SlideShare a Scribd company logo
1 of 17
3-D Password Scheme3-D Password Scheme
For more secure authentication
YOGENDRA MAHATE
Contents
Introduction
Common Authentication Techniques used
in computer world
3D password scheme
3D password selection
Show state diagram
Advantages & Disadvantages
3D Application Areas
Conclusion
Introduction
Authentication is a process of validating
who are you to whom you claimed to be
Human authentication techniques are as
follows:
1. Knowledge Base (What you know)
2. Token Based(what you have)
3. Biometrics(what you are)
4. Recognition Based(What you recognize)
Common AuthenticationCommon Authentication
Techniques used in computerTechniques used in computer
worldworld
1. Textual Passwords(Recall Based)-:Recall
what you have created before.
2. Graphical Passwords:
(Recall Based + Recognition Based)
Biometric schemes
(fingerprints , voice recognition etc)
DrawbacksDrawbacks
 Textual Password:
◦ Textual Passwords should be easy to
remember at the same time hard to guess
◦ Full password space for 8 characters
consisting of both numbers and characters is
2 X 10¹⁴
◦ From an research 25% of the passwords out
of 15,000 users can guessed correctly by
using brute force dictionary
DrawbacksDrawbacks
 Graphical Password
◦ Graphical passwords can be easily
recorded as these schemes take a long
time.
◦ One main drawback of applying biometric
is its intrusiveness upon a users personnel
characteristics.
◦ They require special scanning device to
authenticate the user which is not
acceptable for remote and internet users.
3D PASSWORD SCHEME3D PASSWORD SCHEME
The 3D Password scheme is a new
authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
The 3D password presents a virtual
environment containing various virtual
objects.
The user walks through the environment
and interacts with the objects
The 3d Password is simply the
combination and sequence of user
interactions that occur in the 3D
environment
3D Password selection3D Password selection
Virtual objects can be any object we
encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
For EXAMPLE:
Let us assume the user enters a virtual
office then performs the following action:
 (10,24,91) Action=Open office door
 (11,24,91) Action=Close office door
 (4,34,15) Action=Typing ,”C”
 (4,34,16) Action=Typing ,”O”
 (4,34,17) Action=Typing ,”N”
 (12,29,80) Action=Pick up the pen
 (1,18,80) Action=Draw point=(330,130)
3D Passwords Differentiators3D Passwords Differentiators
 Flexibility:3D Passwords allows Multifactor
authentication biometric , textual passwords
can be embedded in 3D password technology.
 Strength: This scenario provides almost
unlimited passwords possibility.
 Ease to Memorize: can be remembered in the
form of short story.
 Respect of Privacy: Organizers can select
authentication schemes that respect users
privacy.
Advantages
• 3D Password scheme is combination of re-call based,
recognized based, Biometrics .etc into single authentication
technique
• Due to use of multiple schemes into one scheme password
space is increased to great extend.
• More secure authentication scheme over currently available
schemes.
Disadvantages
• Time and memory requirement is large.
• Shoulder-suffering attack is still can affect the schema.
• More expensive as cost required is more than other schemes.
3D Password Application Areas3D Password Application Areas
Nuclear and military Facilities
Airplanes and Jet Fighters
ATMs , Desktop and Laptop Logins, Web
Authentication
CONCLUSIONCONCLUSION
The user can decide his own authentication
schemes. If he’s comfortable with Recall &
Recognition method then he can choose the 3D
authentication just used above.
The 3D environment can change according to
user’s request.
Can be used in critical areas such as a Nuclear
Reactor, Missile Guiding System etc.
Added with biometrics & card verification the
scheme becomes almost unbreakable.
THANK YOU…THANK YOU…

More Related Content

What's hot

3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 

What's hot (20)

3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d password
3 d password 3 d password
3 d password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3D Password
3D Password3D Password
3D Password
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

Similar to 3 d password (20)

3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D password
3D password 3D password
3D password
 
3D - password
3D - password3D - password
3D - password
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password3 d password
3 d password
 
Vivek
VivekVivek
Vivek
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

3 d password

  • 1. 3-D Password Scheme3-D Password Scheme For more secure authentication YOGENDRA MAHATE
  • 2. Contents Introduction Common Authentication Techniques used in computer world 3D password scheme 3D password selection Show state diagram Advantages & Disadvantages 3D Application Areas Conclusion
  • 3. Introduction Authentication is a process of validating who are you to whom you claimed to be Human authentication techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are) 4. Recognition Based(What you recognize)
  • 4. Common AuthenticationCommon Authentication Techniques used in computerTechniques used in computer worldworld 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based + Recognition Based) Biometric schemes (fingerprints , voice recognition etc)
  • 5. DrawbacksDrawbacks  Textual Password: ◦ Textual Passwords should be easy to remember at the same time hard to guess ◦ Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ ◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
  • 6. DrawbacksDrawbacks  Graphical Password ◦ Graphical passwords can be easily recorded as these schemes take a long time. ◦ One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics. ◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 7. 3D PASSWORD SCHEME3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
  • 8. The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 9. 3D Password selection3D Password selection Virtual objects can be any object we encounter in real life: A computer on which the user can type A fingerprint reader that requires users fingerprint A paper or white board on which user can type A Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • 10. For EXAMPLE: Let us assume the user enters a virtual office then performs the following action:  (10,24,91) Action=Open office door  (11,24,91) Action=Close office door  (4,34,15) Action=Typing ,”C”  (4,34,16) Action=Typing ,”O”  (4,34,17) Action=Typing ,”N”  (12,29,80) Action=Pick up the pen  (1,18,80) Action=Draw point=(330,130)
  • 11.
  • 12.
  • 13. 3D Passwords Differentiators3D Passwords Differentiators  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 14. Advantages • 3D Password scheme is combination of re-call based, recognized based, Biometrics .etc into single authentication technique • Due to use of multiple schemes into one scheme password space is increased to great extend. • More secure authentication scheme over currently available schemes. Disadvantages • Time and memory requirement is large. • Shoulder-suffering attack is still can affect the schema. • More expensive as cost required is more than other schemes.
  • 15. 3D Password Application Areas3D Password Application Areas Nuclear and military Facilities Airplanes and Jet Fighters ATMs , Desktop and Laptop Logins, Web Authentication
  • 16. CONCLUSIONCONCLUSION The user can decide his own authentication schemes. If he’s comfortable with Recall & Recognition method then he can choose the 3D authentication just used above. The 3D environment can change according to user’s request. Can be used in critical areas such as a Nuclear Reactor, Missile Guiding System etc. Added with biometrics & card verification the scheme becomes almost unbreakable.