Your SlideShare is downloading. ×
0
INTRODUCTIONCurrent Authentification suffer from many weakness.Textual passwords are commonly used,users do not follow th...
Existing SystemTextual passwordGraphical PasswordBiometricsToken Based
PASSWORD           •How secure is your password?             Now with the technology change,             fast processors a...
3D PASSWORD
•The 3D passwords which are more customizable,and very interesting way of authentication.•A 3D password is a multifactorau...
The 3D password presents a virtual environment containing various virtual objects. The user walks through the environmen...
Brief Description of SystemThe user is presented with this 3d virtual environment where  the user navigates and interacts...
System ImplementationFor example, the user can enter the virtual environment  and type something on a computer that exist...
Virtual objectsVirtual objects can be any object we encounter in real life:              A computer on which the user ca...
Snapshot of a proof - of - concept virtual    art gallery , which contains 36     pictures and six computers
3D VIRTUALENVIRONMENT
3D Virtual Environment•3-D virtual environment affects the usability, effectiveness, andacceptability of a 3-D password sy...
The design of 3D virtualenvironments should followthese guidelines:Real Life SimilarityObject Uniqueness & Distinction3...
Advantages              Flexibility              Strength              Ease to Memorize              Respect of Privacy
Applications The 3D password’s main application domains are protecting critical systems and resources. Critical Servers ...
A small virtual environment can be used in the following systems like-AtmPersonal digital assistanceDesktop computers &...
State Diagram
Attacks and CountermeasuresBrute Force AttackWell studied Attack Shoulder-surfing Attack
Conclusion •The authentication can be improved with 3d password ,because the unauthorized person may not interact with sam...
QUERIES
3d password ppt
3d password ppt
3d password ppt
Upcoming SlideShare
Loading in...5
×

3d password ppt

36,476

Published on

5 Comments
36 Likes
Statistics
Notes
No Downloads
Views
Total Views
36,476
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4,092
Comments
5
Likes
36
Embeds 0
No embeds

No notes for slide

Transcript of "3d password ppt"

  1. 1. INTRODUCTIONCurrent Authentification suffer from many weakness.Textual passwords are commonly used,users do not follow their requirements.Users tends to choose meaningful words from dictionaries,which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper,we present and evaluate our contribution i.e. the 3D password
  2. 2. Existing SystemTextual passwordGraphical PasswordBiometricsToken Based
  3. 3. PASSWORD •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Childs Play. Ten years back Klein performed such tests and he could crack 10-15 passwords per day.
  4. 4. 3D PASSWORD
  5. 5. •The 3D passwords which are more customizable,and very interesting way of authentication.•A 3D password is a multifactorauthentication scheme thatcombine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  6. 6. The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects.It is the combination and sequence of user interactions that occur in the 3D environment.
  7. 7. Brief Description of SystemThe user is presented with this 3d virtual environment where the user navigates and interacts with various objects.The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  8. 8. System ImplementationFor example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password
  9. 9. Virtual objectsVirtual objects can be any object we encounter in real life:  A computer on which the user can type in  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  An Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  10. 10. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  11. 11. 3D VIRTUALENVIRONMENT
  12. 12. 3D Virtual Environment•3-D virtual environment affects the usability, effectiveness, andacceptability of a 3-D password system.• 3-D environment reflects the administration needs and the securityrequirements. 3D Virtual Environment
  13. 13. The design of 3D virtualenvironments should followthese guidelines:Real Life SimilarityObject Uniqueness & Distinction3D Virtual Environment SizeNumber of objects & their typesSystem Importance
  14. 14. Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy
  15. 15. Applications The 3D password’s main application domains are protecting critical systems and resources. Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding
  16. 16. A small virtual environment can be used in the following systems like-AtmPersonal digital assistanceDesktop computers & laptopsWeb authentication etc.
  17. 17. State Diagram
  18. 18. Attacks and CountermeasuresBrute Force AttackWell studied Attack Shoulder-surfing Attack
  19. 19. Conclusion •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable.
  20. 20. QUERIES
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×