The document proposes a 3D password authentication system that combines multiple existing authentication factors. Users can select whether their password is based on recall, biometrics, recognition, tokens, or a combination. In the system, users navigate a virtual 3D environment and interact with virtual objects, with their interactions forming their unique password. The system aims to provide strong, flexible authentication while respecting user privacy. Some example interactions include typing on a virtual keyboard, using a fingerprint scanner, or drawing on a whiteboard. The system has advantages like password strength and ease of memorization but also challenges like cost and accessibility for blind users.
2. CONTENTS
• INTRODUCTION
• AUTHENTICATION
• EXISTING SYSTEM
• DRAWBACKS OF EXISTING SYSTEM
• 3D PASSWORD
• USE OF 3D PASSWORD
• ADVANTAGE & DISADVANTAGE
• ATTACKS ON 3D PASSWORD
• APPLICATION AREA
3. INTRODUCTION
• The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes.
• Users have the freedom to select whether the 3D password will be
solely recall, biometrics, recognition, or token based, or a combination
of two schemes or more.
• This freedom of selection is necessary because users are different and
they have different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
4. AUTHETICATION
Authentication is a process of validating who are you to whom you
claimed to be.
• Human authentication techniques are as follows:
1.Knowledge Base (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
Human
Authentication
Techniques
Knowledge Base
( What you know )
Token Based
( What you have )
Biometrics
( What you are)
Textual Password
Graphical Password
ATM Card
Keys
ID Cards
Fingerprints,Palmprint
Hand Geometry
Face,iris,voice,retina
8. Drawbacks of Existing System
Textual Password:
• Textual Passwords should be easy to remember at the same time hard to guess.
• Full password space for 8 characters consisting of both numbers and characters is at
most 2 X 10¹⁴.
• From an research 25% of the passwords out of 15,000 users can guessed correctly by
using brute force dictionary.
Graphical Password :
• Graphical passwords can be easily recorded but some schemes take a long time to perform.
Token Password: Most unsecured one, if stolen can breech through any security levels.
Biometric Password:
• One main drawback of applying biometric is its intrusiveness upon a user’s personal
characteristic .
• Retina biometrical recognition schemes require the user to willingly subject their eyes to a
low-intensity infrared light so specified environment is required.
• In addition, most biometric systems require a special scanning device to authenticate users,
which is not applicable for remote and Internet users.
9. 3D Password
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL
+ TOKENS
+ BIOMETRIC
In one authentication system
• The 3D password presents a virtual environment containing various virtual objects.
• The user walks through the environment and interacts with the objects .
• The 3d Password is simply the combination and sequence of user interactions that
occur in the 3D environment.
11. 3D Password Selection & Input
Virtual objects can be any object we encounter in real life:
• A computer with which the user can type;
• A fingerprint reader that requires the user’s fingerprint;
• A biometrical recognition device;
• A paper or a white board that a user can write, sign, or Draw on;
• An automated teller machine (ATM) that requests a token;
• A light that can be switched on/off;
• A television or radio where channels can be selected;
• A staple that can be punched;
• A car that can be driven;
• A book that can be moved from one place to another;
• Any graphical password scheme;
• Any real-life object;
• Any upcoming authentication scheme
12. 3D Password Example
Let us consider a 3-D virtual environment space of size G x G x G.
The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . , G] x
[1, . . . , G] x [1, . . . , G].
The objects are distributed in the 3-D virtual environment with unique (x, y, z)
coordinates.
We assume that the user can navigate into the 3-D virtual environment and interact with
the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris
scanner, stylus, card reader, and microphone.
For Example :
Let us assume the user enters a virtual office then performs the following action:
(10,24,91) Action=Open office door
(10,24,91) Action=Close office door
(4,34,18) Action=Typing,”C”
(4,34,18) Action=Typing,”O”
(4,34,18)Action=Typing,”N”
(10,24,80)Action=Pick up the pen
(1,18,80)Action=Draw point=(330,130)
13. Snapshot of the concept of 3d-Virtual
Environment
(a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is
typing a textual password on a virtual computer as a part of the user’s 3-D
password. (b) Snapshot of a proof-of-concept virtual art gallery, which
contains 36 pictures and six computers
(a) (b)
14. Advantage & Disadvantage
Advantages
Flexibility:3D Passwords allows Multifactor authentication biometric , textual
passwords can be embedded in 3D password technology.
Strength: This scenario provides almost unlimited passwords possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes that respect
users privacy.
Disadvantages
Difficult for blind people to use this technology.
Requires sophisticated computers technology expensive.
A lot of program coding is required.
15. Attacks On 3D Password
Brute Force Attack Well Studied Attack
Shoulder Surfing Attack
16. Application Area
• Critical Servers
• Nuclear and military Stations
• Airplanes and Jet Fighters
• ATMs, Desktop and Laptop Logins, Web
Authentication