3D PASSWORD
Presented by
S.Banupriya
II MCA
Authentication is an important factor of
security.
There are many authentication are
available such as graphical passwords,
Biometric identification, etc.,
But each of these had some drawbacks.
To overcome the limitations of the
existing authentication techniques, a new
improved authentication scheme is
introduced, i.e. 3D password.
Abstract
Commonly used authentication schemes
are textual passwords, graphical
passwords and biometrics.
3D password is a multifactor
authentication scheme.
To be authenticated, we require a 3D
virtual environment.
Introduction
Authentication
Graphical password
Biometrics
Textual password
3D password
3D virtual environment
Keywords
Knowledge based
Recall based
Recognition based
Token based
e.g. smart card
Biometric based
Fingerprint ,palm prints ,hand
geometry ,face
recognition
Graphical passwords
Recognition based
Recall based
Authentication scheme
Multifactor Authentication
Combine all existing authentication
systems.
Contains several objects or item with
which the user can interact.
It reflects the users performances and
requirements.
Description
Recall based techniques require the user
to repeat our reproduce the secret that
the user created before.
Textual Passwords should be easy to
remember at the same time hard to guess.
One major drawback of textual password
is that Full password space for 8
characters consisting of both numbers
and characters is 2 *1024.
From research 25% of the passwords out
of 15,000 users can guessed correctly by
using brute force dictionary.
Textual Passwords
Graphical password are based on the
idea that a users can recall and recognize
pictures more than words.
But most graphical passwords are
susceptible for shoulder surfing attacks,
where an attacker can observe or record
the valid user’s graphical password by
camera.
 Currently most of the graphical
password are in the research phase and
require more enhancement and usability
studies to develop them in the market.
Graphical Passwords
The 3D Password scheme is a new
authentication scheme that combines
RECOGNITION + RECALL + TOKENS +
BIOMETRIC in one authentication system.
The system of authentication presents a 3D
virtual environment to the user where in the
user navigates and interacts with the multitude
of objects that may be present.
The order in which actions and interactions
are performed with respect to the objects
constitutes the user’s 3D password.
3D Passwords
Flexibility
Strength
Ease to memorize
Respect of privacy
Advantages
Time and memory requirements
Cost of implementations and
maintenance
Disadvantages
Critical servers.
Nuclear and military facilities.
Airplanes and jetfighters.
ATMs, PDAs, Desktop computers and
laptops.
Aerospace, etc.,
Applications
3D password scheme is a very strong
authentication scheme.
It is very difficult to crack the password
which is created using such a strong
authentication scheme.
This paper proposes the mechanism to
make existing 3D password system
stronger against such kind of attacks.
Conclusion
This paper proposes the solution to make
the existing 3D password authentication
system stronger.
 But at the same time it is making the
system more complicated.
Handling lots of image processing and
speech recognition task is the area of
research in future.
Future Enhancement
References
[1] Surabhi Anand, Priya Jain, Nitin and Ravi Rastogi,
“Security Analysis and Implementation of 3-Level
Security System Using Image Based Authentication” the
14th IEEE International Conference on Modeling and
Simulation, Oregon, USA, 2012
[2] Sonia Chiasson, Elizabeth Stobert, Alain Forget,
Robert Biddle and Paul C. van Oorschot , “Persuasive
Cued Click-Points: Design, Implementation, and
Evaluation of a Knowledge-Based Authentication
Mechanism”, IEEE Transactions on Dependable and
Secure Computing, Vol. 9, No. 2 March/April 2012
[3] Chippy.T and R.Nagendran , “Defenses against large
scale online password guessing attacks by using
persuasive click points”, International Journal of
Communications and Engineering Volume 03– No.3,
 Issue: 01 March2012
THANK YOU

3 d

  • 1.
  • 2.
    Authentication is animportant factor of security. There are many authentication are available such as graphical passwords, Biometric identification, etc., But each of these had some drawbacks. To overcome the limitations of the existing authentication techniques, a new improved authentication scheme is introduced, i.e. 3D password. Abstract
  • 3.
    Commonly used authenticationschemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment. Introduction
  • 4.
  • 5.
    Knowledge based Recall based Recognitionbased Token based e.g. smart card Biometric based Fingerprint ,palm prints ,hand geometry ,face recognition Graphical passwords Recognition based Recall based Authentication scheme
  • 6.
  • 8.
    Combine all existingauthentication systems. Contains several objects or item with which the user can interact. It reflects the users performances and requirements. Description
  • 9.
    Recall based techniquesrequire the user to repeat our reproduce the secret that the user created before. Textual Passwords should be easy to remember at the same time hard to guess. One major drawback of textual password is that Full password space for 8 characters consisting of both numbers and characters is 2 *1024. From research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary. Textual Passwords
  • 10.
    Graphical password arebased on the idea that a users can recall and recognize pictures more than words. But most graphical passwords are susceptible for shoulder surfing attacks, where an attacker can observe or record the valid user’s graphical password by camera.  Currently most of the graphical password are in the research phase and require more enhancement and usability studies to develop them in the market. Graphical Passwords
  • 11.
    The 3D Passwordscheme is a new authentication scheme that combines RECOGNITION + RECALL + TOKENS + BIOMETRIC in one authentication system. The system of authentication presents a 3D virtual environment to the user where in the user navigates and interacts with the multitude of objects that may be present. The order in which actions and interactions are performed with respect to the objects constitutes the user’s 3D password. 3D Passwords
  • 12.
  • 13.
    Time and memoryrequirements Cost of implementations and maintenance Disadvantages
  • 14.
    Critical servers. Nuclear andmilitary facilities. Airplanes and jetfighters. ATMs, PDAs, Desktop computers and laptops. Aerospace, etc., Applications
  • 15.
    3D password schemeis a very strong authentication scheme. It is very difficult to crack the password which is created using such a strong authentication scheme. This paper proposes the mechanism to make existing 3D password system stronger against such kind of attacks. Conclusion
  • 16.
    This paper proposesthe solution to make the existing 3D password authentication system stronger.  But at the same time it is making the system more complicated. Handling lots of image processing and speech recognition task is the area of research in future. Future Enhancement
  • 17.
    References [1] Surabhi Anand,Priya Jain, Nitin and Ravi Rastogi, “Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication” the 14th IEEE International Conference on Modeling and Simulation, Oregon, USA, 2012 [2] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle and Paul C. van Oorschot , “Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism”, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2 March/April 2012 [3] Chippy.T and R.Nagendran , “Defenses against large scale online password guessing attacks by using persuasive click points”, International Journal of Communications and Engineering Volume 03– No.3,  Issue: 01 March2012
  • 18.