• Like
3D Password
Upcoming SlideShare
Loading in...5
×

3D Password

  • 6,746 views
Uploaded on

A Slide on 3D Password

A Slide on 3D Password

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
6,746
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
712
Comments
0
Likes
6

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. ByZishan Mohsin B.tech, Computer Science And Engineering Integral University.
  • 2. CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion
  • 3. INTRODUCTION Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment.
  • 4. Combines recognition, recall, token, and biometrics based systems. Users choice to select the type of authentication technique.
  • 5. AUTHENTICATION SCHEMES KNOWLEDGE BASED Recall based Recognition based TOKEN BASED e.g : smart card
  • 6. BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based
  • 7. FUNCTIONALITIES REQUIRED New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember, difficult to guess.
  • 8. 3D PASSWORD SELECTION AND INPUT 3D environment space represented by the co- ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users 3D password.
  • 9. Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
  • 10. Virtual Computer where user typing a textual password as a part of user’s 3D Password
  • 11. Snapshot of a proof-of-concept virtual art gallery
  • 12. State diagram of a 3D Password application
  • 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance
  • 14. APPLICATIONS Critical servers. Nuclear and military facilities. Airplanes and jet fighters. ATM, desktop computers and laptops.
  • 15. SECURITY ANALYSIS 3D Password Space Size. 3D Password Distribution Knowledge.
  • 16. ATTACKS AND COUNTER MEASURES Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack
  • 17. CONCLUSION Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password