SlideShare a Scribd company logo
3-D password
    For more secure authentication..




           Presented by:

             Preetha M P
             Roll No : 21
             S5 MCA
             ETAKMCA022
Basic Identification Methods of password

    Possession                      Knowledge
(“something I have”)            (“something I know”)

•Keys                               •Password
•Passport                           •PIN
•Smart Card




    Biometrics                       Recognition
(“something I am”)             (“something I recognise”)


 •Face                             • Graphical
 •Fingerprint                      Password
 •Iris
PASSWORD

• It is basically a encryption algorithm

• Usually 8-15 characters or slightly more than that

• Can be meaningful words from dictionary, pet names,
             name of friends etc

• Easy to break and vulnerable to Brute force attack
PASSPHRASE

• Enhanced version of password

• Combination of words or simply a collection of passwords
in proper sequence

• Length is about 30 – 50 characters or more than that also

• Creates ambiguity to remember if there is no proper
sequence
GRAPHICAL PASSWORDS

• Based on the idea that users can recall and recognize
pictures better than words.

• Require a long time to be performed

• Have a password space that is less than or equal to the
textual password space

• Vulnerable to shoulder surfing attacks
BIOMETRICS

• Automatethe identification or verification of an individual
based on human characteristics or body organs.
   • Physiological: Face, fingerprint, iris
   • Behavioral: Hand-written signature, voice



         Characteristics                         Templates


                                                 011001010010101…
                                                 011010100100110…
                                                 001100010010010...
3-D PASSWORD

• Customizable and very interesting way of authentication

• Multi factor authentication scheme.

• Contains a 3-D virtual environment where the user navigates & interacts
with various objects.

• Sequence of actions and interactions toward the objects constructs
user’s 3-D password.

• Combination of textual passwords, graphical passwords & various
types of biometrics into a 3-D virtual environment.

• Design of 3-D virtual environment and type of objects selected
determine 3-D password key space
3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS:

 •   a computer with which the user can type;
 •   a fingerprint reader that requires the user’s fingerprint;
 •   a biometrical recognition device;
 •   a paper or a white board that a user can write, sign, or draw on;
 •   an automated teller machine (ATM) that requests a token;
 •   a light that can be switched on/off;
 •   a television or radio where channels can be selected;
 •   a staple that can be punched;
 •   a car that can be driven;
 •   a book that can be moved from one place to another;
 •   any graphical password scheme;
 •   any real-life object;
 •   any upcoming authentication scheme.
State diagram of a possible 3-D password application
Snapshot of a proof-of-concept virtual art gallery, which
contains 36 pictures and six computers
Snapshot of a proof-of-concept 3-D virtual environment, where the
user is typing a textual password on a virtual computer as a part of
the user’s 3-D password
An example of user actions in the 3D virtual environment can
be recorded as follows:

 • (10, 24, 91) Action = Open the office door;
 • (10, 24, 91) Action = Close the office door;
 • (4, 34, 18) Action = Typing, “F”;
 • (4, 34, 18) Action = Typing, “A”;
 • (4, 34, 18) Action = Typing, “L”;
 • (4, 34, 18) Action = Typing, “C”;
 • (4, 34, 18) Action = Typing, “O”;
 • (4, 34, 18) Action = Typing, “N”;
 • (10, 24, 80) Action = Pick up the pen;
 • (1, 18, 80) Action = Drawing, point = (330, 130).
3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES

• Real life similarity

• Object uniqueness and distinction

• Three Dimensional Virtual Environment Size

• Number of objects and their types

• System Importance
3-D PASSWORD APPLICATIONS

In Critical Systems:

• Critical servers
• Nuclear and military facilities
• Airplanes and jet fighters

In small virtual environments:

• ATM
• Personal Digital Assistance
• Desktop Computers & laptop logins
• Web Authentication
ADVANTAGES OF 3-D PASSWORD

• Several authentication schemes
• Easy to memorize
• Designed according to protected system
• Highly flexible
• Extremely strong
• Provides secrets
• 3D environment can be changed
• Password can change easily.
• Difficult to crack
• Freedom to select
• Difficult to share
• 3D graphical password has no limit
DISADVANTAGES


•Difficult for blind people to use this technology.

