Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations

  • Roy I
  • Hossain A
  • AHMED RUMEE S
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

User authentication is mostly reliant on password-based based verification. Users generally used text-based passwords, which are user-friendly but often predictable and vulnerable to some common attacks. To overcome these shortcomings, graphical authentication methods have emerged. Here, users choose a sequence of images as passwords. Though such methods help users to better remember their passwords, they too suffer from attacks seen in the case of textual passwords. This paper presents a comprehensive summary of the vulnerabilities state of the art graphical password schemes against the following well-known attacks -  Dictionary, Guessing, Brute force, Shoulder surfing, Spyware, and Social engineering. We believe the findings of this study can help researchers design more secure graphical password schemes making them more usable and a realistic replacement for text-based passwords.

Cite

CITATION STYLE

APA

Roy, I., Hossain, A., & AHMED RUMEE, S. T. (2021). Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations. International Journal of Information Technology and Applied Sciences (IJITAS), 3(4), 180–183. https://doi.org/10.52502/ijitas.v3i4.201

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free