A robust scheme for impervious authentication

ISSN: 22783075
0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.

Abstract

Now a day’s every one using the passwords for user authentication. Most often passwords are alphanumeric, consisting of letters, numbers and symbols. A shoulder surfer can easily watch the password if the password is too short. If the password too complex and lengthy it is difficult for the user to remember it. At the same time passwords have to be changed every few months to take care of security. To overcome these problems, graphical passwords are developed. The motivation behind selecting an authentication mechanism scheme was that persons can simply evoke pictures rather than remembering lengthy and complex text based passwords. In this paper, we present a new, comprehensible, recall-based graphical password scheme where the user is required to recognize the pentagon for some specific permutations of secret characters on the existing display. The token holder is expected to select the certain password permutations in the same order cyclically per each login attempt. For example the user go for first permutation of password for first login in attempt, second permutation of password for second login attempt, third permutation of password for third login attempt, fourth permutation of password for fourth login attempt, fifth permutation of password for fifth login attempt and sixth permutation of password for sixth login attempt.

Cite

CITATION STYLE

APA

Srinivasa Ravi Kiran, T., Srisaila, A., & Lakshmanrao, A. (2019). A robust scheme for impervious authentication. International Journal of Innovative Technology and Exploring Engineering, 8(4S2), 480–485.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free