Keylogging Resistant using Visual Authentication |
Author(s): |
Nitin Patil , ATHARVA COLLEGE OF ENGINEERING, MUMBAI; Sushan Poojary, ATHARVA COLLEGE OF ENGINEERING, MUMBAI; Ganesh Rane, ATHARVA COLLEGE OF ENGINEERING, MUMBAI; Aruna Pavate, ATHARVA COLLEGE OF ENGINEERING, MUMBAI |
Keywords: |
Authentication, Malicious software, Keylogger, QR code |
Abstract |
Now a days, the design of secure authentication process is challenging, as various kinds of keyloggers can be installed in personal computers to capture each and every keystroke made by the user and to make PC’s untrusted devices. There are many legitimate keyloggers are present in the market, however, any legitimate keylogger can still be used with malicious software. Also, intervention of human in an authentication process, while promising better security, is not easy because of the limited capability of computation and memorization of human. Therefore, depending on users to enhance security ultimately degrades the usability. In this proposed work, we demonstrate how a careful design of an authentication process can enhance not only the security but also the usability of authentication. The proposed system uses two visual authentication protocols: one is a password (i.e. login credentials) based protocol, and the other one is a QR code based authentication protocol. The aim of this work is to prevent Keylogging without compromising with the usability. |
Other Details |
Paper ID: IJSRDV5I20809 Published in: Volume : 5, Issue : 2 Publication Date: 01/05/2017 Page(s): 1102-1104 |
Article Preview |
|
|