Image based authentication using zero-knowledge protocol

One of the most critical concerns in information security today is user authentication. There is a great security when using the text-based strong password schemes but often remembering those good passwords is very hard and users writing them down on a piece of paper or saving inside the smart phone...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamad, Z., Thong, L.Y., Zakaria, A.H., Awang, W.S.W.
Format: Conference or Workshop Item
Language:English
Published: 2018
Subjects:
Online Access:http://eprints.unisza.edu.my/1672/1/FH03-FIK-18-14462.jpg
http://eprints.unisza.edu.my/1672/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Sultan Zainal Abidin
Language: English
id my-unisza-ir.1672
record_format eprints
spelling my-unisza-ir.16722020-11-19T06:35:08Z http://eprints.unisza.edu.my/1672/ Image based authentication using zero-knowledge protocol Mohamad, Z. Thong, L.Y. Zakaria, A.H. Awang, W.S.W. QA75 Electronic computers. Computer science T Technology (General) One of the most critical concerns in information security today is user authentication. There is a great security when using the text-based strong password schemes but often remembering those good passwords is very hard and users writing them down on a piece of paper or saving inside the smart phone. There is an alternative solution to the text-based authentication which is the Graphical User Authentication (GUA) or simply image-based Password based on the fact that humans tend to memorize images better. This type of approach allows users to create and remember passwords easily. However, one big issues that is plaguing GUA is shoulder surfing attack that can capture the users mouse clicks and eavesdropping. In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. In zero-knowledge protocol, users prove that they know the graphical password without sending it. In other words, the user does not send the password to the verifier or reveal it to the people nearby. Hackers who try to eavesdrop the password will be failed since the password is not sent over the insecure channel such as Internet nor reveal. Therefore it is a secured approach to prevent interception by unwanted parties or adversary. The result that is going to be yielded in this project is a secured authentication approach which is user-friendly. 2018 Conference or Workshop Item NonPeerReviewed image en http://eprints.unisza.edu.my/1672/1/FH03-FIK-18-14462.jpg Mohamad, Z. and Thong, L.Y. and Zakaria, A.H. and Awang, W.S.W. (2018) Image based authentication using zero-knowledge protocol. In: 4th International Conference on Computer and Technology Applications, ICCTA 2018, 03-05 May 2018, Istanbul, Turkey..
institution Universiti Sultan Zainal Abidin
building UNISZA Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Sultan Zainal Abidin
content_source UNISZA Institutional Repository
url_provider https://eprints.unisza.edu.my/
language English
topic QA75 Electronic computers. Computer science
T Technology (General)
spellingShingle QA75 Electronic computers. Computer science
T Technology (General)
Mohamad, Z.
Thong, L.Y.
Zakaria, A.H.
Awang, W.S.W.
Image based authentication using zero-knowledge protocol
description One of the most critical concerns in information security today is user authentication. There is a great security when using the text-based strong password schemes but often remembering those good passwords is very hard and users writing them down on a piece of paper or saving inside the smart phone. There is an alternative solution to the text-based authentication which is the Graphical User Authentication (GUA) or simply image-based Password based on the fact that humans tend to memorize images better. This type of approach allows users to create and remember passwords easily. However, one big issues that is plaguing GUA is shoulder surfing attack that can capture the users mouse clicks and eavesdropping. In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. In zero-knowledge protocol, users prove that they know the graphical password without sending it. In other words, the user does not send the password to the verifier or reveal it to the people nearby. Hackers who try to eavesdrop the password will be failed since the password is not sent over the insecure channel such as Internet nor reveal. Therefore it is a secured approach to prevent interception by unwanted parties or adversary. The result that is going to be yielded in this project is a secured authentication approach which is user-friendly.
format Conference or Workshop Item
author Mohamad, Z.
Thong, L.Y.
Zakaria, A.H.
Awang, W.S.W.
author_facet Mohamad, Z.
Thong, L.Y.
Zakaria, A.H.
Awang, W.S.W.
author_sort Mohamad, Z.
title Image based authentication using zero-knowledge protocol
title_short Image based authentication using zero-knowledge protocol
title_full Image based authentication using zero-knowledge protocol
title_fullStr Image based authentication using zero-knowledge protocol
title_full_unstemmed Image based authentication using zero-knowledge protocol
title_sort image based authentication using zero-knowledge protocol
publishDate 2018
url http://eprints.unisza.edu.my/1672/1/FH03-FIK-18-14462.jpg
http://eprints.unisza.edu.my/1672/
_version_ 1684657735133560832