Cyber Security

Cyber Security

Cyber Security

PROJECT DESCRIPTION

Traditional text-based passwords suffer from numerous vulnerabilities, including being easy to forget, susceptible to keylogging, and often weak against brute-force attacks. The Graphical Password Authentication system is a web-based prototype designed to overcome these challenges. Instead of typing a password, users authenticate by selecting a pre-registered sequence of images from a larger, randomized set. This project focuses on balancing robust security with a seamless user experience, creating a practical alternative for modern web applications.

OBJECTIVE

  • Enhance Security: Develop an authentication mechanism resistant to common attacks like keylogging, shoulder surfing, and dictionary attacks.

  • Improve Usability: Create a login process that is more intuitive, faster, and easier to remember than complex text passwords.

  • Develop a Functional Prototype: Build a complete, working system that demonstrates the registration and login process using graphical passwords.

  • Achieve a Balance: Ensure the final design effectively balances high security standards with a positive and accessible user experience.

CHALLENGES

  • Usability vs. Security: The core challenge was finding the right balance. A small image set is insecure, while a very large one can be overwhelming and difficult for users to remember their selection. We needed to determine the optimal grid size and image sequence length.

  • Shoulder Surfing Mitigation: While graphical passwords protect against keyloggers, an observer could still watch a user select their images. The design had to incorporate features like a large grid of distractor images and randomization of image positions on each login attempt to mitigate this risk.

  • System Scalability: The architecture needed to efficiently handle a large library of images and a growing user base without compromising performance or security.

  • Secure Implementation: Ensuring that the chosen password sequence was securely hashed, stored, and transmitted was critical to prevent database breaches or replay attacks.

DESIGN PROCESS

  1. Research & Ideation: We began by studying existing literature on graphical authentication schemes and analyzing their strengths and weaknesses. This phase involved brainstorming various interaction models and security protocols.

  2. UX/UI Design: Low-fidelity wireframes were created to map out the user flow for both registration and login. These were then developed into high-fidelity mockups, focusing on a clean, modern interface that made the image selection process intuitive and visually appealing.

  3. System Architecture: We designed the backend infrastructure, defining the database schema for storing user data and hashed image sequences. The architecture was built to separate the front-end interface from the back-end logic for better security and maintainability.

  4. Prototyping & Development: Using the finalized designs, we developed a full-stack web application. The front end was built to be responsive and interactive, while the back end handled user management, password verification, and security logic.

  5. Testing & Refinement: The prototype underwent rigorous testing, including usability tests with target users to assess memorability and ease of use, and security testing to identify and patch potential vulnerabilities. Feedback from this stage was used to make final refinements.

Create a free website with Framer, the website builder loved by startups, designers and agencies.