NIS Microproject
NIS Microproject
Title of Micro project: Graphical Password Authentication System Using Intuitive Approach
Academic Year: 2023-24 Course: Network & Information Security . Course Code:22620
Submitted By:
A:………………………………………………………………………………………………………
B:………………………………………………………………………………………………………
C:………………………………………………………………………………………………………
D:………………………………………………………………………………………………………
……..
Major learning outcomes achieved by students by doing the project
a)Practical outcome:………………………………………………………………………………….
13 Om Rajesh Bhati
SR.
NO. TOPIC
1. Abstract
2. Introduction
3. Flowchart
4. Algorithm
5. Advantages
6. Disadvantages
7. Reference
8. Conclusion
Abstract
The project revolves around the development and implementation of a graphical password
authentication system using an intuitive approach. The primary objective of this project is to enhance
the security of user authentication processes. This enhancement is achieved by leveraging the human
brain's inherent ability to recognize and recall images more effectively than alphanumeric characters.
This system aims to address the limitations of traditional text-based passwords and provide a more
secure and user-friendly alternative. Traditional text-based passwords, while being the most common
method of authentication, have several drawbacks. They are often vulnerable to brute force attacks,
where an attacker tries all possible combinations of characters. Additionally, users may find it
challenging to remember complex passwords, which are typically a random combination of letters,
numbers, and special characters. This difficulty in remembering passwords often leads users to choose
simple and easily guessable passwords, further compromising the security of the system. On the other
hand, graphical passwords, which involve the use of images, are generally easier to remember for most
people. This is because the human brain is better at recalling images compared to text. Moreover, the
large number of possible combinations of images makes graphical passwords harder to guess or crack,
thereby providing a higher level of security. However, designing an effective graphical password
system is a challenging task. It requires a careful balance between usability and security. The system
must be easy to use and remember for the user, while also being secure against various types of
attacks. This project aims to achieve this balance by using an intuitive approach to graphical password
authentication.
Introduction
Password authentication is a critical aspect of system security. It is the most common method used to
verify the identity of a user. However, traditional text-based passwords, while widely used, have
several drawbacks. They are often vulnerable to brute force attacks, where an attacker tries all possible
combinations of characters. Additionally, users may find it challenging to remember complex
passwords, which are typically a random combination of letters, numbers, and special characters. This
difficulty in remembering passwords often leads users to choose simple and easily guessable
passwords, further compromising the security of the system. To address these issues, researchers have
proposed various alternatives to text-based passwords. One such alternative. is graphical password
authentication. Graphical password authentication systems leverage the human brain's superior
capability in recalling images compared to text. In a graphical password system, the user selects a
series of images as their password. To authenticate, the user must correctly identify these images from
among a set of decoy images. This project focuses on developing a graphical password authentication
system using an intuitive approach. The intuitive approach involves the use of images that are easy for
the user to remember. These could be images that the user has a personal connection with, or images
that are easy to remember due to their distinct features. The goal is to make the password easy to
remember for the user, while also being hard to guess for an attacker.
➢ Why we use
1. Ease of Use:
Graphical passwords are often more intuitive and easier to remember compared to traditional
text- based passwords. Users can select images or draw patterns that have personal
significance to them, making the authentication process more user-friendly.
1. Registration :
During the registration process, users are presented with a set of images or graphical elements
from which they can choose or create their own graphical password. This could involve
selecting a particular sequence of images, drawing a specific pattern, or any other intuitive
method.
3. Authentication :
When users want to authenticate themselves, they are presented with the same set of images or
graphical elements they encountered during registration. They then replicate the sequence or
pattern they previously selected or created.
4. Verification :
The system compares the input provided by the user during authentication with the stored
graphical password associated with that user. If the input matches the stored graphical
password, authentication is successful, and access is granted.
Flowchart
Algorithm
1. User Registration:
- User selects a set of images during registration.
3. Authentication:
- User selects their images from a grid presented by the system.
- System compares the selected images with the stored ones for authentication.
4. Verification:
- If the selected images match, authentication is successful.
5. Security Measures:
- Implement encryption for stored data and protection against brute force attacks.
OR
The algorithm for the graphical password authentication system involves three main steps.
The first step is user registration. During registration, the user is presented with a set of images. The
user selects a series of images from this set to create their password. The selected images and their
order form the user's graphical password. The system stores this password for future authentication.
The second step is user login. During authentication, the user is presented with several sets of images.
Each set contains one image from the password sequence along with several decoy images. The user
identifies the images from their password sequence. The order of selection is important, as it forms
part of the password.
The third step is authentication. The system verifies the sequence of selected images against the stored
password sequence. If the sequences match, the user is authenticated and granted access to the system.
If the sequences do not match, the user is denied access. The algorithm is designed to be simple and
intuitive for the user, while also providing a high level of security. The large number of possible image
sequences makes it difficult for an attacker to guess the password. Furthermore, even if an attacker is
able to observe the user entering their password, they would still need to know the correct order of the
images, adding an additional layer of security.
Advantages
1. Memorability :
Graphical passwords, with their use of images, are generally easier to remember than text-based
passwords.
2. Security :
The large number of possible image sequences increases the resistance to brute force attacks.
3. User-Friendly:
Graphical passwords can be more intuitive and user-friendly, especially for those who are visual
learners or have difficulty with text-based passwords.
4. International Usability:
They do not rely on the knowledge of a particular language or alphabet, making them
universally usable.
Disadvantages
1. Shoulder Surfing :
Graphical passwords are potentially vulnerable to shoulder surfing attacks, where an attacker
observes the user entering their password.
2. Screen Resolution :
The effectiveness of a graphical password system can depend on the screen resolution. Smaller
screens might make it difficult to select images accurately.
3. Implementation Cost:
The development and implementation of a secure and efficient graphical password system can be
complex and costly.
Reference
o https://www.academia.edu/71469272/Graphical_Password_Authentication_System_Using_M
odified_Intuitive_Approach
o https://link.springer.com/chapter/10.1007/978-981-10-5520-1_15
o https://www.researchgate.net/profile/Dr-Dey-
5/publication/358234430_Graphical_Password_Authentication_System_Using_Modified_Int
uitive_Approach/links/61f79d724393577abe00c801/Graphical-Password-Authentication-
System-Using-Modified-Intuitive-Approach.pdf?origin=publication_detail
o https://elearningatria.files.wordpress.com/2013/10/ise-viii-information-and-network-security-
06is835-notes.pdf
o https://bookstation.in/products/9789389750065
Conclusion