SlideShare a Scribd company logo
1 of 13
3D PASSWORD
1
 INTRODUCTION
 EXISTING SYSTEM
 PROPESED SYSTEM
 BRIEF DISCUSSION OF SYSTEM
 AUTHENTICATION OF 3D PASSWORD
 APPLICATION
 ADVANTAGES
 DISADVANTAGES
 CONCLUSION
2
OVERVIEW:
 Normally the authentication scheme the user
undergoes is particularly very lenient or very strict.
Throughout the years authentication has been a very
interesting approach.
 With all the means of technology developing, it can
be very easy for others ‘ to fabricate or to still identity
or to hack someone's password.
 So from here the concept of 3.
INTRODUCTION
3
 Current authentication system suffers from many weaknesses.
Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual passwords
easy to break and vulnerable to dictionary or brute force attacks.
 Many available graphical passwords have a password space that is
less than or equal to the textual password space. Smart cards or
token cant be stolen. Many biometric authentications have been
proposed.
 However, users tend to resist using biometric because of their
intrusiveness and the effect on their privacy. Moreover, biometrics
can’t be revoked. The 3D password is a multi factor authentication
scheme.
EXSISTING SYSTEM:
4
 The proposed system is a multi factor authentication
schemes that combines the benefits of various
authentication schemes.
 Users have the freedom to select whether the 3D
password will be solely recall, biometrics, recognition or
token based, or a combination of two schemes or more.
 This freedom of selection is necessary because users are
different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
PROPESED SYSTEM
5
 The 3D password is a multi factor authentication scheme. The 3D
virtual environment containing various virtual objects containing
various virtual objects.
 The user navigates through this environment and interacts with the
object. The 3D password is simply the combination and the
sequence of user interaction that occur in the 3D virtual
environment.
 The 3D password can combine recognition , recall, token and
biometrics based system into one authentication scheme. This can
be done by designing a 3D virtual environment that contains object
that request information to be recalled, information to be
recognized, token to be presented and biometrics data to be
verified.
BRIEF DISCUSSION OF SYSTEM:
6
3D PASSWORD AUTHENTICATION:
7
 Critical server many large organizations have critical servers that
are usually protected by a textual password. A 3D password
authentication proposes a sound replacement for a textual
password.
 Nuclear and military facilities such facilities should be protected
by the most.
 Powerful authentication systems. The 3D password has a very
large probable password space, and since it can contain token,
biometrics, recognition and knowledge based.
 Authentication in a single authentication system, it is a sound
choice for high level security locations.
3D PASSWORD APPLICATION
8
 Flexibility: 3D Passwords allows Multifactor
authentication biometric, textual passwords can be
embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
password possibility.
 Easy to Memorize: Can be remembered in the form of
short story.
 Respect of Privacy: Organizers can select
authentication schemes that respect users privacy.
ADVANTAGES:
9
 Shoulder Surfing Attacks: Attacker uses camera to
record the users 3D passwords. This attack is more
successful.
 Timing Attack: The Attacker observes how long it
takes the legitimate user to perform correct log in
using 3D password, which gives an indication of 3D
passwords length. This attack cannot be successful
since it gives the attacker mere hints.
DISADVANTAGES:
10
 The 3D password is a multi factor authentication scheme that
combines the various authentication schemes into a single 3D
virtual environment. The virtual environment can contain any
existing authentication scheme or even any upcoming
authentication schemes by adding it as a response to actions
performed on an object.
 Therefore the resulting password space becomes very large
compare to any existing authentication schemes. The design of
the 3D virtual environment the selection of objects inside the
environment and the objects type reflect the resulted password
space. It is the task of the system administrator to design the
environment and to select the appropriate object that reflects
the protected system requirements.
CONCLUSION
11
 "Visa USA tightens security with Arcot". ZDnet.
 "SafeKey". AmericanExpress.com. Retrieved 2010-08-11.
 http://ecb.eu/press/pr/date/2013/html/pr130131_1.en.ht
ml
 "EPCA Payment Summit: iSignthis presents its
authentication service as an alternative to 3D Secure“.
12
REFERENCES:
THANK YOU 
13

More Related Content

What's hot (20)

3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D password
3D password3D password
3D password
 
3D password
3D password 3D password
3D password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3D password
3D password3D password
3D password
 
3 d password
3 d password3 d password
3 d password
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3d passwords
3d passwords3d passwords
3d passwords
 
3 d password
3 d password 3 d password
3 d password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password
3d  password3d  password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 