• Requires sophisticated computer technology.

• Expensive.

• A lot of program coding is required.
ATTACKS AND COUNTER MEASURES

• Brute Force Attack
   a) Time required to login
   b) Cost of attacks

• Well Studied Attack

• Shoulder Surfing Attack

• Timing attack
CONCLUSION

• 3D password is a multi factor authentication scheme that combines the
various authentication schemes into a single 3D virtual environment.

• Design of the 3D virtual environment is the selection of objects inside
the environment and the object's type reflect the resulted password
space

• Password space is very large compared to any existing authentication
schemes

•It is the task of the system administrator to design the environment and
to select the appropriate object that reflects the protected system
requirements

• Designing a simple and easy to use 3D virtual environment is a factor
that leads to a higher user acceptability of a 3D password system.
Questions??
Thank u

More Related Content

What's hot

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D password
3D password3D password
3D password
anuradha srivastava
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 

What's hot (20)

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d passwords
3d passwords3d passwords
3d passwords
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d authentication
3d authentication3d authentication
3d authentication
 
3 d password
3 d password 3 d password
3 d password
 
3D password
3D password3D password
3D password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password
3D Password3D Password
3D Password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password3 d password
3 d password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
8 tips for bike rental store
8 tips for bike rental store8 tips for bike rental store
8 tips for bike rental store
VivoRental
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
Pattern Recognition in Multiple Bike sharing Systems for comparability
Pattern Recognition in Multiple Bike sharing Systems for comparabilityPattern Recognition in Multiple Bike sharing Systems for comparability
Pattern Recognition in Multiple Bike sharing Systems for comparability
Athiq Ahamed
 
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
Elementos pasivos
Elementos pasivosElementos pasivos
Elementos pasivos
Lejasita Sierra
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
Manual do Diferencial Meritor MS113
Manual do Diferencial Meritor MS113Manual do Diferencial Meritor MS113
Manual do Diferencial Meritor MS113
Marcelo Cardozo
 
3d password
3d password3d password
3d password
shivi123456
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
Componentes Electronicos
Componentes ElectronicosComponentes Electronicos
Componentes Electronicos
luis miguel
 

Viewers also liked (15)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
8 tips for bike rental store
8 tips for bike rental store8 tips for bike rental store
8 tips for bike rental store
 
3d pass words
3d pass words3d pass words
3d pass words
 
Pattern Recognition in Multiple Bike sharing Systems for comparability
Pattern Recognition in Multiple Bike sharing Systems for comparabilityPattern Recognition in Multiple Bike sharing Systems for comparability
Pattern Recognition in Multiple Bike sharing Systems for comparability
 
3dpassword
3dpassword3dpassword
3dpassword
 
Elementos pasivos
Elementos pasivosElementos pasivos
Elementos pasivos
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
Manual do Diferencial Meritor MS113
Manual do Diferencial Meritor MS113Manual do Diferencial Meritor MS113
Manual do Diferencial Meritor MS113
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Componentes Electronicos
Componentes ElectronicosComponentes Electronicos
Componentes Electronicos
 

Similar to 3D PASSWORD

3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
Maheshbabu319
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
HARIKRISHNANU13
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Ramesh Goud
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3 dpswd
3 dpswd3 dpswd
3 dpswd
Heena Chugh
 
Vivek
VivekVivek
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
swati singh
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
swati singh
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
Tapesh Chalisgaonkar
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 

Similar to 3D PASSWORD (20)

3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3 dpswd
3 dpswd3 dpswd
3 dpswd
 
Vivek
VivekVivek
Vivek
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d
3d3d
3d
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3dpassword
3dpassword3dpassword
3dpassword
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

