SlideShare a Scribd company logo
1 of 16
3D PASSWORD
PRESENTATION BY:
NEERAJ KUMAR TIWARI
DEPT- IT
ROLL NO- 34
SUPERVISOR NAME:-Dr. AMITAVA NAG
1
WHY 3D PASSWORD ??
Current Authentication suffer from many weakness .Textual passwords
are commonly used, users do not follow their requirements .Users
tends to choose meaningful words from dictionaries, which makes
the textual passwords easy to break and vulnerable to dictionary or
brute force attacks.In this paper, we present and evaluate our
contribution i.e. the 3D password
INTRODUCTION:-
A 3D password is a multifactor authentication scheme that combine in one
authentication system
.
The 3D password presents a 3D virtual environment containing various
virtual objects.
AUTHENTICATION
SCHEME
KNOWLEDGE BASE
(WHAT YOU KNOW)
TOKEN BASE
(WHAT YOU HAVE)
BIOMETRIC BASE
(WHAT YOU ARE)
TEXTUAL PASSWORD
GRAPHICAL PASSWORD
ATM
KEY
ID CARD
FINGER PRINT
HAND GEOMETRY
FACE,IRIS,VOICE,RETINA
• ACCESS GRANTED
FILLING USER NAME
AND PASSWORD
MOVING INSIDE VIRTUAL 3D
ENVIRONMENT
TYPING TEXTUAL
password Performing a
graphical password
Performing biometrics
Changing object statusverifying
LOGIN
PRESSED
ACCESS
DENIED
A
biometric
item is
clicked
Clicked on a
textual item
Press a
specific
key after
finish
Click on a
graphical
password item
Press a specific key
Moving object,turn
switch on/off…etc
Type a letter or a
number
click
STATE DIAGRAM
Entering inside the 3d environment
USERNAME
3D
USER LOGIN
NEERAJ KUMAR
PASSWORD
TEXTUAL PASSWORD
AUTHENTICATION(knowledge base)
LOGIN REMEMBER ME Forget your password ?
Biometric based
authentication(what
you have)
Moving object in
3d environment
More than one authorization
USE OF 3D PASSWORD
 Critical Servers
 Banking
 Nuclear and military Facilities
 Airplanes and JetFighters
ADVANTAGES OF 3D PASSWORD
 Provides security.
 3D graphical password has no limit.
 Password can change easily.
 Password can be remember easily.
DISADVANTAGES OF 3D PASSWORD
Difficult for blind people to use this technology.
Expensive scheme.
A lot of program coding is required.
Attacks & countermeasures :
Well-studied attacks
Brute force Attacks
Timing Attacks
Shoulder Surfing attacks
Conclusion:
It is difficult to crack ,because it has no fixed number of steps and a
particular procedure.
Added with biometrics and token verification this schema
becomes almost unbreakable.
Thank You!!
.
Question

More Related Content

What's hot (20)

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3 d password
3 d password3 d password
3 d password
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password3 d password
3 d password
 
3D password
3D password3D password
3D password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d passwords
3d passwords 3d passwords
3d passwords
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpassword
3dpassword3dpassword
3dpassword
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3d passwords
3d passwords3d passwords
3d passwords
 
3d password
3d password3d password
3d password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 

Viewers also liked (11)

Enhancing Collaboration Using Web 2.0
Enhancing Collaboration Using Web 2.0Enhancing Collaboration Using Web 2.0
Enhancing Collaboration Using Web 2.0
 
Big china mart presentation
Big china mart presentationBig china mart presentation
Big china mart presentation
 
Reunión de postulación abreviada
Reunión de postulación abreviadaReunión de postulación abreviada
Reunión de postulación abreviada
 
CV - M. Taj Arain
CV - M. Taj ArainCV - M. Taj Arain
CV - M. Taj Arain
 
RESUME OF DAMON BARRETT For 2015
RESUME OF DAMON BARRETT For 2015RESUME OF DAMON BARRETT For 2015
RESUME OF DAMON BARRETT For 2015
 
Aleluyas del Quijote
Aleluyas del QuijoteAleluyas del Quijote
Aleluyas del Quijote
 
Puvvati_Resume
Puvvati_ResumePuvvati_Resume
Puvvati_Resume
 
chaitra_resume
chaitra_resumechaitra_resume
chaitra_resume
 
2010 - Winter simulation
2010 - Winter simulation2010 - Winter simulation
2010 - Winter simulation
 
Fallout
FalloutFallout
Fallout
 
민요셉 로드맵
민요셉 로드맵민요셉 로드맵
민요셉 로드맵
 

Similar to 3D-PASSWORD SEMI

Similar to 3D-PASSWORD SEMI (20)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3 d
3 d3 d
3 d
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
C0361419
C0361419C0361419
C0361419
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3D - password
3D - password3D - password
3D - password
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3 d password
3 d password 3 d password
3 d password
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
Vivek
VivekVivek
Vivek
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
3d password
3d password3d password
3d password
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 

3D-PASSWORD SEMI

  • 1. 3D PASSWORD PRESENTATION BY: NEERAJ KUMAR TIWARI DEPT- IT ROLL NO- 34 SUPERVISOR NAME:-Dr. AMITAVA NAG 1
  • 2. WHY 3D PASSWORD ?? Current Authentication suffer from many weakness .Textual passwords are commonly used, users do not follow their requirements .Users tends to choose meaningful words from dictionaries, which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper, we present and evaluate our contribution i.e. the 3D password
  • 3. INTRODUCTION:- A 3D password is a multifactor authentication scheme that combine in one authentication system . The 3D password presents a 3D virtual environment containing various virtual objects. AUTHENTICATION SCHEME KNOWLEDGE BASE (WHAT YOU KNOW) TOKEN BASE (WHAT YOU HAVE) BIOMETRIC BASE (WHAT YOU ARE) TEXTUAL PASSWORD GRAPHICAL PASSWORD ATM KEY ID CARD FINGER PRINT HAND GEOMETRY FACE,IRIS,VOICE,RETINA
  • 4. • ACCESS GRANTED FILLING USER NAME AND PASSWORD MOVING INSIDE VIRTUAL 3D ENVIRONMENT TYPING TEXTUAL password Performing a graphical password Performing biometrics Changing object statusverifying LOGIN PRESSED ACCESS DENIED A biometric item is clicked Clicked on a textual item Press a specific key after finish Click on a graphical password item Press a specific key Moving object,turn switch on/off…etc Type a letter or a number click STATE DIAGRAM
  • 5. Entering inside the 3d environment
  • 6. USERNAME 3D USER LOGIN NEERAJ KUMAR PASSWORD TEXTUAL PASSWORD AUTHENTICATION(knowledge base) LOGIN REMEMBER ME Forget your password ?
  • 8. Moving object in 3d environment
  • 9. More than one authorization
  • 10. USE OF 3D PASSWORD  Critical Servers  Banking  Nuclear and military Facilities  Airplanes and JetFighters
  • 11. ADVANTAGES OF 3D PASSWORD  Provides security.  3D graphical password has no limit.  Password can change easily.  Password can be remember easily.
  • 12. DISADVANTAGES OF 3D PASSWORD Difficult for blind people to use this technology. Expensive scheme. A lot of program coding is required.
  • 13. Attacks & countermeasures : Well-studied attacks Brute force Attacks Timing Attacks Shoulder Surfing attacks
  • 14. Conclusion: It is difficult to crack ,because it has no fixed number of steps and a particular procedure. Added with biometrics and token verification this schema becomes almost unbreakable.