IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622153                                                     

Review Paper on Improved Security Using Captcha as Graphical Password


Priyanka J. Charde, Prof. M. S. Khandare
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as Pass Points, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.

Priyanka J. Charde, Prof. M. S. Khandare

Graphical Password, Password, Hotspots, Carp, Captcha, Dictionary Attack, Password Guessing Attack, Security Primitive.

  1. R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical passwords: Learning from the first twelve years," ACM Comput. Surveys, vol. 44, no. 4, 2012.
  2. (2012, Feb.). The Science Behind Pass faces Online].Available:http://www.realuser.com/published/ScienceBehindPassfaces.pdf
  3. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, "The design and analysis of graphical passwords," in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.
  4. H. Tao and C. Adams, "Pass-Go: A proposal to improve the usability of graphical passwords," Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292,2008.
  5. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Pass Points: Design and longitudinal evaluation of a graphical password system," Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.
  6. P. C. van Oorschot and J. Thorpe, "On predictive models and user drawn graphical passwords," ACM Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 1–33, 2008.
  7. K. Golofit, "Click passwords under investigation," in Proc. ESORICS, 2007, pp. 343–358.
  8. J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot spots in graphical passwords," in Proc. USENIX Security, 2007.
  9. T. Wolverton. (2002, Mar. 26). Hackers Attack eBay Accounts Online]. Available: http://www.zdnet.co.uk/news/networking/2002/03/26/hackers-attack-ebay-accounts 2107350.
  10. HP Tipping Point DVLabs, Vienna, Austria. (2010). Top Cyber Security Risks Report, SANS Institute and Qualy Research LabsOnline].Available:http://dvlabs.tippingpoint.com/toprisks2010.
  11. B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in Proc. ACM CCS, 2002, pp. 161–170.
  12. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proc. Eurocrypt, 2003, pp. 294–311.
  13. N. Joshi. (2009, Nov. 29). Koobface Worm Asks for CAPTCHAOnline]. Available : http://blogs.mcafee.com/mcafee-labs/koobface-worm-asksfor- CAPTCHA

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
514-519 IJSRSET1622153   Technoscience Academy

Cite This Article

Priyanka J. Charde, Prof. M. S. Khandare, "Review Paper on Improved Security Using Captcha as Graphical Password", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.514-519, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622153.php