透過您的圖書館登入
IP:216.73.216.224
  • 學位論文

一個新的圖形密碼方法

A New Graphical Password Scheme

指導教授 : 李正吉 黃秀園
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


使用者認證的安全性乃是建立於密碼的強度,密碼長度夠大則可提供電腦更多安全性上依靠。一個安全的密碼字數長度必須夠長且具有亂數特性,但記憶此種的密碼對於使用者而言是困難的。因此,使用者傾向選擇長度短或者簡單的密碼。圖型密碼是藉由點擊圖像的方式來取代以打字方式輸入密碼的方法,此方法也許可以幫助使用者更容易建立與記憶一個具有安全性的密碼。然而圖型密碼是建立在以圖像為密碼的基礎上雖能提供更多的密碼長度,但圖片過多的問題卻會造成資料庫容量上的負擔。在此篇論文中,我們改進一套名為「PassPoints」的圖型密碼系統,使用資訊隱藏學的方法來克服資料容量負擔的問題。所有資料隱藏的方法都能使用在我們所提出的方法中,並在使用者與提供服務端,兩方建立一個私密金鑰,藉此解決資料庫容量負擔的問題並提出一個安全的通訊協議來抵禦網路各種的攻擊。

並列摘要


The security of authentication is based on password strength, and computer security depends on largely passwords to provide security. A secure password must be long and random, but it is difficult for users to remember passwords. Thus, users tend to choose short or simple passwords. Graphical password is a scheme consisting of clicking on image instead of typing password, it may help users to create easy, memorize easy and have a secure passwords. However, graphical password system is based on the images which can provide large password space; however, too many images will become a big problem to database storage. In this thesis, we improve a graphical system called “PassPoints” and use the steganoaphy techniques to overcome the problem of database storage and provide more secure graphical password scheme than PassPoints. All the information hiding scheme can realize our scheme to build a secret key between users and server to solve the problem of database storage and propose a secure communication protocol to resist attacks on the internet.

參考文獻


[6] Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang, “Password Authentication Schemes: Current Status and Key Issues”, International Journal of Network Security, Vol. 3, No. 2, PP. 101-115, Sept. 2006.
[2] R. Morris, and K. Thompson, “Password Security: A Case History”, ACM Communications, Vol. 11, PP.594-597, 1979.
[3] T. WU, “A Real-World Analysis of Kerebros Password Security”. Proceedings of the 1999ISOC Symposium on Network and Distributed System Security, Vol. 8, No. 9, PP. 723-736, 1990.
[4] C. C. Lee, M. S. Hwang, W. P. Yang, “A Flexible Remote User Authentication Scheme Using Smart Cards”, ACM Operating Systems Review, Vol. 36, No. 3, PP. 46-52, 2002.
[5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, N. Memon, “PassPoints: Design and Longitudinal Evaluation of A Graphical Password System,” International Journal of Human-Computer Studies, Vol. 63, PP. 102-127, 2005.

延伸閱讀


國際替代計量