SlideShare a Scribd company logo
1 of 12
3-D Password Scheme 
For more secure authentication 
Presented By 
Amrit Narayan Thakur 
Roll No:123151320 
BSCIT
Introduction 
Current authentication systems suffer 
from many weaknesses. Textual 
passwords are commonly used, users do 
not follow their requirements. Users tend 
to choose meaningful words from 
dictionaries, which make textual 
passwords easy to break. In this 
presentation ,we present and evaluate our 
contribution, i.e., the 3-D password.
Authentication 
 Authentication is a process of validating 
who are you to whom you claimed to be 
 Human authentication techniques are as 
follows: 
1. Knowledge Base (What you know) 
2. Token Based(what you have) 
3. Biometrics(what you are) 
4. Recognition Based(What you recognize)
Common Authentication 
Techniques used in computer 
world 
1. Textual Passwords(Recall Based)-:Recall 
what you have created before. 
2. Graphical Passwords: 
(Recall Based+Recognition Based) 
Biometric schemes 
(fingerprints,voice recognition etc)
Drawbacks 
 Textual Password: 
◦ Textual Passwords should be easy to 
remember at the same time hard to guess 
◦ Full password space for 8 characters 
consisting of both numbers and characters is 
2 X 10¹⁴ 
◦ From an research 25% of the passwords out 
of 15,000 users can guessed correctly by 
using brute force dictionary
Drawbacks 
 Graphical Password 
◦ Graphical passwords can be easily 
recorded as these schemes take a long 
time. 
◦ They require special scanning device to 
authenticate the user which is not 
acceptable for remote and internet users.
3D PASSWORD SCHEME 
 The 3D Password scheme is a new 
authentication scheme that combine 
RECOGNITION 
+ RECALL 
+TOKENS 
+BIOMETRIC 
In one authentication system
 The 3D password presents a virtual 
environment containing various virtual 
objects. 
 The user walks through the environment 
and interacts with the objects 
 The 3d Password is simply the 
combination and sequence of user 
interactions that occur in the 3D 
environment
3D Password selection 
 Virtual objects can be any object we 
encounter in real life: 
A computer on which the user can type 
A fingerprint reader that requires users fingerprint 
A paper or white board on which user can type 
A Automated teller(ATM) machine that requires a token 
A light that can be switched on/off 
A television or radio 
A car that can be driven 
A graphical password scheme
3D Passwords Differentiators 
 Flexibility:3D Passwords allows Multifactor 
authentication biometric , textual passwords 
can be embedded in 3D password technology. 
 Strength: This scenario provides almost 
unlimited passwords possibility. 
 Ease to Memorize: can be remembered in the 
form of short story. 
 Respect of Privacy: Organizers can select 
authentication schemes that respect users 
privacy.
3D Password Application Areas 
 Critical Servers 
 Nuclear and military Facilities 
 Airplanes and JetFighters 
 ATMs,Desktop and Laptop Logins, Web 
Authentication
CONTACTS 
E-mail: 
contacts@amritnarayan.com.np

More Related Content

What's hot (20)

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D password
3D password3D password
3D password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password 3D password
3D password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 

Viewers also liked

Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (10)

Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Iptv
IptvIptv
Iptv
 
3D password
3D password3D password
3D password
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to 3D Password Scheme Combines Recognition, Recall, Tokens & Biometrics

Similar to 3D Password Scheme Combines Recognition, Recall, Tokens & Biometrics (20)

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3 d password
3 d password3 d password
3 d password
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3 d
3 d3 d
3 d
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d authentication
3d authentication3d authentication
3d authentication
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3d pass words
3d pass words3d pass words
3d pass words
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

3D Password Scheme Combines Recognition, Recall, Tokens & Biometrics

  • 1. 3-D Password Scheme For more secure authentication Presented By Amrit Narayan Thakur Roll No:123151320 BSCIT
  • 2. Introduction Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break. In this presentation ,we present and evaluate our contribution, i.e., the 3-D password.
  • 3. Authentication  Authentication is a process of validating who are you to whom you claimed to be  Human authentication techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are) 4. Recognition Based(What you recognize)
  • 4. Common Authentication Techniques used in computer world 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based+Recognition Based) Biometric schemes (fingerprints,voice recognition etc)
  • 5. Drawbacks  Textual Password: ◦ Textual Passwords should be easy to remember at the same time hard to guess ◦ Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ ◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
  • 6. Drawbacks  Graphical Password ◦ Graphical passwords can be easily recorded as these schemes take a long time. ◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 7. 3D PASSWORD SCHEME  The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
  • 8.  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 9. 3D Password selection  Virtual objects can be any object we encounter in real life: A computer on which the user can type A fingerprint reader that requires users fingerprint A paper or white board on which user can type A Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • 10. 3D Passwords Differentiators  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 11. 3D Password Application Areas  Critical Servers  Nuclear and military Facilities  Airplanes and JetFighters  ATMs,Desktop and Laptop Logins, Web Authentication