A Scheme to Create Secured Random Password Using Markov Chain

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)


Habitually, access to computer systems is based on the use of alphanumeric passwords. Password affords the foremost line of protection against illicit access to computer. Password security is of course only one factor of overall system security. Even though it is an essential component, passwords are measured as the fragile link in computer security. Most users will make use of simple passwords. Simple passwords are easy to memorize, but in the same sense easy to crack!! However, the common user is likely to use simple password and more often the same password for different login. This makes them vulnerable to various types of cyber attacks. To create/generate secured random passwords, in this paper, we describe a new scheme of creation/generation of passwords using Markov chain technique. The tree structure of creation/generation of passwords using Markov chain technique is also specified.


System security Alphanumeric password Graphical password Biometric authentication Vulnerabilities Cracking Markov chain TPM 


  1. 1.
    R. Morris, K. Thompson, Password security: a case history. Commun. ACM 22, 594–597 (1979)Google Scholar
  2. 2.
    S. Granger, The simplest security: a guide to better password practices (2011)Google Scholar
  3. 3.
    E.F. Gehringer, Choosing passwords: security and human factors, in IEEE 2002 international symposium on Technology and Society (ISTAS’02) pp. 369–373Google Scholar
  4. 4.
    D. Florencio, C. Herley, B. Coskun, Do strong web passwords accomplish anything?, in Proceeding HOTSEC’07 Proceedings of the 2nd USENIX workshop on Hot topics in security, ACM Digital Library (2007)Google Scholar
  5. 5.
  6. 6.
    Jeff Yan, Alan Blackwell, Ross Anderson, A. Grant, Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)CrossRefGoogle Scholar
  7. 7.
    D. Florencio, C. Herley, A large-scale study of web password habits, in Proceedings of the 16th international conference on the World Wide Web, ACM Digital Library (2007), pp. 657–666Google Scholar
  8. 8.
    J. Hong, Passwords getting painful, computing still blissful. Communic. ACM I. 56(3), (2013)Google Scholar
  9. 9.
    S. Vaithyasubramanian, A. Christy, A practice to create user friendly secured password using CFG, in Accepted for International Conference on Mathematical & Engineering Sciences 2014. (2014)Google Scholar
  10. 10.
    B. AlFayyadh, P. Thorsheim, A. Josang, H. Klevje, Improving usability of password management with standardized password policies, in The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 (Cabourg, 2012)Google Scholar
  11. 11.
    S. Wiedenbech, J. waters, J.C. Birget, A. Brodskiy, N. Memon, Authentication using graphical passwords: basic results, in Human-Computer Interaction International (HCII) (2005)Google Scholar
  12. 12.
    A. P. Sabzevar, A. Stavrou, Universal multi-factor authentication using graphical passwords, in Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems pp. 625–632Google Scholar
  13. 13.
    X. Suo, Y. Zhu, G.S. Owen, Graphical passwords: a survey, in 21st Annual Computer Security Applications Conference (2005), pp. 463–472Google Scholar
  14. 14.
    S.M.S. Ahmad et al., Technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innov. Comput., Inf. Control. 8(11), 7983–7999 (2012)Google Scholar
  15. 15.
    M. Bhatnagar, Raina K. Jain, Nilam S. Khairnar, A Survey on Behavioral Biometric Techniques: Mouse vs. Keyboard Dynamics, in IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology. (2013), (pp. 27–30)Google Scholar
  16. 16.
  17. 17.
    H. Gao, W. Jia, F. Ye, L. Ma, A survey on the use of graphical passwords in security. J. Softw. 8(7), (2013)Google Scholar
  18. 18.
    B. Hayes, First links in the Markov chain. Mag. Sigma Xi, Sci. Res. Soc. 101(2), 92 (2013)Google Scholar
  19. 19.
  20. 20.

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of MathematicsSathyabama UniversityChennaiIndia
  2. 2.Sathyabama UniversityChennaiIndia

Personalised recommendations