Security Analysis of Password Schemes Using Virtual Environment
Abstract
Present authentication system suffer from numerous shortcomings. Textual passwords are normally utilized; in any case, user s don't follow their necessities. Users will in general pick significant words from lexicons, which make textual passwords simple to break. Numerous accessible graphical passwords have a secret word space that is not exactly or equivalent to the textual secret key space. To be validated, we present a 2-D virtual environment where the user explores and connects with different objects. The arrangement of objects and connections toward the object s inside the 2-D environment develops the user’s 2-D secret password.