A Three-Step One-Time Password Textual and Recall-Based Graphical Password For An Online Authentication
A Three-Step One-Time Password Textual and Recall-Based Graphical Password For An Online Authentication
Abstract—Text passwords are the most extensively used To address the struggle with alphanumeric authentication,
technique of computer authentication. This approach has been a significant variety of graphical password schemes have been
found to have several flaws. Users, for example, typically select devised and tested [3]. The prevalence of graphical passwords
passwords that are simple to guess. A difficult-to-guess can be explained by the fact that pictures, rather than strings
password, on the other hand, is also difficult-to-remember. of characters, are easier to recall [4]. Graphical passwords are
Textual passwords are vulnerable to brute-force and keylogger passwords that are made up of pictures or drawings. Because
attacks. Graphic passwords have been proposed in the literature people remember pictures better than text, graphical
as a possible replacement for alphanumerical passwords, based passwords are easier to remember. They are also more
on the assumption that people remember pictures better than
resistant to brute-force attacks because the search space is
text. Existing graphical passwords, on the other hand, are
vulnerable to a shoulder surfing assault. To solve these security
practically infinite. In conclusion, graphical passwords are a
flaws, this paper proposes an authentication method for online superior option for memorability and usability than text-based
applications that uses a combination of one-time passwords, passwords [5].
textual, and graphical passwords. The efficacy of the One of the shortcomings of using a graphical password
recommended solution was confirmed by usability testing and system is the likelihood of shoulder surfing [6]. A graphical
security analysis procedures. A total of thirty participants took passcode could be physically seen, particularly in public
part in the system evaluation. The security assessment found places, and if the adversary has a clear visual of the passcode
that the proposed system meets all its primary security
being inserted numerous times, they can easily crack it, which
requirements. The proposed system was found to be simple to
use, friendly, and secure throughout the usability test. When
is a severe flaw [7]. Another drawback of using a graphical
compared to traditional authentication solutions, this study password is that it is susceptible to guessing. Just like with a
exhibited greater usability and security. textual password, if the user simply registers a brief and
predictable password, the chances of it being guessable grow
Keywords—Textual Password, One-Time Password, [1]. Some researchers have proposed the use of passwordless
Graphical Password, Shoulder Surfing, Key-logging use cases like fingerprint verification [8]. However, if one of
the fingers is used as a password, for instance, and it is
I. INTRODUCTION compromised, it cannot be used again since altering a
User authentication is a method for a device to confirm the fingerprint is nearly impossible, therefore it is irreversibly
identity of a person connecting to network resources. Textual compromised. There are several ways to avoid keyloggers,
passwords are the most often used form of authentication for shoulder surfing, and guessing attacks, but none of them are
all websites and applications. Textual passwords are made up sufficient in and of themselves. A combination of strategies
of a string of letters and numbers, with or without special must be employed to effectively eliminate the problem [9].
characters or integers. Users can usually log into several This study uses a combination of one-time passwords, textual
accounts with just one username and password [1]. They are and graphical passwords to combat shoulder-surfing, replay,
not, however, fully safe. As a result, strong passwords with and key-logging assaults. As a result, the research's main
numbers, uppercase, and lowercase letters should be used. contributions are as follows:
These textual passwords are then considered strong enough to 1. Development of a secure one-time password system.
survive brute force attacks. On the other side, a strong textual
password is difficult to memorize and recall. Password replay 2. Development of a secure textual password
and keylogger attacks are also possible with textual passwords authentication system.
[2]. 3. Development of a secure graphical password
authentication system.
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on March 27,2024 at 05:49:05 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE NIGERCON
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on March 27,2024 at 05:49:05 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE NIGERCON
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on March 27,2024 at 05:49:05 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE NIGERCON
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on March 27,2024 at 05:49:05 UTC from IEEE Xplore. Restrictions apply.
2022 IEEE NIGERCON
Authorized licensed use limited to: Dayananda Sagar University. Downloaded on March 27,2024 at 05:49:05 UTC from IEEE Xplore. Restrictions apply.