Cryptanalysis of the convex hull click human identification protocol


Autoria(s): Ashgar, Hassan Jameel; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong
Data(s)

01/04/2013

Resumo

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/69326/

Publicador

Springer-Verlag

Relação

http://eprints.qut.edu.au/69326/2/Pieprzyk_authors_draft.pdf

http://link.springer.com/article/10.1007%2Fs10207-012-0161-x

DOI:10.1007/s10207-012-0161-x

Ashgar, Hassan Jameel, Li, Shujun, Pieprzyk, Josef, & Wang, Huaxiong (2013) Cryptanalysis of the convex hull click human identification protocol. International Journal of Information Security, 12(2), pp. 83-96.

Direitos

Copyright 2012 Springer-Verlag Berlin Heidelberg

The final publication is available at Springer via http://dx.doi.org/10.1007/s10207-012-0161-x

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #010000 MATHEMATICAL SCIENCES #080000 INFORMATION AND COMPUTING SCIENCES #Human identification protocols #Observer attack #User authentication #Graphical passwords #Human-computer cryptography
Tipo

Journal Article