DocumentCode :
3264410
Title :
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords
Author :
English, Rosanne ; Poet, Ron
Author_Institution :
Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
1
Lastpage :
8
Abstract :
Recognition-based graphical passwords are one of several proposed alternatives to alphanumerical passwords for user authentication. However, there has been limited work on the security of such schemes. Often authors state a possible attack combined with a proposed countermeasure, but the efficacy of the counter measure is not always quantitatively examined. One possible attack which has been discussed without this examination is an intersection attack. If we can establish which countermeasures for this attack are effective, this will provide insight which will make it possible to select the appropriate countermeasure for the level of security required by a given system. Our approach involved creating a simulation of intersection attacks using each of five possible counter measures. The number of attacks which had to be performed before success for each approach was noted and compared to a control where no counter measure was implemented. Our results show that for three of the five countermeasures there was a significant increase in the number of attacks before success, one showed a significant decrease and the other did not show any statistical significance. We show that it is not decisive that using dummy screens when an incorrect image is selected will increase the number of attacks required. We also show that increasing the number of challenge screens reduces the number of attacks required before success as the number of challenge screens approaches the size of the passimage set. Our results allow one to make a more reliable choice of countermeasure to reduce intersection attacks.
Keywords :
authorisation; computer graphics; image recognition; alphanumerical passwords; dummy screens; image selection; intersection attack countermeasures; passimage set size; recognition-based graphical passwords; user authentication; Authentication; Educational institutions; Histograms; Radiation detectors; Testing; Uninterruptible power systems; authentication; intersect attacks; recognition-based graphical passwords; simulation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.271
Filename :
6295951
Link To Document :
بازگشت