Open Access Open Access  Restricted Access Subscription Access

A Review of Password Attacks and Comparative Analysis of Secure Authentication Methods

Rajibhai Harish Dubey, Muskan Tarachand Karmani, Lekhraj Vilhekar

Abstract


A password serves a significant function for the users in ATMs, internet services, Windows login, and mobile authentication among other things. The core reason for using a password is to prevent users from accessing certain information without authorization. While undoubtedly essential, not many people feel comfortable relying solely on passwords to protect their information due to many shortcomings in the provided systems.


Full Text:

PDF

References


Anand Sharma and Vibha Ojha, 2010. Password based authentication: Philosophical Survey. IEEE.

Martinez-Diaz, M. and C. Martin-Diaz, 2010. A comparative evaluation of finger drawn graphical password verification methods. 12th international conference on frontiers in handwriting recognition 2010 Spain.

Ilkka Uusitalo and Josep M. Catot, 2009. Phishing and countermeasures in Spanish online Banking. 3rd International conference on emerging security information, System and Technologies.

4Ali, M. Eljetlawi and Norafia Ithnin, 2008. Graphical password: Comprehensive study of the useability features of the recognition base graphical password methods. 3rd International conference on convergence and Hybrid Information Technology.

Fujita, K. and Y. Hirakawa, 2008. A study of password authentication method against observing attacks. 6th International Symposium on Intelligent7. Arvind Narayanan and Vitaly Shmatikov, 0000. Fast dictionary attacks on passwords using time-space tradeoff, Conference on Computer and Communications Security, Proceedings of the 12 ACM Conference on Computer and Communications Security, pp: 364-372.

Kessler, Gary C., 2002. Passwords Strengths and Weaknesses. Jan 1996. URL: http://www.garykessler.net/library/password.html.

Huanyu Zhao Xiaolin Li, 2007. A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme, Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21 International Conference, 2(s): 467-472.

Syverson, P., et al., 1994. A taxonomy of replay attacks [cryptographic protocols], Proceedings of Computer Security Foundations Workshop VII, CSFW, 7(s): 187-191.

Fahad Ikram, Muhammad Sharif and Mudassar Raza, 2008. Protecting Users against Phishing Attacks in 7" CIIT Workshop on Research in Computing June 23, 2008 CIIT, Lahore – Pakistan

Baig, M.M. and W. Mahmood, 2007. A Robust Technique of Anti Key-Logging using Key-Logging Mechanism, Digital EcoSystems and Technologies Conference, 2007. DEST '07. Inaugural IEEE-IES. Feb 2007, (s): 314-318,


Refbacks

  • There are currently no refbacks.