A Robust Scheme for Impervious Authentication
T. Srinivasa Ravi Kiran1, A.Srisaila2, A. Lakshmanrao3

1Dr. T. Srinivasa Ravi Kiran, Department of Computer Science P.B.Siddhartha College of Arts & Science Vijayawada, India.

2Dr. A.Srisaila, Department of Information Technology V.R.Siddhartha Engineering College Vijayawada, India.

3A. Lakshmanrao, Department of Computer Science & Engineering Pragati Engineering College Surampalem, India.  

Manuscript received on 05 March 2019 | Revised Manuscript received on 12 March 2019 | Manuscript Published on 20 March 2019 | PP: 480-485 | Volume-8 Issue- 4S2 March 2019 | Retrieval Number: D1S0104028419/2019©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a day’s every one using the passwords for user authentication. Most often passwords are alphanumeric, consisting of letters, numbers and symbols. A shoulder surfer can easily watch the password if the password is too short. If the password too complex and lengthy it is difficult for the user to remember it. At the same time passwords have to be changed every few months to take care of security. To overcome these problems, graphical passwords are developed. The motivation behind selecting an authentication mechanism scheme was that persons can simply evoke pictures rather than remembering lengthy and complex text based passwords. In this paper, we present a new, comprehensible, recall-based graphical password scheme where the user is required to recognize the pentagon for some specific permutations of secret characters on the existing display. The token holder is expected to select the certain password permutations in the same order cyclically per each login attempt. For example the user go for first permutation of password for first login in attempt, second permutation of password for second login attempt, third permutation of password for third login attempt, fourth permutation of password for fourth login attempt, fifth permutation of password for fifth login attempt and sixth permutation of password for sixth login attempt.

Keywords: Password, Authentication, Security, Shoulder-Surfing, Interface, Pentagon.
Scope of the Article: Computer Science and Its Applications