A graphic-based cryptographic model for authentication

B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi
{"title":"A graphic-based cryptographic model for authentication","authors":"B. K. Alese, A. Akindele, F. Dahunsi, A. Thompson, Tosin A. Adesuyi","doi":"10.1109/CyberSA.2017.8073395","DOIUrl":null,"url":null,"abstract":"Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system.","PeriodicalId":365296,"journal":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSA.2017.8073395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system.
用于身份验证的基于图形的加密模型
传统密码由于其优点,长期以来一直被用于身份验证。然而,它的缺点,如弱或未召回的密码,经常危及安全性。本文提出了一种增强可用性和安全性的基于图形的密码模型。GBCM模型由注册和验证阶段组成,用户必须成功完成注册和验证阶段才能进行身份验证。采用了基于识别、线索和纯召回的混合技术。采用三级认证模式、密钥、算子和网格单元置乱,增强了GBCM的安全性,减轻了肩冲浪攻击;使用网格单元标识(ID)和图像增强了可用性。因此,实现表明,在18个用户注册的系统中,83.33%的人记住了他们的图像,83.33%的人还记住了他们的密钥,88.89%的人记住了他们的操作员,导致77.78%的成功登录。登录成功证明了GBCM系统的用户友好性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信