Abstract
Password security has emerged as a promising field in the Computer science and technology. The innovative strategies are found to be costly and also require expertise to use them. The widely used methods of password security are pass-faces and biometrics password authentication schemes. Though they serve their purpose but are found to be cost ineffective.This paper looks at the new concepts of password security based on text-based authentication, ensuring the security from dictionary attacks. It is based on the principle of conversion of the characters of password in some control points, an unrecognizable form for intruders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. In: ACM Computer Communication Review, Westboro (1996)
Albataineh, M., En-Nouaary, A.: Strengthening Password Authentication Systems. In: Sixth International Network Conference, Plymouth (2006)
Chiasson, S., Biddle, R.: Issues in User Authentication. In: CHI Workshop Security User Studies Methodologies and Best Practices (2007)
Boroditsky, M.: Passlogix password schemes, http://www.passlogix.com
Lomas, M., Gong, L., Saltzer, J., Needham, R.: Reducing risks from poorly chosen keys. In: Proceedings of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp. 14–18 (1989)
Kwon, T.: Ultimate Solution to Authentication via Memorable Password. In: A Proposal for IEEE, p. 13631a. IEEE Press, Los Alamitos (2000)
Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communications Security, pp. 244–250 (1993)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1997)
Bellare, M., Rogawayy, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. In: Contribution to IEEE, p. 1363. IEEE Press, California (2000)
Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)
Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)
RealUser, http://www.realuser.com
Wiedenbecka, S., Watersa, J., Birgetb, J., Camille, B.A., Memon, N.: PassPoints Design and Longitudinal Evaluation of a Graphical Password System. J. Human Computer Studies 63, 102–127 (2005)
Hartanto, B., Santoso, B., Welly, S.: The Usage of Graphical Password As a Replacement To The Alphanumerical Password. J. Informatika 7(2), 91–97 (2006)
Kumar, M., Katti, R.: A Hash-based Strong Password Authentication Protocol with User Anonymity. J. International Journal of Network Security 2(3), 205–209 (2006)
Chen, M., Ku, W.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Transactions on Communications E85-B(11), 2519–2521 (2002)
Abdalla, M., Izabachène, M., Pointcheval, D.: Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 133–148. Springer, Heidelberg (2008)
Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth Projective Hashing for Conditionally Extractable Commitments. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 671–689. Springer, Heidelberg (2009)
Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 254–271. Springer, Heidelberg (2009)
Lashkari, A., Habibi, F.S.: A Survey On Usability And Security Features In Graphical User Authentication Algorithms. J. Computer Science and Network Security 9(9) (September 2009)
Itoh, K., Ohno, Y.: A curve fitting algorithm for character fonts. Electronic Publishing 6(3), 195–205 (1993)
Avrahami, G., Pratt, V.: Sub-pixel edge detection in character digitization. In: Morris, R., Andre, J. (eds.) Raster Imaging and Digital Typography II, pp. 54–64. Cambridge University Press, Cambridge (1991)
Davis, L.: Shape matching using relaxation techniques. IEEE Trans. PAMI 1, 60–72 (1979)
Perumal, V., Ramaswamy, J.: An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations (IJCSIS) International Journal of Computer Science and Information Security 6(1) (2009)
Pal, S., Biswas, P.K., Abraham, A.: Face Recognition Using Interpolated Bezier Curve Based Representation. In: IEEE Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004 (2004) 0-7695-2108-8/04
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khurana, S., Khatri, S.K. (2010). Securing Password File Using Bezier Curves. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_119
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_119
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)