Nuevo modelo probabilístico en autenticación gráfica

Autores/as

  • Carlos Miguel Legón Pérez Instituto de Criptografía, Facultad de Matemática y Computación, Universidad de La Habana, La Habana, Cuba https://orcid.org/0000-0002-6104-9671
  • Pedro Navarro Instituto de Criptografía, Facultad de Matemática y Computación, Universidad de La Habana, La Habana, Cuba
  • Raisa Socorro Llanes Facultad de Informática, Universidad Tecnológica de La Habana, La Habana, Cuba https://orcid.org/0000-0002-2627-1912
  • Osviel Rodríguez Valdés Facultad de Ciencias y Tecnologías, Universidad de las Ciencias Informáticas, La Habana, Cuba https://orcid.org/0000-0003-2671-6202
  • Ernesto Borrego Instituto de Criptografía, Facultad de Matemática y Computación, Universidad de La Habana, La Habana, Cuba

Palabras clave:

probabilístico contraseñas, Autenticación gráfica modelo

Resumen

La autenticación es esencial en la seguridad de los modernos servicios digitales de procesamiento de información. Las contraseñas alfanuméricas son las más empleadas, pero poseen debilidades que las hacen vulnerables a diversos ataques basados en modelos probabilísticos. Una de las alternativas es la autenticación gráfica. Los modelos probabilísticos en autenticación gráfica se aplican para estimar la clave más probable a seleccionar, en cada imagen, por el usuario que se va a registrar. En este trabajo se propone un nuevo modelo probabilístico de autenticación gráfica, su principal aporte consiste en que permite cuantificar el grado de autenticidad de cada usuario. Se confirma experimentalmente que el modelo propuesto es efectivo y permite medir en la práctica el nivel de autenticidad de los usarios autenticados.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

Iso-9126 software product evaluation – quality characteristics and guidelines for their use.

S Aggarwal, S Houshmand, and R Flood. Probabilistic password cracking system, 2016.

Bin. B., D.W. Zhu, M. Yang, and J.. Yan. Security implications of password discretization for click-based graphical passwords. In WWW, 2013.

K. Bicakci. Optimal Discretization for High-Entropy Graphical Passwords. T. PhD thesis, OBB University of Economics and Technology, Ankara, Turkey, 2007.

R. Biddle, S. Chiasson, and P.C. Van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Computer Survey, 44(4):19:1–19:41, September 2012.

J.C. Birget, D. Hong, and N Memon. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security, 1(3), Sep 2006.

J. Blocki, H. Benjamin, and Samson Z. On the economics of offline password cracking. In IEEE Symposium on Security and Privacy, volume 1, 2018.

E. B Borrego, P.E. Navarro, and C.M. Legón. Debilidades de los métodos de discretización para contraseñas gráficas. In Instituto de Criptografía. Sociedad Cubana de Matemática y Computación., editor, IV Seminario Científico Nacional de Criptografía. Universidad de la Habana, 2018.

W. E. Burr, D. F. Dodson, E. M. Newton, R. A. Perlner, W. T. Polk, S. Gupta, and E. A. Nabbus. Electronic authentication guideline: Recommendations of the national institute of standards and technology -. Technical report, U.S. Department of Commerce and National Institute of Standards and Technology, USA, 2012.

C. Castelluccia, M. DÃŒrmuth, and D. Perito. Adaptive password-strength meters from markov models. In 19th Annual Network & Distributed System Security Symposium, San Diego, United States, Feb 2012.

S. Chiasson, J. Srinivasan, R. Biddle, and P. C. van Oorschot. Centered discretization with application to graphical passwords. In Usability, Psychology, and Security, 2008.

H.C Chou, H.C. Lee, H. J Yu, F.P. Lai, K.H. Huang, and C.W. Hsueh. Password cracking based on learned patterns from disclosed passwords. International Journal of Innovative Computing, Information and Control, 9(2):821–839, 2013.

X.C. de Carnavalet and M. Mannan. From very weak to very strong: Analyzing password-strength meters. In 21st Annual Network and Distributed System Security Symposium. The Internet Society, 2014.

M. Devlin, J.R. Nurse, D. Hodges, M. Goldsmith, and S. Creese. Predicting graphical passwords. In Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust -, volume 9190, pages 23–35, New York, NY, USA, 2015. Springer-Verlag New York, Inc.

W. Ding, Haibom C., P. Wang, X. Huang, and G. Jian. Zipfs law in passwords. IEEE Transactions on Information Forensics and Security, 12(11):2776 – 2791, 2017.

A. E. Dirik, L. F. Cranor, and J.C Birget. Modeling user choice in the passpoints graphical password scheme. In Proceedings of the 3rd Symposium on Usable Privacy and Security, pages 20–28, New York, NY, USA, 2007. ACM.

