GOTPass

A system using images and a one-time numerical code could provide a secure and easy to use alternative to multi-factor methods dependent on hardware or software and one-time passwords, a study by Plymouth University suggests.

Researchers from the Centre for Security Communication and Network Research (CSCAN) believe their new multi-level authentication system GOTPass could be effective in protecting personal online information from hackers.

It could also be easier for users to remember, and be less expensive for providers to implement since it would not require the deployment of potentially costly hardware systems.

Writing in Information Security Journal: A Global Perspective, researchers say the system would be applicable for online banking and other such services, where users with several accounts would struggle to carry around multiple devices, to gain access.

They also publish the results of a series of security tests, demonstrating that out of 690 hacking attempts – using a range of guesswork and more targeted methods – there were just 23 successful break-ins.

PhD student Hussain Alsaiari, who led the study, said:

“Traditional passwords are undoubtedly very usable but regardless of how safe people might feel their information is, the password’s vulnerability is well known. There are alternative systems out there, but they are either very costly or have deployment constraints which mean they can be difficult to integrate with existing systems while maintaining user consensus. The GOTPass system is easy to use and implement, while at the same time offering users confidence that their information is being held securely.”

To set up the GOTPass system, users would have to choose a unique username and draw any shape on a 4x4 unlock pattern, similar to that already used on mobile devices. They will then be assigned four random themes, being prompted to select one image from 30 in each.

When they subsequently log in to their account, the user would enter their username and draw the pattern lock, with the next screen containing a series of 16 images, among which are two of their selected images, six associated distractors and eight random decoys.

Correctly identifying the two images would lead to the generated eight-digit random code located on the top or left edges of the login panel which the user would then need to type in to gain access to their information.

Initial tests have shown the system to be easy to remember for users, while security analysis showed just eight of the 690 attempted hackings were genuinely successful, with a further 15 achieved through coincidence.

Dr Maria Papadaki, Lecturer in Network Security at Plymouth University and director of the PhD research study, said:

“In order for online security to be strong it needs to be difficult to hack, and we have demonstrated that using a combination of graphics and one-time password can achieve that. This also provides a low cost alternative to existing token-based multi-factor systems, which require the development and distribution of expensive hardware devices. We are now planning further tests to assess the long-term effectiveness of the GOTPass system, and more detailed aspects of usability.”

The research paper – Secure Graphical One Time Password (GOTPass): An Empirical Study by Alsaiari, Papadaki, Dowland and Furnell – is published in Information Security Journal: A Global Perspective.

Welcome to computing at Plymouth

All our courses are geared towards equipping you with the real-world knowledge and practical skills that are in high demand by the computing industry.

We offer a wide range of courses, all of which are relevant to the needs of the computing industry and therefore offer excellent employment prospects.

Find out more about computing at Plymouth
Circuit board background, can be used as digital dynamic wallpaper, technology background. 3D illustration. Image courtesy of Getty Images.  

Computing research

Our students are taught by the internationally recognised researchers

Our degrees are strongly informed by our research in computing, networking, security and robotics

Further information on our research
computing research
cyber security. getty images