D´ej`a Vu: A User Study Using Images for Authentication

14
D´ej`a Vu: A User Stud y Using Images for Authe ntication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報報報 報報報

description

D´ej`a Vu: A User Study Using Images for Authentication. Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎. Outline. Introdution Password-Based Authentication D´ej`a Vu System Architecture Sample Applications User Study Conclution. Introduction. - PowerPoint PPT Presentation

Transcript of D´ej`a Vu: A User Study Using Images for Authentication

Page 1: D´ej`a Vu: A User Study Using Images for Authentication

D´ej`a Vu: A User StudyUsing Images for Authenticat

ion

Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley

報告人:張淯閎

Page 2: D´ej`a Vu: A User Study Using Images for Authentication

Outline

• Introdution• Password-Based Authentication• D´ej`a Vu• System Architecture• Sample Applications• User Study• Conclution

Page 3: D´ej`a Vu: A User Study Using Images for Authentication

Introduction

• User authentication is a central component of currently deployed security infrastructure.– Knowledge-based– Token-based– Biometrics

• Human’s vast memory for picture.• Recognition-based authentication in

D´ej`a Vu system.

Page 4: D´ej`a Vu: A User Study Using Images for Authentication

Shortcomings of Password-Based Authentication

• Relies on precise recall of the secret information.

• Security problem– 15% users picked passwords shorter or equal to

three characters.– 85% passwords can be easily broken by using

dictionary.– Users often employ similar passwords for

different purposes.

• Current Solutions– Aim to identify weak passwords.– Establish rules to guide user to follow.

Page 5: D´ej`a Vu: A User Study Using Images for Authentication

D´ej`a Vu

• Three requirements– Not rely on precise recall.– Prevent users from choosing weak passwords.– Difficult to write passwords down or share to

others.

• System Architecture– Based on the observation that people have an

excellent memory for images.– Three phases:

• Portfolio Creation Phase• Training Phase• Authentication Phase

Page 6: D´ej`a Vu: A User Study Using Images for Authentication

Portfolio Creation Phase

• System based on photographs or random art.

• Not store images pixel-by-pixel in random art.

Page 7: D´ej`a Vu: A User Study Using Images for Authentication

Training and Authentication Phase

• Training phase– To improve the memorability of the

portfolio images.– Need to occur in a secure environment.

• Authentication phase– Server only needs to store the seed.– If user correctly identifies all portfolio

images from challenges set (portfolio and decoy images), then she authenticated.

– Portfolio can be to split among multiple servers to increase security.

Page 8: D´ej`a Vu: A User Study Using Images for Authentication

Attacks and Countermeasures

• Brute-force attack– Challenge set consisting of n images.– Portfolio consisting of m images.– Probability

• Educated Guess Attack– Random art makes it hard to predict.– Hand select images to ensure that no

weak images are used.

m

n1

Page 9: D´ej`a Vu: A User Study Using Images for Authentication

Attacks and Countermeasures

• Observer Attack– The position of the portfolio images with

in the challenge set is randomized.– The method for the image selection is

hidden.– The portfolio images can be slightly

changed in each authentication.• Intersection Attack

– Use same challenge set– Split up into multiple stages– Tighten the bound on un successful

logins before the account is blocked

Page 10: D´ej`a Vu: A User Study Using Images for Authentication

Sample Applications

• Customer Authentication at ATM– Avoiding write PIN on the ATM card.– Portfolio selection and training can be d

on in a secure environment at the bank.– A one-time PIN to bootstrap the system.

• Web Authentication– Users often use the same username an

d password for the different purpose– Users often forget their passwords– D´ej`a Vu is well suited, because the rec

overy rate is lower than using passwords.

Page 11: D´ej`a Vu: A User Study Using Images for Authentication

User Study

• Task Completion Time and Error Rate.

Page 12: D´ej`a Vu: A User Study Using Images for Authentication

Conclusion

• This system has the advantage that the authentication task is more reliable, easier and fun to use.

• Prevent users from choosing weak passwords and write passwords down.

• Has potential applications ,especially where text input is hare like PDAs or ATMs.

• The authentication schemes take advantage of innate human abilities.

Page 13: D´ej`a Vu: A User Study Using Images for Authentication

Random Art

• A proposed hash visualization algorithm.• The basic idea is to use a binary string s as

a seed for a random number generator.• Random Art is an algorithm such that given

a bit-string as input, it will generate a function F:[-1,1]2->[-1,1]3,which defines an image.

• F maps each pixel (x,y) to a RGB value (r,g,b) which is a triple of intensities for the red, green and blue values, respectively.

Page 14: D´ej`a Vu: A User Study Using Images for Authentication

Random Art