3D PASSWORD

  • 1. 3-D password For more secure authentication.. Presented by: Preetha M P Roll No : 21 S5 MCA ETAKMCA022
  • 2. Basic Identification Methods of password Possession Knowledge (“something I have”) (“something I know”) •Keys •Password •Passport •PIN •Smart Card Biometrics Recognition (“something I am”) (“something I recognise”) •Face • Graphical •Fingerprint Password •Iris
  • 3. PASSWORD • It is basically a encryption algorithm • Usually 8-15 characters or slightly more than that • Can be meaningful words from dictionary, pet names, name of friends etc • Easy to break and vulnerable to Brute force attack
  • 4. PASSPHRASE • Enhanced version of password • Combination of words or simply a collection of passwords in proper sequence • Length is about 30 – 50 characters or more than that also • Creates ambiguity to remember if there is no proper sequence
  • 5. GRAPHICAL PASSWORDS • Based on the idea that users can recall and recognize pictures better than words. • Require a long time to be performed • Have a password space that is less than or equal to the textual password space • Vulnerable to shoulder surfing attacks
  • 6. BIOMETRICS • Automatethe identification or verification of an individual based on human characteristics or body organs. • Physiological: Face, fingerprint, iris • Behavioral: Hand-written signature, voice Characteristics Templates 011001010010101… 011010100100110… 001100010010010...
  • 7. 3-D PASSWORD • Customizable and very interesting way of authentication • Multi factor authentication scheme. • Contains a 3-D virtual environment where the user navigates & interacts with various objects. • Sequence of actions and interactions toward the objects constructs user’s 3-D password. • Combination of textual passwords, graphical passwords & various types of biometrics into a 3-D virtual environment. • Design of 3-D virtual environment and type of objects selected determine 3-D password key space
  • 8. 3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS: • a computer with which the user can type; • a fingerprint reader that requires the user’s fingerprint; • a biometrical recognition device; • a paper or a white board that a user can write, sign, or draw on; • an automated teller machine (ATM) that requests a token; • a light that can be switched on/off; • a television or radio where channels can be selected; • a staple that can be punched; • a car that can be driven; • a book that can be moved from one place to another; • any graphical password scheme; • any real-life object; • any upcoming authentication scheme.
  • 9. State diagram of a possible 3-D password application
  • 10. Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers
  • 11. Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the user’s 3-D password
  • 12. An example of user actions in the 3D virtual environment can be recorded as follows: • (10, 24, 91) Action = Open the office door; • (10, 24, 91) Action = Close the office door; • (4, 34, 18) Action = Typing, “F”; • (4, 34, 18) Action = Typing, “A”; • (4, 34, 18) Action = Typing, “L”; • (4, 34, 18) Action = Typing, “C”; • (4, 34, 18) Action = Typing, “O”; • (4, 34, 18) Action = Typing, “N”; • (10, 24, 80) Action = Pick up the pen; • (1, 18, 80) Action = Drawing, point = (330, 130).
  • 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES • Real life similarity • Object uniqueness and distinction • Three Dimensional Virtual Environment Size • Number of objects and their types • System Importance
  • 14. 3-D PASSWORD APPLICATIONS In Critical Systems: • Critical servers • Nuclear and military facilities • Airplanes and jet fighters In small virtual environments: • ATM • Personal Digital Assistance • Desktop Computers & laptop logins • Web Authentication
  • 15. ADVANTAGES OF 3-D PASSWORD • Several authentication schemes • Easy to memorize • Designed according to protected system • Highly flexible • Extremely strong • Provides secrets • 3D environment can be changed • Password can change easily. • Difficult to crack • Freedom to select • Difficult to share • 3D graphical password has no limit
  • 16. DISADVANTAGES •Difficult for blind people to use this technology. • Requires sophisticated computer technology. • Expensive. • A lot of program coding is required.
  • 17. ATTACKS AND COUNTER MEASURES • Brute Force Attack a) Time required to login b) Cost of attacks • Well Studied Attack • Shoulder Surfing Attack • Timing attack
  • 18. CONCLUSION • 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. • Design of the 3D virtual environment is the selection of objects inside the environment and the object's type reflect the resulted password space • Password space is very large compared to any existing authentication schemes •It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements • Designing a simple and easy to use 3D virtual environment is a factor that leads to a higher user acceptability of a 3D password system.