ERA

Download the full-sized PDF of Token-based Graphical Password AuthenticationDownload the full-sized PDF

Analytics

Share

Permanent link (DOI): https://doi.org/10.7939/R3BD1G

Download

Export to: EndNote  |  Zotero  |  Mendeley

Communities

This file is in the following communities:

Graduate Studies and Research, Faculty of

Collections

This file is in the following collections:

Theses and Dissertations

Token-based Graphical Password Authentication Open Access

Descriptions

Other title
Subject/Keyword
Phishing
Trojan
USB token
Internet security
Graphical Password
Type of item
Thesis
Degree grantor
University of Alberta
Author or creator
Gyorffy, John
Supervisor and department
James Miller (Electrical and Computer Engineering)
Examining committee member and department
Yongsheng Ma
Bruce Cockburn
James Miller
Department
Electrical and Computer Engineering
Specialization

Date accepted
2009-05-28T15:03:36Z
Graduation date
2009-11
Degree
Master of Science
Degree level
Master's
Abstract
Given that phishing is an ever increasing problem, a better authentication system than the current alphanumeric system is needed. Because of the large number of current authentication systems that use alphanumeric passwords, a new solution should be compatible with these systems. We propose a system that uses a graphical password deployed from a Trojan and virus resistant embedded device as a possible solution. The graphical password would require the user to choose a family photo sized to 441x331 pixels. Using this image, a novel, image hash provides an input into a cryptosystem on the embedded device that subsequently returns an encryption key or text password. The graphical password requires the user to click five to eight points on the image. From these click-points, the embedded device stretches the graphical password input to a 32- character, random, unique alphanumeric password or a 256-bit AES key. Each embedded device and image are unique components in the graphical password system. Additionally, one graphical password can generate many 32-character unique, alphanumeric passwords using its embedded device which eliminates the need for the user to memorize many passwords.
Language
English
DOI
doi:10.7939/R3BD1G
Rights
License granted by John Gyorffy (jcgeoffrey@gmail.com) on 2009-05-28T05:09:26Z (GMT): Permission is hereby granted to the University of Alberta Libraries to reproduce single copies of this thesis and to lend or sell such copies for private, scholarly or scientific research purposes only. Where the thesis is converted to, or otherwise made available in digital form, the University of Alberta will advise potential users of the thesis of the above terms. The author reserves all other publication and other rights in association with the copyright in the thesis, and except as herein provided, neither the thesis nor any substantial portion thereof may be printed or otherwise reproduced in any material form whatsoever without the author's prior written permission.
Citation for previous publication

File Details

Date Uploaded
Date Modified
2014-04-24T23:22:24.742+00:00
Audit Status
Audits have not yet been run on this file.
Characterization
File format: pdf (Portable Document Format)
Mime type: application/pdf
File size: 1063525
Last modified: 2015:10:12 12:14:04-06:00
Filename: thesis_2009.pdf
Original checksum: a03f53049dd1d9abdea5ae70ac3e070b
Well formed: false
Valid: false
Status message: Invalid object number in cross-reference stream offset=1063490
File title: Microsoft Word - msc_thesis_header.docx
File author: John
Activity of users you follow
User Activity Date