Skip to Main Content
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. IBA encapsulates Kerberos Protocol, Version 5, and provides clients a completely unique and secured authentication tool to work on. This paper is a comprehensive study on the subject of using images as the password set and the implementation of Jaypee University of Information Technology (JUIT) IBA system called as JUIT-IBA. This tool provides a secure channel of communication between the communicating entities. The assortment of image set as client's password aims at thwarting Brute Force attacks, Shoulder attack, and Tempest attack at the client side while the attacks at the server side can be averted by putting into practice Kerberos protocol. It also describes how our system works along with the evaluation of its performances in different computing environments.