• Like
3D Password
Upcoming SlideShare
Loading in...5

3D Password

Uploaded on

A Slide on 3D Password

A Slide on 3D Password

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. ByZishan Mohsin B.tech, Computer Science And Engineering Integral University.
  • 2. CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion
  • 3. INTRODUCTION Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment.
  • 4. Combines recognition, recall, token, and biometrics based systems. Users choice to select the type of authentication technique.
  • 5. AUTHENTICATION SCHEMES KNOWLEDGE BASED Recall based Recognition based TOKEN BASED e.g : smart card
  • 6. BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based
  • 7. FUNCTIONALITIES REQUIRED New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember, difficult to guess.
  • 8. 3D PASSWORD SELECTION AND INPUT 3D environment space represented by the co- ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users 3D password.
  • 9. Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
  • 10. Virtual Computer where user typing a textual password as a part of user’s 3D Password
  • 11. Snapshot of a proof-of-concept virtual art gallery
  • 12. State diagram of a 3D Password application
  • 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance
  • 14. APPLICATIONS Critical servers. Nuclear and military facilities. Airplanes and jet fighters. ATM, desktop computers and laptops.
  • 15. SECURITY ANALYSIS 3D Password Space Size. 3D Password Distribution Knowledge.
  • 16. ATTACKS AND COUNTER MEASURES Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack
  • 17. CONCLUSION Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password