{"title":"一种增强安全性的图文混合密码认证系统","authors":"Mayank Singh, Vrushal Nedungadi, R. Radhika","doi":"10.1109/ICNWC57852.2023.10127514","DOIUrl":null,"url":null,"abstract":"Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Hybrid Textual-Graphical Password Authentication System With Enhanced Security\",\"authors\":\"Mayank Singh, Vrushal Nedungadi, R. Radhika\",\"doi\":\"10.1109/ICNWC57852.2023.10127514\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.\",\"PeriodicalId\":197525,\"journal\":{\"name\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Networking and Communications (ICNWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNWC57852.2023.10127514\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127514","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Hybrid Textual-Graphical Password Authentication System With Enhanced Security
Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.