
It's hard to remain all of these, moreover if we don't use it often.
#ANCHOR GPASS PASSWORD#
Study on robustness of the system against Sniffing can be suggested for further study.GPass : Password manager for Firefox and Chrome IntroductionĮveryday we have a lot of passwords to manage corresponding to a lot of accounts we use. This system can be improved to provide a wider password space if more server variables are involved (such as date). The proposed research is an approach to enhance the existing Graphical Password techniques and resist against attacks like Shoulder Surfing. Our goal is to propose a new Graphical Password scheme that takes advantage of graphical input displays capabilities to achieve better security than text-based passwords. Despite the high standards of Graphical Passwords, they are still vulnerable to some kinds of attacks. A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Graphical passwords seem to be the solution as it is described more in the paper.

Usability and security are two important issues to be concerned about while working with passwords. Other than being secure against these attacks passwords should be easy to remember. A big draw back of password is called password problem which is not being resist against several password attacks such as guessing, dictionary attack, key-loggers, shoulder-surfing and social engineering. Passwords are widely used when accessing computers, networks, accounts and websites. The proposed guidelines are also helpful in analyzing any recognition based schemes with respect to the three parameters. The guidelines are separately described against security, memorability and usability aspects. In this research paper, guidelines are proposed for improving the overall performance of recognition based schemes. In general graphical password schemes can be categorised as recognition based schemes, cued recall-based schemes, pure-recall based and hybrid schemes. If a scheme is weak in any one of these parameters, then it will not be accepted by the users and security experts. Graphical password scheme can be judged by three aspects or parameters that are security, memorability and usability. However graphical password schemes require significant amount of time for password entry, hence usability is another concern attached with such schemes. In graphical password technique, combination of pictures or drawings are used as a password. In order to overcome the security and memorability issues of text based password scheme, graphical password technique was introduced. Whereas the passwords consist of alphanumeric characters are difficult to remember. Security issues increases when a user set short and easy to remember password. Text based authentication scheme is widely used since long time. Security analysis of GPASS scheme is also presented along with comparison of other recognition based graphical password schemes. In the GPASS scheme users select password by clicking on a group of four password elements which help to improve the authentication process. In this paper a combined textual and graphical password scheme (GPASS) is proposed with its implementation and usability results. Therefore a graphical password scheme is required, which is resistant to shoulder surfing and similar attacks along with better usability and memorability. To overcome this issue researchers developed different graphical password schemes but most of them suffer from usability and memorability issues.
#ANCHOR GPASS SOFTWARE#
Anyone monitoring the process of login, through camera or some kind of recording software can recognize the password easily. However shoulder surfing attack is common in graphical password schemes. This approach solved most of the problems present in textual passwords.

To make authentication process more secure and easy to memorize, graphical password authentication has been introduced. Textual password is serving to authentication since long time, but it is vulnerable to different kinds of attacks. Authentication is very important for secure use of any computerized system.
