Your SlideShare is downloading. ×
0
3-D Password Scheme3-D Password Scheme
For more secure authentication
YOGENDRA MAHATE
Contents
Introduction
Common Authentication Techniques used
in computer world
3D password scheme
3D password selection...
Introduction
Authentication is a process of validating
who are you to whom you claimed to be
Human authentication techni...
Common AuthenticationCommon Authentication
Techniques used in computerTechniques used in computer
worldworld
1. Textual Pa...
DrawbacksDrawbacks
 Textual Password:
◦ Textual Passwords should be easy to
remember at the same time hard to guess
◦ Ful...
DrawbacksDrawbacks
 Graphical Password
◦ Graphical passwords can be easily
recorded as these schemes take a long
time.
◦ ...
3D PASSWORD SCHEME3D PASSWORD SCHEME
The 3D Password scheme is a new
authentication scheme that combine
RECOGNITION
+ REC...
The 3D password presents a virtual
environment containing various virtual
objects.
The user walks through the environmen...
3D Password selection3D Password selection
Virtual objects can be any object we
encounter in real life:
A computer on wh...
For EXAMPLE:
Let us assume the user enters a virtual
office then performs the following action:
 (10,24,91) Action=Open ...
3D Passwords Differentiators3D Passwords Differentiators
 Flexibility:3D Passwords allows Multifactor
authentication biom...
Advantages
• 3D Password scheme is combination of re-call based,
recognized based, Biometrics .etc into single authenticat...
3D Password Application Areas3D Password Application Areas
Nuclear and military Facilities
Airplanes and Jet Fighters
A...
CONCLUSIONCONCLUSION
The user can decide his own authentication
schemes. If he’s comfortable with Recall &
Recognition me...
THANK YOU…THANK YOU…
3 d password
3 d password
Upcoming SlideShare
Loading in...5
×

3 d password

2,033

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,033
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
202
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "3 d password"

  1. 1. 3-D Password Scheme3-D Password Scheme For more secure authentication YOGENDRA MAHATE
  2. 2. Contents Introduction Common Authentication Techniques used in computer world 3D password scheme 3D password selection Show state diagram Advantages & Disadvantages 3D Application Areas Conclusion
  3. 3. Introduction Authentication is a process of validating who are you to whom you claimed to be Human authentication techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are) 4. Recognition Based(What you recognize)
  4. 4. Common AuthenticationCommon Authentication Techniques used in computerTechniques used in computer worldworld 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based + Recognition Based) Biometric schemes (fingerprints , voice recognition etc)
  5. 5. DrawbacksDrawbacks  Textual Password: ◦ Textual Passwords should be easy to remember at the same time hard to guess ◦ Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ ◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
  6. 6. DrawbacksDrawbacks  Graphical Password ◦ Graphical passwords can be easily recorded as these schemes take a long time. ◦ One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics. ◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  7. 7. 3D PASSWORD SCHEME3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
  8. 8. The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  9. 9. 3D Password selection3D Password selection Virtual objects can be any object we encounter in real life: A computer on which the user can type A fingerprint reader that requires users fingerprint A paper or white board on which user can type A Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  10. 10. For EXAMPLE: Let us assume the user enters a virtual office then performs the following action:  (10,24,91) Action=Open office door  (11,24,91) Action=Close office door  (4,34,15) Action=Typing ,”C”  (4,34,16) Action=Typing ,”O”  (4,34,17) Action=Typing ,”N”  (12,29,80) Action=Pick up the pen  (1,18,80) Action=Draw point=(330,130)
  11. 11. 3D Passwords Differentiators3D Passwords Differentiators  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  12. 12. Advantages • 3D Password scheme is combination of re-call based, recognized based, Biometrics .etc into single authentication technique • Due to use of multiple schemes into one scheme password space is increased to great extend. • More secure authentication scheme over currently available schemes. Disadvantages • Time and memory requirement is large. • Shoulder-suffering attack is still can affect the schema. • More expensive as cost required is more than other schemes.
  13. 13. 3D Password Application Areas3D Password Application Areas Nuclear and military Facilities Airplanes and Jet Fighters ATMs , Desktop and Laptop Logins, Web Authentication
  14. 14. CONCLUSIONCONCLUSION The user can decide his own authentication schemes. If he’s comfortable with Recall & Recognition method then he can choose the 3D authentication just used above. The 3D environment can change according to user’s request. Can be used in critical areas such as a Nuclear Reactor, Missile Guiding System etc. Added with biometrics & card verification the scheme becomes almost unbreakable.
  15. 15. THANK YOU…THANK YOU…
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×