SlideShare a Scribd company logo
1 of 28
PASSWORDPASSWORD
A password is a word or string of characters used
for the authentication to prove identity.
Password is basically an encryption algorithms.It is
8-15 character or slightly more than that.
Passwords are the first line of defense against cyber
criminals.
 It is the advanced version of password.
 It is a combination of words or simply collection of
password in a proper sequence.
 Length of passphrase is from 30-50 words or more
than that also.
 More secure than an ordinary password.
Authentication is a process of validating who are
you to whom you are claimed to be.
 Human authentication techniques are :
1.Knowledge based (What you know)
2.Token based (What you have)
3.Biometrics (What you are)
4.Graphical Password(What you see)
(a) Pin
(b) Password
(c) Patterns
(a) Keys
(b) Passport
(c) Smart card
(d) ID proofs
(a) Face recognition
(b) Fingerprints
(c) Iris
(d) DNA
(e) Voice
(f) Hand geometry
(a) Easy to remember -> Easy to break
Hard to guess -> Hard to remember
(b) Vulnerable to attacks like dictionary attacks, brute force attacks etc.
(a) Duplicate keys, smart cards, ID proofs are easily available.
(a) Instructiveness to privacy.
(b) Resistance to exposure of retinas to IR rays.
(c) Hackers implement exact copy of your biometrics.
3D PASSWORD
3-D PASSWORD3-D PASSWORD
A 3D password is a multifactor authentication scheme that combine
KNOWLEDGE BASED
+ TOKEN BASED
+ BIOMETRICS
in one authentication system.
The 3D passwords3D passwords which are more
customizable, and very interesting
way of authentication.
The 3D password presents a virtual environmentvirtual environment
containing various virtual objects.
 The user walks through the environment and
interacts with the objects.
It is the combination and sequence of user
interactions that occur in the 3D environment.
Virtual objects
Virtual objects can be any object we encounter in real life:
 A computer on which the user can type in
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 An Automated teller(ATM) machine that requires a
token
 A light that can be switched on/off
 A television or radio
 A car that can be driven
 A graphical password scheme
VIRTUAL ENVIRONMENTVIRTUAL ENVIRONMENT
Snapshot of a virtual environment , which contains 36
pictures and six computers as virtual objects
 A virtual environment is a computer-based simulated
environment.
 The 3D virtual environment consists of many items and
objects.
 It is created inside a 2D screen and is a real time scenario
 Each item has different responses to action.
 The user actions, interactions and inputs towards the objects
or toward the 3D virtual environment creates the user’s 3D
password.
Communication between users can range from text, graphical
icons, visual gesture, sound, and rarely, forms using touch,
voice command, and balance senses.
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
IMAGES OF VIRTUAL ENVIRONMENTIMAGES OF VIRTUAL ENVIRONMENT
The design of 3D virtual
environments should follow
these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
Brief Description of System
The user is presented with this 3d virtual environment where
the user navigates and interacts with various objects.
The sequence of actions and interactions towards the
objects inside the 3d environment constructs the user’s 3d
password.
SYSTEM IMPLEMENTATIONSYSTEM IMPLEMENTATION
The action towards an object that exists in location
(x1,y1,z1) is different from action towards an another object
at (x2,y2,z2).
 To perform the legitimate 3D password the user must
follow the same scenario performed by the legitimate user.
 This means interacting with the same objects that reside at
exact location and perform the exact actions in the proper
sequence.
Typical
Textual
Password
Enter User
Name
Performing
Graphical
Password
Moving Inside
Virtual 3D
Environment
Performing
Biometrics
Changing
Item Status
Verifying
Typing a letter or a
number
Clicks
Access not
granted
Login
password
Access
granted
Specific
key
passwor
d
Click on
a
graphical
password
itemSpecific key pressed
Biometric
item is
checked
Move object,
Turn ON/OFF
3D Password Authentication
1. Brute Force Attack: A brute force attack is a trial-and-error method used to
obtain information such as a user password or personal identification number
(PIN).  The attack is difficult because:
(i) Required time to login: Time required to login may vary from 20
seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very high.
2. Well Studied Attack:
(i) Attacker has to study whole password scheme.
(ii) Attacker has to try combination of different attacks on scheme.
(iii) As 3D password scheme is multi-factor & multi-password
authentication scheme, attacker fail to studied whole scheme. This attacks
also not much effective against 3D password scheme.
3. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so are difficult to break.
4. Key logger:
(i) Attacker install as software called key logger on system where
authentication scheme is used.
(ii) Software stores text entered through keyboard and those text are stored
in text file.
(iii) More effective and useful for only textual password. Fails in case of 3D
password because it includes biometrics which are hard to crack.
ADVANTAGES OF 3D PASSWORDADVANTAGES OF 3D PASSWORD
Flexibility:3D Passwords allows Multifactor authentication
biometric , textual passwords can be embedded in 3D password
technology.
Strength: This scenario provides almost unlimited passwords
possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes
that respect users privacy.
1. Difficult for blind people to use this technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the following
systems like-
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
•The authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
•It is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
•Added with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication

