PRESENTED BY: 2 PASSWORD AUTHENTICATION REDEFINED CONTENTS 3 PASSWORD AUTHENTICATION REDEFINED Introduction OBJECTIVES LITERATURE SURVEY USE-CASE DIAGRAM DFD design FUTURE SCOPE Conclusion INTRODUCTION 4 PASSWORD AUTHENTICATION REDEFINED SECURITY- It is the thing that all the computer users in the world is running behind.
Most common method used for authentication is textual password.
Eavesdropping, dictionary attack, social engineering and shoulder surfing are well known vulnerabilities of this method.
INTRODUCTION 5 PASSWORD AUTHENTICATION REDEFINED
we are towards developing an authentication technology, which is free from shoulder surfing and key board hacking.
SESSION PASSWORDS are generated for authentication. These session passwords can be used only once and every login time a new session password is generated.
INTRODUCTION 6 PASSWORD AUTHENTICATION REDEFINED Helping The Blind Current research on Usable Security are not paying any attention to human disabilities.
Many blind people are now using screen reading software to use thier computer.
There is still no system which offers efficient interaction between blind user and machine.
The proposed authentication schemes for blind users use sounds for generating session passwords. OBJECTIVE 7 PASSWORD AUTHENTICATION REDEFINED For Normal user
To make password authentication simpler Providing secure authentication system using session password Making the system very easy to handle To provide tight security from shoulder surfing
For Blind user
To make their interaction with the computer more friendly apart from the current software . LITERATURE SURVEY 8 PASSWORD AUTHENTICATION REDEFINED EXISTING SYSTEM
1. Haichangs Shoulder-Surfing Technique The user is required to draw a curve across their password images orderly rather than clicking on them directly. LITERATURE SURVEY 9 PASSWORD AUTHENTICATION REDEFINED 2. Passface The user sees a grid of nine faces and selects one face previously chosen by the user as shown in figure Draw a secret,Signature technique,Convex hull etc are similar techniques used.
Some screen reading softwares are also there for blind users, which is now most popular. LITERATURE SURVEY 10 PASSWORD AUTHENTICATION REDEFINED PROPOSED SYSTEM 1. Pair-based Authentication Scheme: During registration user submits his password Minimum length of the password is 8 and it should contain even number of characters During the login phase, when the user enters his username an interface consisting of a grid is displayed. The grid is of size 6 x 6 and it consists of alphabets and numbers LITERATURE SURVEY 11 PASSWORD AUTHENTICATION REDEFINED Figure show that L is the intersection symbol for the pair AN LITERATURE SURVEY 12 PASSWORD AUTHENTICATION REDEFINED 2. Hybrid Textual Authentication Scheme: During registration, user should rate colors as shown in figure The User should rate colors from 1 to 8 and he can remember it The login interface consists of grid of size 88 and strips of colors as shown in figure LITERATURE SURVEY 13 PASSWORD AUTHENTICATION REDEFINED LITERATURE SURVEY 14 PASSWORD AUTHENTICATION REDEFINED LITERATURE SURVEY 14 PASSWORD AUTHENTICATION REDEFINED Using sound clips
During registration phase, user should assign a value for each of the sound clips played The values are limited to a range between 0-9 User is assigned with a secret expression LITERATURE SURVEY 15 PASSWORD AUTHENTICATION REDEFINED LITERATURE SURVEY 15 PASSWORD AUTHENTICATION REDEFINED login phase, the 6 sound clips are shuffled and played as 3 pairs User evaluate his dedicated secret expression with each pair and enter the result as session password For evaluating, the variable a and b are given the values of the first and second sound clips in a pair respectively. 5 Clip 4 Clip 1 2 1 2x2+1 18 16 Clip 3 Clip 5 Clip 2 Clip 6 DATA FLOW DIAGRAM 16 PASSWORD AUTHENTICATION REDEFINED DFD for normal users DATA FLOW DIAGRAM 17 PASSWORD AUTHENTICATION REDEFINED DFD for blind users UML DIAGRAM 18 PASSWORD AUTHENTICATION REDEFINED USE CASE DIAGRAM Interaction diagram 19 PASSWORD AUTHENTICATION REDEFINED U:user S:server inputdetails() Confirm() Success() Sessionpass() Success() Verify() design 20 PASSWORD AUTHENTICATION REDEFINED design 21 PASSWORD AUTHENTICATION REDEFINED design 22 PASSWORD AUTHENTICATION REDEFINED design 23 PASSWORD AUTHENTICATION REDEFINED design 24 PASSWORD AUTHENTICATION REDEFINED design 25 PASSWORD AUTHENTICATION REDEFINED design 26 PASSWORD AUTHENTICATION REDEFINED FUTURE SCOPE 27 PASSWORD AUTHENTICATION REDEFINED This authentication scheme can be applied in ATMs so as to avoid shoulder surfing.
We also planned to integrate a web camera, which will capture at the moment of unauthorized accessing.
The authentication scheme can be included in smart phones for security aspect.
The technique can be implemented in social networking sites. CONCLUSION 28 PASSWORD AUTHENTICATION REDEFINED Through this project we are proposing pair based authentication and a new authentication techniques based on sounds for Normal users & Blind computer users respectively.
These schemes are completely new to the users and this will be an apt scheme where user is demanding for security irrespective to time.
The normal users will get tight security against hacking and as a challenge we submitting the concept, providing security for blind also. REFERENCES 29 PASSWORD AUTHENTICATION REDEFINED
1. http://www.passface.com
2. Passlogix, site http://www.passlogix.com
3. Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu Uwe Aickelin, A New Graphical Password Scheme Resistant to Shoulder-Surfing
4. Voice Recognition for Blind Computer Users.pdf
30 PASSWORD AUTHENTICATION REDEFINED ANY QUESTIONS? 31 PASSWORD AUTHENTICATION REDEFINED THANKING YOU ALL