Skip to main content

Securing Password File Using Bezier Curves

  • Conference paper
Information and Communication Technologies (ICT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

  • 1265 Accesses

Abstract

Password security has emerged as a promising field in the Computer science and technology. The innovative strategies are found to be costly and also require expertise to use them. The widely used methods of password security are pass-faces and biometrics password authentication schemes. Though they serve their purpose but are found to be cost ineffective.This paper looks at the new concepts of password security based on text-based authentication, ensuring the security from dictionary attacks. It is based on the principle of conversion of the characters of password in some control points, an unrecognizable form for intruders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. In: ACM Computer Communication Review, Westboro (1996)

    Google Scholar 

  2. Albataineh, M., En-Nouaary, A.: Strengthening Password Authentication Systems. In: Sixth International Network Conference, Plymouth (2006)

    Google Scholar 

  3. Chiasson, S., Biddle, R.: Issues in User Authentication. In: CHI Workshop Security User Studies Methodologies and Best Practices (2007)

    Google Scholar 

  4. Boroditsky, M.: Passlogix password schemes, http://www.passlogix.com

  5. Lomas, M., Gong, L., Saltzer, J., Needham, R.: Reducing risks from poorly chosen keys. In: Proceedings of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp. 14–18 (1989)

    Google Scholar 

  6. Kwon, T.: Ultimate Solution to Authentication via Memorable Password. In: A Proposal for IEEE, p. 13631a. IEEE Press, Los Alamitos (2000)

    Google Scholar 

  7. Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communications Security, pp. 244–250 (1993)

    Google Scholar 

  8. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  9. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1997)

    MATH  Google Scholar 

  10. Bellare, M., Rogawayy, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. In: Contribution to IEEE, p. 1363. IEEE Press, California (2000)

    Google Scholar 

  11. Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)

    Google Scholar 

  12. Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)

    Google Scholar 

  13. Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)

    Google Scholar 

  14. RealUser, http://www.realuser.com

  15. Wiedenbecka, S., Watersa, J., Birgetb, J., Camille, B.A., Memon, N.: PassPoints Design and Longitudinal Evaluation of a Graphical Password System. J. Human Computer Studies 63, 102–127 (2005)

    Article  Google Scholar 

  16. Hartanto, B., Santoso, B., Welly, S.: The Usage of Graphical Password As a Replacement To The Alphanumerical Password. J. Informatika 7(2), 91–97 (2006)

    Google Scholar 

  17. Kumar, M., Katti, R.: A Hash-based Strong Password Authentication Protocol with User Anonymity. J. International Journal of Network Security 2(3), 205–209 (2006)

    Google Scholar 

  18. Chen, M., Ku, W.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Transactions on Communications E85-B(11), 2519–2521 (2002)

    Google Scholar 

  19. Abdalla, M., Izabachène, M., Pointcheval, D.: Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 133–148. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth Projective Hashing for Conditionally Extractable Commitments. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 671–689. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  21. Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 254–271. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Lashkari, A., Habibi, F.S.: A Survey On Usability And Security Features In Graphical User Authentication Algorithms. J. Computer Science and Network Security 9(9) (September 2009)

    Google Scholar 

  23. Itoh, K., Ohno, Y.: A curve fitting algorithm for character fonts. Electronic Publishing 6(3), 195–205 (1993)

    Google Scholar 

  24. Avrahami, G., Pratt, V.: Sub-pixel edge detection in character digitization. In: Morris, R., Andre, J. (eds.) Raster Imaging and Digital Typography II, pp. 54–64. Cambridge University Press, Cambridge (1991)

    Google Scholar 

  25. Davis, L.: Shape matching using relaxation techniques. IEEE Trans. PAMI 1, 60–72 (1979)

    MATH  Google Scholar 

  26. Perumal, V., Ramaswamy, J.: An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations (IJCSIS) International Journal of Computer Science and Information Security 6(1) (2009)

    Google Scholar 

  27. Pal, S., Biswas, P.K., Abraham, A.: Face Recognition Using Interpolated Bezier Curve Based Representation. In: IEEE Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004 (2004) 0-7695-2108-8/04

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khurana, S., Khatri, S.K. (2010). Securing Password File Using Bezier Curves. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_119

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_119

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics