Las Vegas, NV, 2003.
[10] Real User Corporation: Passfaces.                        [22]   D. Hong, S. Man, B. Hawes and M. Mathews. A
     www.passfaces.com                                               Password scheme strongly resistant to spyware. In
[11] Davis D., F. Monrose, and M.K. Reiter. “On User                 proceeding of international conference on security
     Choice in Graphical Password Schemes” 13th                      and management, Las Vegas, NV, 2002.
     USENIX Security Symposium, 2004.

                                                       IJSRET @ 2012
International Journal of Scientific Research Engineering & Technology (IJSRET)
  Volume 1 Issue3 pp 076-083        July 2012                      www.ijsret.org   ISSN 2278 - 0882

[23] HaichangGao, ZhongjieRen, Xiuling Chang, Xiyong
       Liu UweAickelin, “A New Graphical Password
       Scheme Resistant to Shoulder-Surfing.”
[24]   ArashHabibiLashkari and SamanehFarmand , “A
       Survey on usability and Security features in
       graphical user authentication algorithms”, in IJCSNS
       International Journal of Computer Science and
       Network Security, VOL.9 No.9, September 2009.
[25]   H. Zhao and X. Li, “S3PAS: A Scalable Shoulder-
       Surfing Resistant Textual-Graphical Password
       Authentication Scheme,” in 21stInternational
       Conference on Advanced Information Networking
       and Application Workshops (AINAW 07), Vol.2.
       Canada, 2007, pp. 467-472
[26]   M. Sreelatha, M. Shashi, M. Anirudh, MD. Sultan
       Ahmar and V. Manoj Kumar, “Authentication
       Schemes for session Passwords using Color and
       Images”. InternationalJournal of Network Security
       and its Application (IJNSA), Vol.3, No.3, May 2011.
[27]   H. Tao and C. Adams, “Pass-Go: A proposal to
       improve the usability of graphical
       passwords”,International Journal of Network
       Security, vol. 7, no. 2, pp. 273-292, 2008.
[28]   SreelathaMalempati and ShashiMogalla, “An ancient
       Indian Board Game as Tool for Authentication
       scheme”, International Journal of Network Security
       & Its Applications (IJNSA), Vol.3, No.4, July 2011.
[29]   CMS Information Systems - Threat Identification
       Resource Version 1.0, Pages 2-3. Centers for
       Medicare & Medicaid Services, Baltimore,
       Maryland, May 7, 2002.
[30]   Tetsuji Takada. fakePointer: An Authentication
       Scheme for Improving Security against Peeping
       Attacks using Video Cameras. In The Second
       International Conference on Mobile Ubiquitous
       Computing, Systems, Services and Technologies,
       Pages 395-400. National Institute of Advanced
       Industrial Science and Technology, 2-41-6, Aomi,
       Koto-ku, Tokyo, 135-0064, JAPAN, 2008.

                                                       IJSRET @ 2012
You can also read