D. Freeman, S. Jain, M. Dürmuth, B. Biggio, and G. Giacinto. Who are you? A statistical approach to measuring user authenticity. In NDSS. The Internet Society, 2016.

M. Golla and M. DÃŒrmuth. On the accuracy of password strength meters. In Conference on Computer and Communications Security, Toronto, Canada, Oct 2018.

S. Houshmand and S. Aggarwal. Building better passwords using probabilistic techniques. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 109–118, New York, USA, 2012. ACM.

L. Jue Min, L. Yong Hao, N. Huey Wen, T. Soon Guan, Y. Li Ho, A. Azman, and L. Siong Hoe. Comparison of graphical password using iso 9126. Advanced Science Letters, 4:400–407, 2016.

P. Karmajit, N. Bhushan, D. Prasad-Mishra, and P. Priyadarsini-Satapathy. Cued-click point graphical password using circular tolerance to increase password space and persuasive features. In Proceedings of International Conference on Communication, Computing and Virtualization, volume 79, pages 561 – 568, 2016.

C.M. Legón, P.E. Navarro, E.A. Borrego, O. Rodríguez, and R. Socorro. Modelos probabilísticos de contraseñas alfanuméricas. In IV Seminario Científico Nacional de Criptografía. Universidad de la Habana, Noviembre 2018.

J. Ma, W. Yang, M. Luo, and N. Li. A study of probabilistic password models. In IEEE Symposium on Security and Privacy, volume 1, pages 689–704, 2014.

D. Malone and K. Maher. Investigating the distribution of password choices. Cryptography and Security, 2011.

D. Malone and K. Maher. Investigating the distribution of password choices. In Proceedings of the 21st International Conference on World Wide Web, pages 301–310, New York, NY, USA, 2012. ACM.

W. Melicher, B. Ur, S.M. Segreti, S. Komanduri, L. Bauer, N. Christin, and L. F Cranor. Fast, lean, and accurate: Modeling password guessability using neural networks. In Proceedings of the 25th USENIX Security Symposium, pages 10–12, 2016.

L.L. Morales and C.M. Legón. Estimación de la fortaleza de las contraseñas. Technical report, Facultad de Ingeniería Informática. Universidad Tecnológica de la Habana, 2014.

O. Rodríguez, C.M. Legón, and R. Socorro. Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica. Revista Cubana de Ciencias Informáticas, 12(Especial UCIENCIA):13–27, Sep 2018.

S. Salehi-Abari, J. Thorpe, and P.C. van Oorschot. On purely automated attacks and click-based graphical password. In Computer Security Applications Conference, 2008.

A. Shaikh, R. Pathan, R. Patel, and S. Rukaiya. Implementation of authentication using graphical password cloud computing. International Research Journal of Engineering and Technology, 5(5), 2018.

Sunil Shendage Swapnil, Prakash Dhainje, and Shivaji Yevale Ramesh. Cued click points: Graphical password authentication technique for security. International Journal of ComputerScience and Information Technologies, 5(2), 2014.

J. Shouling, Y. Shukun, W. Ting, L. Changchang, L. WeiHan, and B. Raheem. Pars: A uniform and open-source password analysis and research system. In Proceedings of the 31st Annual Computer Security Applications Conference, pages 321–330, New York, USA, 2015. ACM.

M. N. Todd. An investigation of machine learning for password evaluation. Master’s thesis, Arizona State University, 2016.

A Toledo, M García, C. M. Legón, and J. L. Morales. Caracterización de un atacante a sistemas de autenticación por contraseña. In Segurmática, 2014.

E. Walkup. The password problem. Technical report, Sandia National Laboratories, Albuquerque, United States, 2016.

D. Wang and P. Wang. On the implications of zipfs law in passwords. In European Symposium on Research in Computer Security, pages 11–131, 2016.

M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic contex-free grammars. In IEEE Symposium on Security and Privacy, pages 391–405, 2009.

D. L. Wheeler. zxcvbn: Low-budget password strength estimation. In Proceedings of the 25th USENIX Security Symposium, SEC’16, pages 157–173, Berkeley, CA, USA, 2016. USENIX Association.

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human Computers Studies, 63(1):102–127, 2005.

Bi. B. Zhu, D. Wei, M. Yang, and J. Yan. Security implications of password discretization for click-based graphical passwords. In Proceedings of the 22Nd International Conference on World Wide Web, pages 1581–1591, New York, USA, 2013. ACM.

Descargas

Publicado

2024-03-26 — Actualizado el 2019-12-12

Versiones

Cómo citar

[1]
Legón Pérez, C.M. et al. 2019. Nuevo modelo probabilístico en autenticación gráfica. Ciencias matemáticas. 33, 2 (dic. 2019), 119–128.

Número

Sección

Artículo Original