130 likes | 224 Views
This project focuses on enhancing security through pattern authentication and encryption for Deaf users. It proposes visual patterns for authentication, tackling the shortcomings of text-based passwords and ensuring data encryption remains secure. The low-level design includes steps for file encryption while the RSA encryption source code will be utilized. The project plan entails implementing the proposed solution to provide a secure user experience for Deaf individuals.
E N D
Securing SignSupprtFocusing on user authentication and data encryption Student name: Lindokuhle Duma Supervisor: Prof. Tucker
Pattern authentication • Visual for Deaf users instead of text • Deaf people are accustomed to signed language • Easy to remember visuals than text [1]
Disadvantages of pattern password • Smudge attack [2] • Over shoulder surfing[3]
Better solution for Encryption • Files should stay Encrypted • Only encrypt the file’s content in memory
Low level Design • Read the input from the file • Generate a random key • Ensure that the key is of the correct bits • Encrypt the input data into cipher text • Return cipher text
References • [1] Jansen, W. (2004). Authenticating mobile device users through image selec-tion. The Internet Society: Advances in Learning, Commerce and Security,1, 183-194. • [2] Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference • [3] CA Technologies (2011),authentication-system CE technolo-gies,Advanceauthentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf • [4] Mallow, Christopher. (2007) Authentication Methods and Tech-niques. Global Information Assurance Certication. http://www.giac.org/resources/whitepaper/access/2.php. Retrieved on October 17, 2007.