|
advertisement |
|
|
|
|
|
|
Instruments and Systems: Monitoring, Control, and Diagnostics Annotation << Back
The mathematical model
of the subsystem based authentication
of graphic images in operating systems |
Yu.Yu. Gromov, A.V.Yakovlev, E.O.Vasjukova, M. A. Pelivan
In the article are reviewed the process of authentication based graphical password functionality in Windows 8, the basic gestures used to
create a password and their resistance to certain types of attacks. Produced a General formal description of gestures, from which is formed
the graphical password and frequent description of each of the gestures. Defined conditions for the occurrence of collisions when the input
graphical password by the user and parry them. It was found that the gesture “point” has a good stability to attack on the basis of spying,
the gesture “line” is resistant to brute force attacks, and gesture “circle” has a relative resistance to brute force attacks than gesture type line.
The conducted research allows to make a conclusion, that the subsystem graphics authentication cannot guarantee absolute stability, like all
subsystems, based on the password, but can be used for two-factor authentication.
Keywords: authentication, graphical password, graphical authentication, gesture “point”, gesture “line”, gesture “circle”.
Contacts: gromovtambov@yandex.ru
Pp. 11-17. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |