National Conference on Emerging Trends in Computer Science and Information Technology |
Foundation of Computer Science USA |
NCETCSIT - Number 1 |
February 2012 |
Authors: Kanchan V. Warkar, Prof. Nitin J. Janwe |
036ba0a5-3814-47f9-8f98-d15c54b3eccb |
Kanchan V. Warkar, Prof. Nitin J. Janwe . A Review on Two Level Graphical Authentication Against Key-Logger Spyware. National Conference on Emerging Trends in Computer Science and Information Technology. NCETCSIT, 1 (February 2012), 1-4.
Spywares has become major problem now days. This type of software may track user activities online and offline. Password collection by spywares is increasing at a shocking pace. The problem of entering sensitive data, such as passwords, from an untrusted machine, is obviously insecure; however roaming users generally have no other option. They are in no point to review the security status of, Internet cafe or business center machines, and has no alternative to typing the password. The difficulty of mounting a collusion attack on a single userâs password makes the problem more tractable than it might appear. This problem of password security can be improved by biometric based authentication and graphical authentication, however availability and cost of biometric authentication is considerable problem. In this paper, we present an alternative user authentication based on two levels of security walls, first based on pin code and second use Images that is resistant to keylogger spywares. this method that uses a strengthened cryptographic hash function to compute fast and secure passwords for arbitrarily many accounts while requiring the user to memorize only few memorable points in the image. In addition to keylogger spywares our design is also highly resistant to brute force attacks, modification attack and prone to Dictionary attack, allowing users to retrieve their passwords from any location so long as they can execute our program and remember a short secret.