3. Introduction
Authentication is a process of validating
who are you to whom you claimed to be
Human authentication techniques are as
follows:
1. Knowledge Base (What you know)
2. Token Based(what you have)
3. Biometrics(what you are)
4. Recognition Based(What you recognize)
4. Common AuthenticationCommon Authentication
Techniques used in computerTechniques used in computer
worldworld
1. Textual Passwords(Recall Based)-:Recall
what you have created before.
2. Graphical Passwords:
(Recall Based + Recognition Based)
Biometric schemes
(fingerprints , voice recognition etc)
5. DrawbacksDrawbacks
Textual Password:
◦ Textual Passwords should be easy to
remember at the same time hard to guess
◦ Full password space for 8 characters
consisting of both numbers and characters is
2 X 10¹⁴
◦ From an research 25% of the passwords out
of 15,000 users can guessed correctly by
using brute force dictionary
6. DrawbacksDrawbacks
Graphical Password
◦ Graphical passwords can be easily
recorded as these schemes take a long
time.
◦ One main drawback of applying biometric
is its intrusiveness upon a users personnel
characteristics.
◦ They require special scanning device to
authenticate the user which is not
acceptable for remote and internet users.
7. 3D PASSWORD SCHEME3D PASSWORD SCHEME
The 3D Password scheme is a new
authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
8. The 3D password presents a virtual
environment containing various virtual
objects.
The user walks through the environment
and interacts with the objects
The 3d Password is simply the
combination and sequence of user
interactions that occur in the 3D
environment
9. 3D Password selection3D Password selection
Virtual objects can be any object we
encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
10. For EXAMPLE:
Let us assume the user enters a virtual
office then performs the following action:
(10,24,91) Action=Open office door
(11,24,91) Action=Close office door
(4,34,15) Action=Typing ,”C”
(4,34,16) Action=Typing ,”O”
(4,34,17) Action=Typing ,”N”
(12,29,80) Action=Pick up the pen
(1,18,80) Action=Draw point=(330,130)
11.
12.
13. 3D Passwords Differentiators3D Passwords Differentiators
Flexibility:3D Passwords allows Multifactor
authentication biometric , textual passwords
can be embedded in 3D password technology.
Strength: This scenario provides almost
unlimited passwords possibility.
Ease to Memorize: can be remembered in the
form of short story.
Respect of Privacy: Organizers can select
authentication schemes that respect users
privacy.
14. Advantages
• 3D Password scheme is combination of re-call based,
recognized based, Biometrics .etc into single authentication
technique
• Due to use of multiple schemes into one scheme password
space is increased to great extend.
• More secure authentication scheme over currently available
schemes.
Disadvantages
• Time and memory requirement is large.
• Shoulder-suffering attack is still can affect the schema.
• More expensive as cost required is more than other schemes.
15. 3D Password Application Areas3D Password Application Areas
Nuclear and military Facilities
Airplanes and Jet Fighters
ATMs , Desktop and Laptop Logins, Web
Authentication
16. CONCLUSIONCONCLUSION
The user can decide his own authentication
schemes. If he’s comfortable with Recall &
Recognition method then he can choose the 3D
authentication just used above.
The 3D environment can change according to
user’s request.
Can be used in critical areas such as a Nuclear
Reactor, Missile Guiding System etc.
Added with biometrics & card verification the
scheme becomes almost unbreakable.