Browse > Article
http://dx.doi.org/10.9708/jksci/2012.17.9.065

A study on User Authentication Technology of Numeric based Pattern Password  

Ju, Seung-Hwan (Dept. of Computer Science Engineering, Korea University of Technology and Education)
Seo, Hee-Suk (Dept. of Computer Science Engineering, Korea University of Technology and Education)
Abstract
The traditional text-based password is vulnerable guessing, dictionary attacks, keyloggers, social engineering, stole view, etc. these vulnerability effect more serious problem in a mobile environment. In this study, By using the pattern number to enter the password of an existing four-digit numeric password, User easily use to new password system. The technology on pattern based numerical password authorization proposed in this paper would intensify the security of password which holds existing 10 numbers of cases by authorizing a user and would not invade convenience of use by providing high security and making users memorize only four numbers like old method. Making users not have inconvenience and raising complexity, it would have a strength to an shoulder surfing attack of an attacker. So I study password system that represents the shape-based of number. I propose the new password system to prevent peeking attacks and Brute-force attack, and this proposal is to review the security and usability.
Keywords
Pattern-based password; Numeric password; Password Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. H. Lashkari, O. B. Zakaria, S. Farmand, and R. Saleh, "Shoulder surfing attack in graphical password authentication," International Journal of Computer Science and Information Security, vol.6, no.2, pp.145-154, 2009.
2 W. Jansen, "Authenticating mobile device users through image selection," The Internet Society: Advances in Learning, Commerce and Security, vol.1, pp.183-194, 2004.
3 Seung-hwan Ju, Hee-suk Seo, "Password Based User Authentication Methodology Using Multi-Input on Multi-Touch Environment," Journal of the Korea Society for Simulation, Vol 20, No 1, 2011.
4 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Human-Computer Interaction International (HCII 2005). Las Vegas, NV, 2005.
5 X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," Proc. of the 21st Annual Computer Security Applications Conference, pp.463-472, 2005.
6 Hoanca, B. and K. Mock. Screen Oriented Technique for Reducing the Incidence of Shoulder Surfing. In Proceedings of International Conference on Security and Management (SAM). Las Vegas, Nevada, USA, 2005.
7 RealUser, "www.realuser.com," last accessed in 2012.
8 S. Akula, V. Devisetty, "Image Based Registration and Authentication System," in Proceedings of Midwest Instruction and Computing Symposium, 2004.
9 R. Dhamija and A. Perrig, "D'ej'a vu: a user study using images for authentication," in Proc. of the 9th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2000.
10 Gunyoung Moon, Jonguk Kim, Manpyo Hong, "A Graphical Password Scheme Resistant to Shoulder Surfing Attack in Mobile Environments", Korea Information Science Society, Journal of KISS: Computing Practices and Letters, No. 18 No. 1 page (s): 90-94, 2012.