Retrieve
Retrieve
2 - 2009
Annals. Computer Science Series, l"' Tome 2"'' Fase. - 2009
Introduction
77
Anale. Seria Informática. Vol. VII fase. 2 - 2009
Annals. Computer Science Series. 7"' Tome 2"** Fase. - 2009
such as their names or their initials. This is one reason it is relative easy to
break into most computer systems [HasO5].
The main drawback in the design of many password mechanisms
arises from the fact that password lengths are usually small or short. This
makes it easy to spy and memorize passwords through the monitoring of
computer keystrokes physically or through eavesdropping. For example, in a
university environment each student may be assigned a password to protect
his resources within the school computer system. Using the password during
lecture time may endanger the security of his password because of the
presence of other students around him. Similarly, login page of Yahoo!
requires each user to enter his/her password online. Such 'online password'
can also be compromised by a hacker who monitors online keystroke
sequence programmatically.
In a big corporation, each personnel accesses computer resources
through password. If the password is very short, as this is usually the
practice, the secretary to the manager may spy her boss password and
thereby have access to her boss corporate resources.
Personal identification number (PIN) is always used by various banks to
allow their customers access to their online bank accounts. For the
customers' convenience, PINS are often short and in many cases only
numeric of up to eight digits (ATM uses only four numeric digits). This is
why many banks issue warnings to their customers to study the automated
teller machine (ATM) surroundings properly before approaching it for use
to protect their PINS. The implication of this is that PINs are not safe since
they can be subject to attack (spying) by third parties.
The advantage of short length characters for PINs and password is
that it is easy to be remembered by the user. This advantage is a problem
since it makes it easier for attacker to memorize short keystroke of PIN and
password. In this paper, an algorithm is developed to provide a strong
security support for both short and long character-password at input level.
78
Anale. Seria Informaticä. Vol. VII fase. 2 - 2009
Annals. Computer Science Series. 7^ Tome 2"' Fase. - 2009
The system accepts all printable ASCII characters, which may consist of
lower and upper case (A-Z, a-z), numeric digits (0-9), and special characters
(+ - _ ^ , # % etc).
1.2.1. Definitions
Let the user input code be denoted by In = C1C2C3.. .c«, and its length be defined as
« = L (C1C2 C3...Cn. Let X be the list of all the password characters i.e. A,.. .,Z,
a,...,z, 0-9, symbols} and Y the set of the corresponding randomly generated
numbers such that each value of X is assigned a random value from Y.
1.2.2. Constraint
The set of randomly generated numbers S = (r : 0 < r < 9,r E Z} is such that
n( y\
n(X) is evenly divisible by n(S), i.e. — ~ ^ "^ust be an integer. Also,
n[S)
the frequency of each /, = d V;
Definition:
Password database D[p] is a sorted list of p legitimate users-passwords that
are allowed access to the system.
Input: D[p]
n = L (C1C2C3.. .Cn) i. e. user password length
G(c¡), the set of password characters of each input code
Method:
case n:
For index [0] = 0 to L ( G (Cg )) - 1 ;
For index [1] = 0 to L(G(C,)) -1 ;
For index [2] = 0 to L ( G (Cj )) - 1 ;
• • •
For index [n-1] = 0 to L ( G ( C „ _ , ) ) - 1 ;
tempPassword =
stmcpy (tempPassword,
G(Co) + index[ö], l)
+ stmcpy (tempPassword, G(C^] + index[\], 1)
+ stmcpy (tempPassword,G(C2) + index[2], 1
+ stmcpy
(tempPassword, G{c^_^ ) + index[n -1], 1)
if (search (D, tempPassword)) = tme)
begin
exit Password Authentication;
login 0;
end
next index[n-]];
next ;ndex[2] ;
next ;hdex[l];
next /ndex[O] ;
write "password not found"
81
Anale. Seria Informatieä. Vol. VII fase. 2 - 2009
Annals. Computer Science Series. 7"' Tome 2"" Fase. - 2009
2. Database
The database, D, contains all the passwords of valid users. The database has
been designed to accept passwords of length up to 255 characters without
spaces but the implementer must restrict size of users' passwords to a
reasonable length, for example twelve characters, for easy computation.
3. Form interface
Visual Basic 6.0 (VB) was used for the implementation of the algorithm.
From the algorithm, a form interface was generated as shown in figure 2.
The form shows the password characters (in black) with their corresponding
numeric code (in red).
Cancd
i
Figure 2: Form interface
82
Anale. Seria Informática. Vol. VII fase. 2 - 2009
Annals. Computer Science Series. 7'^ Tome 2"'' Fase. - 2009
digit code between O and 9. The single digit labels are generated randomly
and are equally distributed.
An user must study the interface form carefully, and then enter the
numeric digits corresponding to his actual password characters. Upon
completion of the input the user hits the enter key. This triggers the
algorithm to regenerate a new input form followed by authentication of the
last input password. The input interface form regeneration is necessary to
harden the password entry system and make it extremely difficult, if not
impossible, for attackers to spy.
83
Anale. Seria Informática. Vol. VII fase. 2 - 2009
Annals. Computer Science Series. 7*^ Tome 2"" Fase. - 2009
User password
(unknown)
L a g o s ( 2 0 0 6 )
User input code 2 7 3 1 8 0 8 1 1 7 4
(asfig.2)
L B V T A H A T T B I
Y C 4 W F M F W W C P
H E 7 0 2 N 2 0 0 E Z
T 6 9 1 3 e 3 1 1 6 +
Characters
corresponding { 8 c B n u n b b 8 )
to each of the
user input code
} a g D s z s d d a %
- V i O y [ y 0 0 V =
\ A
/ w P _ ( P P /
Conclusion
References
[MSJ99] K.W. Mok, W. Lee, and S.J. - A data mining framework for
building intrusion detection model. Proceeding IEEE
Symposium on Security and Privacy, Columbia, 1999
85
Copyright of Annals. Computer Science Series is the property of "Tibiscus" University - Faculty of Computers
& Applied Computer Sciences and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder's express written permission. However, users may print, download, or
email articles for individual use.
Copyright of Annals. Computer Science Series is the property of Tibiscus University -
Faculty of Computers & Applied Computer Sciences and its content may not be copied or
emailed to multiple sites or posted to a listserv without the copyright holder's express written
permission. However, users may print, download, or email articles for individual use.