3 d password
Upcoming SlideShare
Loading in...5

3 d password






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

3 d password 3 d password Presentation Transcript

  • 3-D Password Scheme3-D Password Scheme For more secure authentication YOGENDRA MAHATE
  • Contents Introduction Common Authentication Techniques used in computer world 3D password scheme 3D password selection Show state diagram Advantages & Disadvantages 3D Application Areas Conclusion
  • Introduction Authentication is a process of validating who are you to whom you claimed to be Human authentication techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are) 4. Recognition Based(What you recognize)
  • Common AuthenticationCommon Authentication Techniques used in computerTechniques used in computer worldworld 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based + Recognition Based) Biometric schemes (fingerprints , voice recognition etc)
  • DrawbacksDrawbacks  Textual Password: ◦ Textual Passwords should be easy to remember at the same time hard to guess ◦ Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ ◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
  • DrawbacksDrawbacks  Graphical Password ◦ Graphical passwords can be easily recorded as these schemes take a long time. ◦ One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics. ◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 3D PASSWORD SCHEME3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
  • The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 3D Password selection3D Password selection Virtual objects can be any object we encounter in real life: A computer on which the user can type A fingerprint reader that requires users fingerprint A paper or white board on which user can type A Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • For EXAMPLE: Let us assume the user enters a virtual office then performs the following action:  (10,24,91) Action=Open office door  (11,24,91) Action=Close office door  (4,34,15) Action=Typing ,”C”  (4,34,16) Action=Typing ,”O”  (4,34,17) Action=Typing ,”N”  (12,29,80) Action=Pick up the pen  (1,18,80) Action=Draw point=(330,130)
  • 3D Passwords Differentiators3D Passwords Differentiators  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • Advantages • 3D Password scheme is combination of re-call based, recognized based, Biometrics .etc into single authentication technique • Due to use of multiple schemes into one scheme password space is increased to great extend. • More secure authentication scheme over currently available schemes. Disadvantages • Time and memory requirement is large. • Shoulder-suffering attack is still can affect the schema. • More expensive as cost required is more than other schemes.
  • 3D Password Application Areas3D Password Application Areas Nuclear and military Facilities Airplanes and Jet Fighters ATMs , Desktop and Laptop Logins, Web Authentication
  • CONCLUSIONCONCLUSION The user can decide his own authentication schemes. If he’s comfortable with Recall & Recognition method then he can choose the 3D authentication just used above. The 3D environment can change according to user’s request. Can be used in critical areas such as a Nuclear Reactor, Missile Guiding System etc. Added with biometrics & card verification the scheme becomes almost unbreakable.