Abstract:

The advancement of technology has resulted in numerous positive results. The majority of human activities can now be substantially simplified thanks to technological improvements. The same is true for cybercriminals who, among other things, want to get access to user accounts in order to steal sensitive information for their own purposes. Even if technology improvements are clearly good, it is our job as customers to take all reasonable efforts to protect our data. There are several precautions at our disposal. However, the security of any given system is never guaranteed. All of our efforts are aimed at lowering the likelihood of a security breach. Authentication is carried out via a textual and graphical password paradigm[1]. We chose this approach because humans are naturally visual beings, and we believe that adopting a cued-recall and recognition-based method can increase a system's defences. A password with an entropy [5] of 60 or above is considered strong. This password technique, once rigorously tested, can prove to be a very good alternative to multi-factor authentication, which would force the user to wait for an OTP or some other annoyance. Our method seeks to alleviate all of the difficulties faced during the process by proposing a simple gateway for user identification. This approach aids in the creation of passwords with entropy near to 89, which is considered a strong password.
Keywords— security breach, authentication, entropy, password