SlideShare a Scribd company logo
1 of 17
Users nowadays are provided with major password
stereotypes such as :-
 TEXT PASSWORD :- mostly text passwords follow an encryption algorithm.
 BIOMETRIC SCANNING :- is your “natural” signature.
 TOKENS & CARDS :- prove your validity.
 TEXT PASSWORD
 BIOMETRIC SCANNING
 TOKENS & CARDS
Human Authentication
techniques
Knowledge Based
What you KNOW
Textual Password
Graphical Password
Token Based-What
you HAVE
ATM cards
Keys
ID Cards
Biometrics - What you
ARE
Fingerprints, Palmprints
Hand geometry
Face, Iris, Voice, Retina
recognition
Human Authentication Techniques - Classification
CURRENT AUTHENTICATION SYSTEM SUFFER FROM MANY WEEKNESSES:-
many available graphical password have password space that is less than or
equal to textual password space, which is also easy to break.
 smart cards or tokens can be stolen.
 users tend to resist biometrics of their effects on privacy. Moreover
biometric can’t be revoked
•A 3D password is a multifactor
authentication scheme that
combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICS
in one authentication system.
Brief description of system:-
 The 3D password presents a virtual environment containing various
virtual objects.
 The user walks through the environment and interacts with the objects.
 It is the combination and sequence of user interactions that occur in the
3D environment.
 The user is presented with this 3d virtual environment where the user
navigates and interacts with various objects.
 The sequence of actions and interactions towards the objects inside the
3d environment constructs the user’s 3d password.
• For example, the user can enter the virtual environment
and type something on a computer that exists in (x1 , y1 ,
z1 ) position
• then enter a room that has a fingerprint recognition
device that exists in a position (x2 , y2 , z2 ) and provide
his/her fingerprint.
• Then, the user can go to the virtual garage, open the car
door, and turn on the radio to a specific channel.
• The combination and the sequence of the previous
actions toward the specific objects construct the user’s
3D password.
Virtual objects
Virtual objects can be any object we encounter in
real life:
A computer on which the user can type in
A fingerprint reader that requires users
fingerprint
A paper or white board on which user can type
An Automated teller(ATM) machine that requires
a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
• 3-D virtual environment affects the usability,
effectiveness, and acceptability of a 3-D
password system.
• 3-D environment reflects the administration
needs and the security requirements.
3D Virtual Environment
3D Virtual Environment
The design of 3D virtual environments should follow
these guidelines:
Design guidelines
Advantages
 Provides security.
 3D password can’t take by any
other person.
 3D graphical password has no
limit.
 Password can change easily.
 Implementation of the system is
easy.
 Password can remember easily.
 Password helps to keep lot of
personal details.
Application
s
The 3D password’s main application domains are protecting
critical systems and resources.
• Critical Servers
• Nuclear Reactors & military Facilities
• Airplanes and missile Guiding
• In addition, 3D passwords can be used in less critical systems
• A small virtual environment can be used in the following systems like
– ATM
– Personal Digital Assistance
– Desktop computers & laptops
– Web authentication etc.
State Diagram
Attacks on 3-D password
• Brute Force Attack: The attacker has to try all possible 3-D passwords. This
kind of attack is very difficult for the following reasons:
– Time required to login
– Cost of attacks
• Well-Studied Attack: The attacker tries to find the highest probable
distribution of 3-D passwords. However, to launch such an attack, the
attacker has to acquire knowledge of the most probable 3-D password
distributions.
• Shoulder Surfing Attack: An attacker uses a camera to record the user’s 3-
D password or tries to watch the legitimate user while the 3-D password is
being performed. This attack is the most successful type of attack against
3-D passwords and some other graphical passwords.
• Timing Attack: In this attack, the attacker observes how long it takes the
legitimate user to perform a correct sign-in using the 3-D password. This
observation gives the attacker an indication of the legitimate user’s 3-D
password length.
 The authentication can be improved with 3d
password , because the unauthorized person may not
interact with same object at a particular location as the
legitimate user.
 It is difficult to crack ,because it has no fixed number
of steps and a particular procedure.
 Added with biometrics and token verification this
schema becomes almost unbreakable.
The 3-D password is still in its early stages. Designing various kinds of 3-D virtual
environments, deciding on password spaces, and interpreting user feedback and
experiences from such environments will result in enhancing and improving the
user experience of the 3-D password
PRESENTED BY- SHUBHANGI SINGH
PRESENTED TO- BHUMIKA GARG

