High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Keylogging-Resistant Visual Authentication Protocols

Author(s):

Ravikant Jadhav , Genba Sopanrao Moze College of Engineering, Balewadi; Abhijit Gogre, Genba Sopanrao Moze College of Engineering, Balewadi; Prof. Priyanka Mane, Genba Sopanrao Moze College of Engineering, Balewadi; Devarsh Khedkar, Genba Sopanrao Moze College Of Engineering, Balewadi Pune; Prabhakar Avhad, Genba Sopanrao Moze College of Engineering, Balewadi

Keywords:

Keylogging, QR Code, Shoulder-Surfing Attack

Abstract

The design of secure authentication protocols is reasonably tough, considering that varied types of root kits reside in Personal Computers (PCs) to appear at user's behaviour and to form PCs untrusted devices. Involving human in authentication protocols, whereas promising, is not easy due to their restricted capability of computation and learning. Therefore, wishing on users to spice up security basically degrades the usability. On the alternative hand, quiet assumptions and rigorous security vogue to boost the user experience can end in security breaches which is able to hurt the users’ trust. Throughout this paper, we've got an inclination to demonstrate but careful image vogue can enhance not entirely the protection but together the usability of authentication. To that end, we've got an inclination to propose a pair of visual authentication protocols: one could also be a one-time-password protocol, and additionally the choice could also be a password-based authentication protocol. Through rigorous analysis, we've got an inclination to verify that our protocols unit of measurement proof against many of the tough authentication attacks applicable among the literature. What's additional, exploitation AN intensive case study on a model of our protocols, we've got an inclination to spotlight the potential of our approach for real world deployment: we've got an inclination to be ready to deliver the products a high level of usability whereas satisfying tight security wants.

Other Details

Paper ID: IJSRDV5I100253
Published in: Volume : 5, Issue : 10
Publication Date: 01/01/2018
Page(s): 910-912

Article Preview

Download Article