Abstract

Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication scheme. This is a challenge-response protocol, or a question answering method that needs the users to do some form of cognitive functions or cognitive operations. By using the timing attack on the Hopper Blum method we can show that this authentication scheme is not secure against observation attack. And provide a pictorial or graphical authentication scheme with the help of the Hopper Blum method. Also propose more security enhancements of these schemes. The enhancements show the existence of a strong tradeoff between security and usability, indicating that the safety of cognitive authentication methods comes in a non-negligible usability cost. For this reason, the design of a new cognitive authentication method should not ignore possible threats induced by side-channel timing attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.