More Related Content

What's hot (20)

3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3 d password
3 d password 3 d password
3 d password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3d passwords
3d passwords3d passwords
3d passwords
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Similar to 3D Password and its importance (20)

3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3d authentication
3d authentication3d authentication
3d authentication
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D password
3D password3D password
3D password
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Vivek
VivekVivek
Vivek
 
3D password
3D password 3D password
3D password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3D Password
3D Password3D Password
3D Password
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 

Recently uploaded

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

3D Password and its importance

  • 1.
  • 2. Users nowadays are provided with major password stereotypes such as :-  TEXT PASSWORD :- mostly text passwords follow an encryption algorithm.  BIOMETRIC SCANNING :- is your “natural” signature.  TOKENS & CARDS :- prove your validity.  TEXT PASSWORD  BIOMETRIC SCANNING  TOKENS & CARDS
  • 3. Human Authentication techniques Knowledge Based What you KNOW Textual Password Graphical Password Token Based-What you HAVE ATM cards Keys ID Cards Biometrics - What you ARE Fingerprints, Palmprints Hand geometry Face, Iris, Voice, Retina recognition Human Authentication Techniques - Classification
  • 4. CURRENT AUTHENTICATION SYSTEM SUFFER FROM MANY WEEKNESSES:- many available graphical password have password space that is less than or equal to textual password space, which is also easy to break.  smart cards or tokens can be stolen.  users tend to resist biometrics of their effects on privacy. Moreover biometric can’t be revoked
  • 5.
  • 6. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 7. Brief description of system:-  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.  The user is presented with this 3d virtual environment where the user navigates and interacts with various objects.  The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 8. • For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position • then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. • Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. • The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
  • 9. Virtual objects Virtual objects can be any object we encounter in real life: A computer on which the user can type in A fingerprint reader that requires users fingerprint A paper or white board on which user can type An Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • 10. • 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment 3D Virtual Environment
  • 11. The design of 3D virtual environments should follow these guidelines: Design guidelines
  • 12. Advantages  Provides security.  3D password can’t take by any other person.  3D graphical password has no limit.  Password can change easily.  Implementation of the system is easy.  Password can remember easily.  Password helps to keep lot of personal details.
  • 13. Application s The 3D password’s main application domains are protecting critical systems and resources. • Critical Servers • Nuclear Reactors & military Facilities • Airplanes and missile Guiding • In addition, 3D passwords can be used in less critical systems • A small virtual environment can be used in the following systems like – ATM – Personal Digital Assistance – Desktop computers & laptops – Web authentication etc.
  • 15. Attacks on 3-D password • Brute Force Attack: The attacker has to try all possible 3-D passwords. This kind of attack is very difficult for the following reasons: – Time required to login – Cost of attacks • Well-Studied Attack: The attacker tries to find the highest probable distribution of 3-D passwords. However, to launch such an attack, the attacker has to acquire knowledge of the most probable 3-D password distributions. • Shoulder Surfing Attack: An attacker uses a camera to record the user’s 3- D password or tries to watch the legitimate user while the 3-D password is being performed. This attack is the most successful type of attack against 3-D passwords and some other graphical passwords. • Timing Attack: In this attack, the attacker observes how long it takes the legitimate user to perform a correct sign-in using the 3-D password. This observation gives the attacker an indication of the legitimate user’s 3-D password length.
  • 16.  The authentication can be improved with 3d password , because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack ,because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this schema becomes almost unbreakable. The 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments, deciding on password spaces, and interpreting user feedback and experiences from such environments will result in enhancing and improving the user experience of the 3-D password
  • 17. PRESENTED BY- SHUBHANGI SINGH PRESENTED TO- BHUMIKA GARG