More Related Content

What's hot (20)

3 d password
3 d password 3 d password
3 d password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password
3D Password3D Password
3D Password
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password3 d password
3 d password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 

Similar to 3D-Password: A More Secure Authentication

Similar to 3D-Password: A More Secure Authentication (20)

3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D - password
3D - password3D - password
3D - password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
Vivek
VivekVivek
Vivek
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3d authentication
3d authentication3d authentication
3d authentication
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
C0361419
C0361419C0361419
C0361419
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 

Recently uploaded

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

3D-Password: A More Secure Authentication

  • 1.
  • 2. PASSWORDPASSWORD A password is a word or string of characters used for the authentication to prove identity. Password is basically an encryption algorithms.It is 8-15 character or slightly more than that. Passwords are the first line of defense against cyber criminals.
  • 3.  It is the advanced version of password.  It is a combination of words or simply collection of password in a proper sequence.  Length of passphrase is from 30-50 words or more than that also.  More secure than an ordinary password.
  • 4. Authentication is a process of validating who are you to whom you are claimed to be.  Human authentication techniques are : 1.Knowledge based (What you know) 2.Token based (What you have) 3.Biometrics (What you are) 4.Graphical Password(What you see)
  • 5. (a) Pin (b) Password (c) Patterns (a) Keys (b) Passport (c) Smart card (d) ID proofs (a) Face recognition (b) Fingerprints (c) Iris (d) DNA (e) Voice (f) Hand geometry
  • 6. (a) Easy to remember -> Easy to break Hard to guess -> Hard to remember (b) Vulnerable to attacks like dictionary attacks, brute force attacks etc. (a) Duplicate keys, smart cards, ID proofs are easily available. (a) Instructiveness to privacy. (b) Resistance to exposure of retinas to IR rays. (c) Hackers implement exact copy of your biometrics.
  • 8. 3-D PASSWORD3-D PASSWORD A 3D password is a multifactor authentication scheme that combine KNOWLEDGE BASED + TOKEN BASED + BIOMETRICS in one authentication system. The 3D passwords3D passwords which are more customizable, and very interesting way of authentication.
  • 9. The 3D password presents a virtual environmentvirtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
  • 10. Virtual objects Virtual objects can be any object we encounter in real life:  A computer on which the user can type in  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  An Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  • 11. VIRTUAL ENVIRONMENTVIRTUAL ENVIRONMENT Snapshot of a virtual environment , which contains 36 pictures and six computers as virtual objects  A virtual environment is a computer-based simulated environment.  The 3D virtual environment consists of many items and objects.  It is created inside a 2D screen and is a real time scenario  Each item has different responses to action.  The user actions, interactions and inputs towards the objects or toward the 3D virtual environment creates the user’s 3D password. Communication between users can range from text, graphical icons, visual gesture, sound, and rarely, forms using touch, voice command, and balance senses.
  • 12. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 13. IMAGES OF VIRTUAL ENVIRONMENTIMAGES OF VIRTUAL ENVIRONMENT
  • 14. The design of 3D virtual environments should follow these guidelines: Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 15. Brief Description of System The user is presented with this 3d virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 16. SYSTEM IMPLEMENTATIONSYSTEM IMPLEMENTATION The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2).  To perform the legitimate 3D password the user must follow the same scenario performed by the legitimate user.  This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence.
  • 17. Typical Textual Password Enter User Name Performing Graphical Password Moving Inside Virtual 3D Environment Performing Biometrics Changing Item Status Verifying Typing a letter or a number Clicks Access not granted Login password Access granted Specific key passwor d Click on a graphical password itemSpecific key pressed Biometric item is checked Move object, Turn ON/OFF
  • 18.
  • 20. 1. Brute Force Attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).  The attack is difficult because: (i) Required time to login: Time required to login may vary from 20 seconds to 2 minutes. So, is time consuming. (ii) Cost of attack: Cost of creating 3D virtual environment is very high. 2. Well Studied Attack: (i) Attacker has to study whole password scheme. (ii) Attacker has to try combination of different attacks on scheme. (iii) As 3D password scheme is multi-factor & multi-password authentication scheme, attacker fail to studied whole scheme. This attacks also not much effective against 3D password scheme.
  • 21. 3. Shoulder Suffering Attack: (i) An attacker uses a camera to record the password. (ii) 3D password contains biometric identifications, so are difficult to break. 4. Key logger: (i) Attacker install as software called key logger on system where authentication scheme is used. (ii) Software stores text entered through keyboard and those text are stored in text file. (iii) More effective and useful for only textual password. Fails in case of 3D password because it includes biometrics which are hard to crack.
  • 22. ADVANTAGES OF 3D PASSWORDADVANTAGES OF 3D PASSWORD Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology. Strength: This scenario provides almost unlimited passwords possibility. Ease to Memorize: can be remembered in the form of short story. Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 23. 1. Difficult for blind people to use this technology. 2. A lot of program coding is required. 3. Very expensive. 4. Time and memory requirement is large.
  • 24. The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 25. A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
  • 26. •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion