The role of visual coherence in graphical passwords

2013-08-31
Özge, Alaçam
Christopher, Habel
Acartürk, Cengiz
Graphical password is an alternative method of authentication to alphanumerical passwords. From theperspectiveof research on human memory, it is yet another novel technology that introduces challenges on human memory components. In this study, we aim to investigatethe previousfindings in human visual memory in the domain ofgraphical passwords by analyzingthe role ofvisual coherence in passwords. The results of an experimental studyreveal that in terms of memorability, coherent images are better candidatesas graphical password images than jumbled images

Suggestions

Graphical Passwords as Browser Extension: Implementation and Usability Study
BIÇAKCI, KEMAL; Yuceel, Mustafa; Erdeniz, Burak; Gurbaslar, Hakan; ATALAY, NART BEDİN (2009-06-19)
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical pas...
Analysis of Password Attacks From The Perspective Of The Attacker By Multiple Honeypots
Aydın, Kıvanç; Acartürk, Cengiz; Department of Cybersecurity (2021-8-19)
Authentication is vital for secure operation of ICT systems. Since the past several decades, alternative solutions have been developed for authentication, such as biometric authentication methods, aiming at replacing passwords. Nevertheless, their success has been limited as evidenced by intensive use of passwords. Today, an average user uses dozens of different passwords in daily practice. The frequent use of passwords in authentication also leads to a close interest of attackers due to rapid the expansion...
Towards Usable Solutions to Graphical Password Hotspot Problem
BIÇAKCI, KEMAL; ATALAY, NART BEDİN; Yuceel, Mustafa; Gurbaslar, Hakan; Erdeniz, Burak (2009-07-24)
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficiently large password space suited for most Internet applications. In this paper, we propose two novel graphical password methods based on recognition of icons to solve the hotspot problem without decreasing the password space. The experiment we have conducted that compares the security and usability of proposed methods with earlier w...
Improving the security and flexibility of one-time passwords by signature chains
Bıçakçı, Kemal; Baykal, Nazife (TÜBİTAK, 2003)
While the classical attack of ``monitor the network and intercept the password'' can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supplement for software authentica since they are the only ones that safeguard against attacks on insecure client machines. In this paper by using public-key techniques we present a method called signature chain alternative to Lamport's hash chain to improve security and flexibility of one-time passwords. Our proposi...
Truncated Impossible and Improbable Differential Analysis of ASCON
Tezcan, Cihangir (2016-02-01)
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round Ascon are provided. In this work, we provide the inverse of Ascon's linear layer in terms of rotations which can be used for constructing impossible differentials. We show that Ascon's S-box contains 35 undisturbed bits and we us...
Citation Formats
A. Özge, H. Christopher, and C. Acartürk, “The role of visual coherence in graphical passwords,” 2013, Accessed: 00, 2021. [Online]. Available: http://mindmodeling.org/cogsci2013/.