An Algorithm for Color-Based Password Authentication to Increase Security Level

Siti Rahayu Selamat, Soung Young Cai, Nor Hafeizah Hassan, Robiah Yusof

Abstract

Security level in authentication is essential to decrease the possibility of an account being guessed. Several authentication methods are widely used nowadays, covering digital aspects such as passwords, challenge-response, public and private key / digital certificates, and physical elements such as fingerprints, iris, or retina scanning. This paper aims to focus on solving the problem of the password. This textual authentication consists of many vulnerabilities open to attacks like eavesdropping, dictionary attack, and brute force attack by increasing the level of complexity in the authentication algorithm. In this paper, we proposed a new color-based password authentication algorithm to solve the vulnerabilities in textual authentication. The color-based password authentication algorithm consists of three main processes: color selection, hexadecimal password encryption, and password verification. This research contributes to a new color-based authentication by increasing the complexity of the verification process that can solve the vulnerabilities of textual authentication and harden the level of security in the authentication layer. This color-based authentication algorithm could fully replace textual authentication in the future and is worth using in sensitive data domains such as medical and health or banking institutions.

Full Text:

PDF (15-22)

References

Lal, N. A., Prasad, S., and Farik, M., “A Review of Authentication Methods”, International Journal of Scientific & Technology Research, vol. 5, no. 11, pp. 246-249, 2016.

Awan, K. A., Ud Din, I., Almogren, A., Kumar, N., and Almogren, A., “A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things”, ACM Transactions on Internet Technology (TOIT), vol. 22, no. 2, pp. 1-28, 2021.

Gould, E. M, “Authentication Methods and Recent Developments”, Serials Review, vol. 44, no. 3, pp. 247-250, 2018.

Zimmermann, V., and Gerber, N., “The Password Is Dead, Long Live the Password–A Laboratory Study on User Perceptions of Authentication Schemes”, International Journal of Human-Computer Studies, vol. 133, no. 1, pp. 26-44, 2020.

Spafford, E. H., “Observations on Reusable Password Choices”, in Purdue Technical Report, no. 92-049, pp. 1-14, 1992.

Wang, C., Jan, S. T., Hu, H., Bossart, D., and Wang, G., “The Next Domino to Fall: Empirical Analysis of User Passwords Across Online Services”, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (CODASPY ’18), USA, pp. 196-203, 2018.

Pearman, S., Zhang, S. A., Bauer, L., Christin, N., and Cranor, L. F, “Why People (Don't) Use Password Managers Effectively”, in Proceedings of the Fifteenth Symposium on Usable Privacy and Security, Canada, pp. 319-338, 2019.

Alomari, R., and Thorpe, J., “On Password Behaviours and Attitudes in Different Populations”, Journal of Information Security and Applications, vol. 45, pp. 79-89, 2019.

O'Rourke, M., “The Year's Worst Password Offenders”, Risk Management, vol. 66, no. 1, pp. 36-36, 2019.

Dashline, “It’s the Most Unsecure Time of the Year: Worst Password Offenders 2021”, December 14, 2021.

Elizabeth Stobert and Robert Biddle, “The Password Life Cycle”, ACM Transactions on Security and Privacy, vol. 21, no. 3, Article 13, pp. 1-32, 2018.

He, D., Zhou, B., Yu, H., Cheng, Y., Chan, S., Zhang, M., and Guizani, N., “Group-Based Password Characteristics Analysis”, IEEE Network, vol. 35, no. 1, pp. 311-317, 2020.

Taha, M. S., Rahim, M. S. M., Lafta, S. A., Hashim, M. M., and Alzuabidi, H. M, “Combination of Steganography and Cryptography: A Short Survey”, in Proceeding of IOP Conference Series: Materials Science And Engineering, vol. 518, no. 5, pp. 1-14, 2019.

Deepthi, D. V. V., Benny, B. H., and Sreenu, K., “Various Ciphers in Classical Cryptography”, Journal of Physics, vol. 1228, no. 1, pp. 1-7, 2019.

Aung, T. M., Naing, H. H., and Hla, N. N., “A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)”, International Journal of Machine Learning and Computing, vol. 9, no. 3, pp. 296-303, 2019.

Rachmawati, D., Hardi, S. M., and Pasaribu, R. P., “Combination of Columnar Transposition Cipher Caesar Cipher and Lempel Ziv Welch Algorithm in Image Security and Compression”, Journal of Physics, vol. 1339, no. 1, pp. 1-7, 2019.

Rihartanto, R., Supriadi, S., and Utomo, D. S. B., “Image Tiling Using Columnar Transposition”, in Proceeding of International Conference on Applied Information Technology and Innovation (ICAITI), Indonesia, pp. 118-123, 2018.

Kikani, R. J., Verma, K., Navalakhe, R., Shrivastava, G., and Shrivastava, V., “Cryptography: Recent Research Trends of Encrypting Mathematics”, Materials Today: Proceedings, vol. 56, no. 6, pp. 3247-7853, 2022.

Jagetiya, A., and Krishna, C. R., “Evolution of Information Security Algorithms”, In Design and Analysis of Security Protocol for Communication, pp. 29-77, 2020.

Santos, A., and Júnior, R. V., “Improving Caesar Cipher for Greater Security”, Kriativ-Tech, vol. 1, no. 9, pp. 1-7, 2021.

Singh, K., Johari, R., Singh, K., and Tyagi, H., “Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques”, in Proceedings of IEEE International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), India, pp. 223-228, 2019.

Fadlan, M., Haryansyah, and Rosmini, “Three Layer Encryption Protocol: An Approach of Super Encryption Algorithm”, in Proceedings of the 3rd IEEE International Conference on Cybernetics and Intelligent System (ICORIS), pp. 1-5, 2021.

Dooley, J. F., “The Machines Take Over: Computer Cryptography”, In History of Cryptography and Cryptanalysis, Springer, pp. 167-184, 2018.

Zodpe, H., and Shaikh, A., “A Survey on Various Cryptanalytic Attacks on the AES Algorithm”, International Journal of Next-Generation Computing, vol. 12, no. 2, pp. 115-123, 2021.

Nyarko-Boateng, O., Asante, M., and Nti, I. K., “Implementation of Advanced Encryption Standard Algorithm With Key Length of 256 Bits for Preventing Data Loss in An Organization”, International Journal of Science and Engineering Applications, vol. 6, no. 3, pp. 88-94, 2017.

Refbacks

  • There are currently no refbacks.