Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

Implementing Graphical Password Authentication

Implementing Graphical Password Authentication

Implementing Graphical Password Authentication

Description

Unformatted Attachment Preview

Implementing Graphical Password Authentication
Introduction
A Graphical Password Authentication system is an authentication system that uses some
combination of graphical images replacing the regular passwords. Graphical passwords may
offer better security than text-based passwords because most of the people use regular,
popular passwords everywhere and are prone to social engineering attacks. So graphical
passwords can put stop to many attacks of this kind.
Resistance to Popular Attacks
Bruteforce
After reaching max tries, the user will be notified via message through email. And the further
authentication through the generic URL/website is disabled for that user account, instead,
they have to use the link that will be sent by the company in the notification email. This also
lets the legitimate user know about the adversary.
Shoulder Surfing
Shoulder surfing is a type of social engineering technique used to obtain information such as
personal identification numbers (PINs), passwords and other confidential data by looking
over the victim’s shoulder. The system we adopt is similar to the Phone pattern system. The
pattern is invisible on the screen when the users draw it. This makes it incredibly tough for
the adversary to see the images on the grid that the user clicks.
Spyware
Graphical password systems resist spyware more easily than regular passwords. Key-loggers
secretly capture keystrokes and transfer, but if the spyware wants to track the mouse
movements, it can be tracked, but the adversary wouldn know which part of the mouse
event is actually the graphical password. The timeline vs mouse-event graph is too difficult to
get the pattern
Hidden Camera
There will be a camera in front of the user which identifies a face while authentication i.e.,
the number of pixels the face occupies should be 80-90% of the total pixels in the current
frame and if this condition is not satisfied then the screen does not show the graphical
password. It alerts the user to cover the screen with a proper posture. But this will be a costly
operation.
Phishing
Since the adversary is made to believe that the password is a set of images, itànot possible to
make a fake page, since the adversary thinks he doesn know the images. Moreover, we
restrict the user to one attempt and suggest the user to give a fake password every time so that
he triggers the server to send and URL in email so that he can log in through the legitimate
login page, and the adversary cannot send the URL to users from a legitimate server.
However, when the adversary knows the technique this attack might be still possible.
Screenshots
Welcome
Page
Sign Up
Page
After logging
in
Password Reset
Page

Purchase answer to see full
attachment
Explanation & Answer:

code

User generated content is uploaded by users for the purposes of learning and should be used following our honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20