3-D password    For more secure authentication..           Presented by:             Preetha M P             Roll No : 21 ...
Basic Identification Methods of password    Possession                      Knowledge(“something I have”)            (“som...
PASSWORD• It is basically a encryption algorithm• Usually 8-15 characters or slightly more than that• Can be meaningful wo...
PASSPHRASE• Enhanced version of password• Combination of words or simply a collection of passwordsin proper sequence• Leng...
GRAPHICAL PASSWORDS• Based on the idea that users can recall and recognizepictures better than words.• Require a long time...
BIOMETRICS• Automatethe identification or verification of an individualbased on human characteristics or body organs.   • ...
3-D PASSWORD• Customizable and very interesting way of authentication• Multi factor authentication scheme.• Contains a 3-D...
3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS: •   a computer with which the user can type; •   a fingerprint reader t...
State diagram of a possible 3-D password application
Snapshot of a proof-of-concept virtual art gallery, whichcontains 36 pictures and six computers
Snapshot of a proof-of-concept 3-D virtual environment, where theuser is typing a textual password on a virtual computer a...
An example of user actions in the 3D virtual environment canbe recorded as follows: • (10, 24, 91) Action = Open the offic...
3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES• Real life similarity• Object uniqueness and distinction• Three Dimensional Virtu...
3-D PASSWORD APPLICATIONSIn Critical Systems:• Critical servers• Nuclear and military facilities• Airplanes and jet fighte...
ADVANTAGES OF 3-D PASSWORD• Several authentication schemes• Easy to memorize• Designed according to protected system• High...
DISADVANTAGES•Difficult for blind people to use this technology.• Requires sophisticated computer technology.• Expensive.•...
ATTACKS AND COUNTER MEASURES• Brute Force Attack   a) Time required to login   b) Cost of attacks• Well Studied Attack• Sh...
CONCLUSION• 3D password is a multi factor authentication scheme that combines thevarious authentication schemes into a sin...
Questions??
Thank u
Upcoming SlideShare
Loading in …5
×

3D PASSWORD

6,781
-1

Published on

3D PASSWORD

Published in: Education
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
6,781
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
929
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

3D PASSWORD

  1. 1. 3-D password For more secure authentication.. Presented by: Preetha M P Roll No : 21 S5 MCA ETAKMCA022
  2. 2. Basic Identification Methods of password Possession Knowledge(“something I have”) (“something I know”)•Keys •Password•Passport •PIN•Smart Card Biometrics Recognition(“something I am”) (“something I recognise”) •Face • Graphical •Fingerprint Password •Iris
  3. 3. PASSWORD• It is basically a encryption algorithm• Usually 8-15 characters or slightly more than that• Can be meaningful words from dictionary, pet names, name of friends etc• Easy to break and vulnerable to Brute force attack
  4. 4. PASSPHRASE• Enhanced version of password• Combination of words or simply a collection of passwordsin proper sequence• Length is about 30 – 50 characters or more than that also• Creates ambiguity to remember if there is no propersequence
  5. 5. GRAPHICAL PASSWORDS• Based on the idea that users can recall and recognizepictures better than words.• Require a long time to be performed• Have a password space that is less than or equal to thetextual password space• Vulnerable to shoulder surfing attacks
  6. 6. BIOMETRICS• Automatethe identification or verification of an individualbased on human characteristics or body organs. • Physiological: Face, fingerprint, iris • Behavioral: Hand-written signature, voice Characteristics Templates 011001010010101… 011010100100110… 001100010010010...
  7. 7. 3-D PASSWORD• Customizable and very interesting way of authentication• Multi factor authentication scheme.• Contains a 3-D virtual environment where the user navigates & interactswith various objects.• Sequence of actions and interactions toward the objects constructsuser’s 3-D password.• Combination of textual passwords, graphical passwords & varioustypes of biometrics into a 3-D virtual environment.• Design of 3-D virtual environment and type of objects selecteddetermine 3-D password key space
  8. 8. 3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS: • a computer with which the user can type; • a fingerprint reader that requires the user’s fingerprint; • a biometrical recognition device; • a paper or a white board that a user can write, sign, or draw on; • an automated teller machine (ATM) that requests a token; • a light that can be switched on/off; • a television or radio where channels can be selected; • a staple that can be punched; • a car that can be driven; • a book that can be moved from one place to another; • any graphical password scheme; • any real-life object; • any upcoming authentication scheme.
  9. 9. State diagram of a possible 3-D password application
  10. 10. Snapshot of a proof-of-concept virtual art gallery, whichcontains 36 pictures and six computers
  11. 11. Snapshot of a proof-of-concept 3-D virtual environment, where theuser is typing a textual password on a virtual computer as a part ofthe user’s 3-D password
  12. 12. An example of user actions in the 3D virtual environment canbe recorded as follows: • (10, 24, 91) Action = Open the office door; • (10, 24, 91) Action = Close the office door; • (4, 34, 18) Action = Typing, “F”; • (4, 34, 18) Action = Typing, “A”; • (4, 34, 18) Action = Typing, “L”; • (4, 34, 18) Action = Typing, “C”; • (4, 34, 18) Action = Typing, “O”; • (4, 34, 18) Action = Typing, “N”; • (10, 24, 80) Action = Pick up the pen; • (1, 18, 80) Action = Drawing, point = (330, 130).
  13. 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES• Real life similarity• Object uniqueness and distinction• Three Dimensional Virtual Environment Size• Number of objects and their types• System Importance
  14. 14. 3-D PASSWORD APPLICATIONSIn Critical Systems:• Critical servers• Nuclear and military facilities• Airplanes and jet fightersIn small virtual environments:• ATM• Personal Digital Assistance• Desktop Computers & laptop logins• Web Authentication
  15. 15. ADVANTAGES OF 3-D PASSWORD• Several authentication schemes• Easy to memorize• Designed according to protected system• Highly flexible• Extremely strong• Provides secrets• 3D environment can be changed• Password can change easily.• Difficult to crack• Freedom to select• Difficult to share• 3D graphical password has no limit
  16. 16. DISADVANTAGES•Difficult for blind people to use this technology.• Requires sophisticated computer technology.• Expensive.• A lot of program coding is required.
  17. 17. ATTACKS AND COUNTER MEASURES• Brute Force Attack a) Time required to login b) Cost of attacks• Well Studied Attack• Shoulder Surfing Attack• Timing attack
  18. 18. CONCLUSION• 3D password is a multi factor authentication scheme that combines thevarious authentication schemes into a single 3D virtual environment.• Design of the 3D virtual environment is the selection of objects insidethe environment and the objects type reflect the resulted passwordspace• Password space is very large compared to any existing authenticationschemes•It is the task of the system administrator to design the environment andto select the appropriate object that reflects the protected systemrequirements• Designing a simple and easy to use 3D virtual environment is a factorthat leads to a higher user acceptability of a 3D password system.
  19. 19. Questions??
  20. 20. Thank u
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×