Viewers also liked

PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authenticationhon1nbo
 
tsunami warning system (synofsis)
tsunami warning system (synofsis)tsunami warning system (synofsis)
tsunami warning system (synofsis)Girish1020
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer scienceRamya SK
 
Blue brain by MAYANK SAHU
Blue brain by MAYANK SAHUBlue brain by MAYANK SAHU
Blue brain by MAYANK SAHUmayank843
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project pptLishita Shah
 
Blue brain presentation
Blue brain  presentation Blue brain  presentation
Blue brain presentation ankita sharma
 

Viewers also liked (15)

PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
3d password
3d password3d password
3d password
 
3 d password
3 d password3 d password
3 d password
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
tsunami warning system (synofsis)
tsunami warning system (synofsis)tsunami warning system (synofsis)
tsunami warning system (synofsis)
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer science
 
Blue brain by MAYANK SAHU
Blue brain by MAYANK SAHUBlue brain by MAYANK SAHU
Blue brain by MAYANK SAHU
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
BLUE BRAIN
BLUE BRAINBLUE BRAIN
BLUE BRAIN
 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
 
Blue brain presentation
Blue brain  presentation Blue brain  presentation
Blue brain presentation
 
Bancassurance
BancassuranceBancassurance
Bancassurance
 

Similar to 3D PASSWORD

Similar to 3D PASSWORD (20)

3d authentication system
3d authentication system3d authentication system
3d authentication system
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3 d
3 d3 d
3 d
 
C0361419
C0361419C0361419
C0361419
 
3 d password
3 d password3 d password
3 d password
 
3d authentication
3d authentication3d authentication
3d authentication
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3d pass words
3d pass words3d pass words
3d pass words
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3D - password
3D - password3D - password
3D - password
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
3 d password
3 d password3 d password
3 d password
 

3D PASSWORD

  • 2.  INTRODUCTION  EXISTING SYSTEM  PROPESED SYSTEM  BRIEF DISCUSSION OF SYSTEM  AUTHENTICATION OF 3D PASSWORD  APPLICATION  ADVANTAGES  DISADVANTAGES  CONCLUSION 2 OVERVIEW:
  • 3.  Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach.  With all the means of technology developing, it can be very easy for others ‘ to fabricate or to still identity or to hack someone's password.  So from here the concept of 3. INTRODUCTION 3
  • 4.  Current authentication system suffers from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.  Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or token cant be stolen. Many biometric authentications have been proposed.  However, users tend to resist using biometric because of their intrusiveness and the effect on their privacy. Moreover, biometrics can’t be revoked. The 3D password is a multi factor authentication scheme. EXSISTING SYSTEM: 4
  • 5.  The proposed system is a multi factor authentication schemes that combines the benefits of various authentication schemes.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition or token based, or a combination of two schemes or more.  This freedom of selection is necessary because users are different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important. PROPESED SYSTEM 5
  • 6.  The 3D password is a multi factor authentication scheme. The 3D virtual environment containing various virtual objects containing various virtual objects.  The user navigates through this environment and interacts with the object. The 3D password is simply the combination and the sequence of user interaction that occur in the 3D virtual environment.  The 3D password can combine recognition , recall, token and biometrics based system into one authentication scheme. This can be done by designing a 3D virtual environment that contains object that request information to be recalled, information to be recognized, token to be presented and biometrics data to be verified. BRIEF DISCUSSION OF SYSTEM: 6
  • 8.  Critical server many large organizations have critical servers that are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password.  Nuclear and military facilities such facilities should be protected by the most.  Powerful authentication systems. The 3D password has a very large probable password space, and since it can contain token, biometrics, recognition and knowledge based.  Authentication in a single authentication system, it is a sound choice for high level security locations. 3D PASSWORD APPLICATION 8
  • 9.  Flexibility: 3D Passwords allows Multifactor authentication biometric, textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited password possibility.  Easy to Memorize: Can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy. ADVANTAGES: 9
  • 10.  Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords. This attack is more successful.  Timing Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D password, which gives an indication of 3D passwords length. This attack cannot be successful since it gives the attacker mere hints. DISADVANTAGES: 10
  • 11.  The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.  Therefore the resulting password space becomes very large compare to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the objects type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements. CONCLUSION 11
  • 12.  "Visa USA tightens security with Arcot". ZDnet.  "SafeKey". AmericanExpress.com. Retrieved 2010-08-11.  http://ecb.eu/press/pr/date/2013/html/pr130131_1.en.ht ml  "EPCA Payment Summit: iSignthis presents its authentication service as an alternative to 3D Secure“. 12 REFERENCES: