1. 3D PASSWORD
An Abstract
Submitted in partial fulfillment of the Requirements for the award of the Degree of
BACHELOR OF TECHNOLOGY
By
D.DivyaPrathapRaju
(148X1A0509)
Under the guidance of
T.VenkataramanM.Tech
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY
MJR COLLEGE OF ENGINEERING & TECHNOLOGY
PILERU-517214, (A.P.)
2017
Signature of the Superviso Signature of the Head of the Dpt.
Dr. C.ShobaBindu M.Tech., Ph.D. K.SURESH M.Tech.,
Associate Professor & H.O.D. Associate Professor & H.O.D
Department of CSE Department of CSE
MJR College ofengineering& Technology MJR College ofengineering &Technology
Pileru. Pileru.
2. ABSTRACT
Users nowadays are provided with major password stereotypes such as textual passwords,
biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow
an encryption algorithm as mentioned above.
Biometric scanning is your "natural" signature and Cards or Tokens prove your validity.
But some people hate the fact to carry around their cards, some refuse to undergo strong IR
exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are
kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years
back Klein performed such tests and he could crack 10-15 passwords per day. Now with
the technology change, fast processors and many tools on the Internet this has become a
Child's Play.