Abstract
In a multi-user system, user name and password serves to authenticate the user. Generally users select alphanumerical passwords or textual passwords in English. It is easy for the intruder to crack these passwords by eaves dropping, password stealing, dictionary attack and shoulder surfing. To overcome these vulnerabilities, graphical password schemes have been introduced. An intruder can easily break the simple graphical password authentication schemes by shoulder surfing and hidden cameras. In this paper a new shape based textual authentication scheme for native language passwords is proposed. User selects a character from his native language and the shape of this character becomes password criteria. The proposed authentication scheme is resistant to attacks like password stealing, eves dropping, shoulder surfing and hidden cameras because every time user enters a new password.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blonder, G.E.: Graphical Passwords, in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed.United States (1996)
Dhamija, R., Perrig, A.: Deja Vu: A User Study using Images For Authentication. In: 9th USENIX Security Symposium (2000)
Goldberg, J., Hagman, J., Sazawal, V.: Doodling Our Way To Better Authentication. In: CHI 2002 extended abstracts on Human Factors in Computer Systems (2002)
Jansen, W.: Authenticating Mobile Device User through Image Selection. Data Security (2004)
Jansen, W.: Authenticating Users on Handheld Devices. In: Proceedings of Canadian Information Technology Security Symposium (2003)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin: The design and analysis of graphical passwords. In: Proceedings of USENIX Security Symposium (August 1999)
Luca, A.D., Weiss, R., Hussmann, H.: PassShape:stroke based shape passwords. In: Proceedings of the conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artifacts and environments, Adelaide, Australia, November 28-30, pp. 239–240 (2007)
Man, S., Hong, D., Mathews, M.: A shouldersurfing resistant graphical password scheme. In: Proceedings of International conference on security and management, LasVergas, NV (2003)
Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: A survey. In: 21st Annual Computer Security Applications Conference (ASCSAC 2005), Tucson (2005)
Weinshall, D., Kirkpatrick, S.: Passwords You’ll Never Forget, but Can’t Recall. In: Proceedings of Conference on Hman Factors in Computing Systems (CHI). ACM, Vienna (2004)
Stallings, W.: Cryptography and Network Security, 4th edn. Pearson Education Inc., London
Zhao, H., Li, X.: S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), Canada, vol. 2, pp. 467–472 (2007)
Zheng, Z., Liu, X., Yin, L., Liu, Z.: A Hybrid password authentication scheme based on shape and text. Journal of Computers 5(5) (May 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Malempati, S., Mogalla, S. (2011). Intrusion Prevention by Native Language Password Authentication Scheme. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-22540-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22539-0
Online ISBN: 978-3-642-22540-6
eBook Packages: Computer ScienceComputer Science (R0)