Securing SignSupprtFocusing on user authentication and data encryption Student name: Lindokuhle Duma Supervisor: Prof. Tucker
Pattern authentication • Visual for Deaf users instead of text • Deaf people are accustomed to signed language • Easy to remember visuals than text 
Disadvantages of pattern password • Smudge attack  • Over shoulder surfing
Better solution for Encryption • Files should stay Encrypted • Only encrypt the file’s content in memory
Low level Design • Read the input from the file • Generate a random key • Ensure that the key is of the correct bits • Encrypt the input data into cipher text • Return cipher text
References •  Jansen, W. (2004). Authenticating mobile device users through image selec-tion. The Internet Society: Advances in Learning, Commerce and Security,1, 183-194. •  Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference •  CA Technologies (2011),authentication-system CE technolo-gies,Advanceauthentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf •  Mallow, Christopher. (2007) Authentication Methods and Tech-niques. Global Information Assurance Certication. http://www.giac.org/resources/whitepaper/access/2.php. Retrieved on October 17, 2007.