3D Password


Published on

A Slide on 3D Password

Published in: Technology
  • Be the first to comment

3D Password

  1. 1. ByZishan Mohsin B.tech, Computer Science And Engineering Integral University.
  2. 2. CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion
  3. 3. INTRODUCTION Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment.
  4. 4. Combines recognition, recall, token, and biometrics based systems. Users choice to select the type of authentication technique.
  5. 5. AUTHENTICATION SCHEMES KNOWLEDGE BASED Recall based Recognition based TOKEN BASED e.g : smart card
  6. 6. BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based
  7. 7. FUNCTIONALITIES REQUIRED New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember, difficult to guess.
  8. 8. 3D PASSWORD SELECTION AND INPUT 3D environment space represented by the co- ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users 3D password.
  9. 9. Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
  10. 10. Virtual Computer where user typing a textual password as a part of user’s 3D Password
  11. 11. Snapshot of a proof-of-concept virtual art gallery
  12. 12. State diagram of a 3D Password application
  13. 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance
  14. 14. APPLICATIONS Critical servers. Nuclear and military facilities. Airplanes and jet fighters. ATM, desktop computers and laptops.
  15. 15. SECURITY ANALYSIS 3D Password Space Size. 3D Password Distribution Knowledge.
  16. 16. ATTACKS AND COUNTER MEASURES Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack
  17. 17. CONCLUSION Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password