INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
3D-Password: A More Secure Authentication
1.
2. PASSWORDPASSWORD
A password is a word or string of characters used
for the authentication to prove identity.
Password is basically an encryption algorithms.It is
8-15 character or slightly more than that.
Passwords are the first line of defense against cyber
criminals.
3. It is the advanced version of password.
It is a combination of words or simply collection of
password in a proper sequence.
Length of passphrase is from 30-50 words or more
than that also.
More secure than an ordinary password.
4. Authentication is a process of validating who are
you to whom you are claimed to be.
Human authentication techniques are :
1.Knowledge based (What you know)
2.Token based (What you have)
3.Biometrics (What you are)
4.Graphical Password(What you see)
5. (a) Pin
(b) Password
(c) Patterns
(a) Keys
(b) Passport
(c) Smart card
(d) ID proofs
(a) Face recognition
(b) Fingerprints
(c) Iris
(d) DNA
(e) Voice
(f) Hand geometry
6. (a) Easy to remember -> Easy to break
Hard to guess -> Hard to remember
(b) Vulnerable to attacks like dictionary attacks, brute force attacks etc.
(a) Duplicate keys, smart cards, ID proofs are easily available.
(a) Instructiveness to privacy.
(b) Resistance to exposure of retinas to IR rays.
(c) Hackers implement exact copy of your biometrics.
8. 3-D PASSWORD3-D PASSWORD
A 3D password is a multifactor authentication scheme that combine
KNOWLEDGE BASED
+ TOKEN BASED
+ BIOMETRICS
in one authentication system.
The 3D passwords3D passwords which are more
customizable, and very interesting
way of authentication.
9. The 3D password presents a virtual environmentvirtual environment
containing various virtual objects.
The user walks through the environment and
interacts with the objects.
It is the combination and sequence of user
interactions that occur in the 3D environment.
10. Virtual objects
Virtual objects can be any object we encounter in real life:
A computer on which the user can type in
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
An Automated teller(ATM) machine that requires a
token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
11. VIRTUAL ENVIRONMENTVIRTUAL ENVIRONMENT
Snapshot of a virtual environment , which contains 36
pictures and six computers as virtual objects
A virtual environment is a computer-based simulated
environment.
The 3D virtual environment consists of many items and
objects.
It is created inside a 2D screen and is a real time scenario
Each item has different responses to action.
The user actions, interactions and inputs towards the objects
or toward the 3D virtual environment creates the user’s 3D
password.
Communication between users can range from text, graphical
icons, visual gesture, sound, and rarely, forms using touch,
voice command, and balance senses.
12. 3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
14. The design of 3D virtual
environments should follow
these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
15. Brief Description of System
The user is presented with this 3d virtual environment where
the user navigates and interacts with various objects.
The sequence of actions and interactions towards the
objects inside the 3d environment constructs the user’s 3d
password.
16. SYSTEM IMPLEMENTATIONSYSTEM IMPLEMENTATION
The action towards an object that exists in location
(x1,y1,z1) is different from action towards an another object
at (x2,y2,z2).
To perform the legitimate 3D password the user must
follow the same scenario performed by the legitimate user.
This means interacting with the same objects that reside at
exact location and perform the exact actions in the proper
sequence.
17. Typical
Textual
Password
Enter User
Name
Performing
Graphical
Password
Moving Inside
Virtual 3D
Environment
Performing
Biometrics
Changing
Item Status
Verifying
Typing a letter or a
number
Clicks
Access not
granted
Login
password
Access
granted
Specific
key
passwor
d
Click on
a
graphical
password
itemSpecific key pressed
Biometric
item is
checked
Move object,
Turn ON/OFF
20. 1. Brute Force Attack: A brute force attack is a trial-and-error method used to
obtain information such as a user password or personal identification number
(PIN). The attack is difficult because:
(i) Required time to login: Time required to login may vary from 20
seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very high.
2. Well Studied Attack:
(i) Attacker has to study whole password scheme.
(ii) Attacker has to try combination of different attacks on scheme.
(iii) As 3D password scheme is multi-factor & multi-password
authentication scheme, attacker fail to studied whole scheme. This attacks
also not much effective against 3D password scheme.
21. 3. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so are difficult to break.
4. Key logger:
(i) Attacker install as software called key logger on system where
authentication scheme is used.
(ii) Software stores text entered through keyboard and those text are stored
in text file.
(iii) More effective and useful for only textual password. Fails in case of 3D
password because it includes biometrics which are hard to crack.
22. ADVANTAGES OF 3D PASSWORDADVANTAGES OF 3D PASSWORD
Flexibility:3D Passwords allows Multifactor authentication
biometric , textual passwords can be embedded in 3D password
technology.
Strength: This scenario provides almost unlimited passwords
possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes
that respect users privacy.
23. 1. Difficult for blind people to use this technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
24. The 3D password’s main application domains are protecting
critical systems and resources.
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
25. A small virtual environment can be used in the following
systems like-
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
26. •The authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
•It is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
•Added with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion