3D PASSWORD
BASED
AUTHENTICATION
N.PUJITHA
1V BTECH EIE
REG NO:16711A1019
This Photo by Unknown Author
is licensed under CC BY
CONTENTS
 INTRODUCTION
 NEED AND PURPOSE
 EXISTING AUTHENTICATION TECHNIQUES
 DRAWBACKS
 HOW 3D PASSWORD WORKS?
 VIRTUAL ENVIRONMENT
 STATE DIAGRAM
 ADVANTAGES
 DISADVANTAGES
 APPLICATIONS
 COUNTER ATTACKS AND MEASURE
 CONCLUSION
INTRODUCTION
The 3-D password is a multifactor authentication
scheme.
It can combine all existing authentication schemes into
a single 3-D virtual environment.
The 3-D virtual environment contains several objects or
items with which the user can interact.
This type of interaction varies from one item to
another.
The 3-D password is constructed by observing the
actions and interactions of the user by observing the
sequence of such actions.
NEED AND PURPOSE
 NEED:
 Current Authentication suffers from many weakness
because simple password is only based on human memory.
So, now a days a new technique are use called “3D
password “.
PURPOSE:
 3D Password provide secure services with a password
to protect your online transactions.
Easy to access.
EXISTING AUTHENTICATION
TECHNIQUES
EXISTING AUTHENTICATION
TECHNIQUES
KNOWLEDGE BASED:
1. Password
2. Pattern
3. Pin
TOKEN BASED:
1. ATM Cards
2. Smart cards
EXISTING AUTHENTICATION
TECHNIQUES
BIO METRICS:
1. Thumb impression
2. Iris
3. Voice
4. Face recognition
DRAWBACKS OF EXISTING
AUTHENTICATION
TECHNIQUESKNOWLEDGE BASED:
a) Easy to hack
b) Hard to remember.
TOKEN BASED:
a) Availability of duplicate smart cards and ATM cards.
BIOMETRICS:
a) Exposure of retina in IR rays.
3D-PASSWORD
A 3D password is a multifactor authentication scheme that
combines:
RECOGNISATION
RECALL
TOKENS
BIOMETICS
In one authentication system.
WORKING OF 3D PASSWORD SCHEME
VIRTUAL ENVIRONMENT
3D password presents a “VIRTUAL ENVIRONMENT’’
containing various virtual objects.
The user navigates through this environment and interacts with the
with the objects.
The user actions,interactions and inputs towards the objects or
objects or toward the 3D virtual environment creates the Users 3D
Users 3D password.
VIRTUAL ENVIRONMENT
VIRTUAL OBJECTS
A Computer with which the user can type.
A Light that can be switched on or off.
A Television or radio where channels can be selected.
A car that can be driven.
A Graphical password scheme.
An ATM machine that requires a token.
SYSTEM IMPLEMENTATION
The action towards an object that exists in
location(x1,y1,z1) is different from action towards an
another object at (x,y2,z2).
To perform the legitimate 3D password the user must
follow the same scenario performed by the legitimate user.
This means interacting with the same objects that reside
at exact location and perform the exact actions in the
proper sequence.
STATE DIAGRAM
ADVANTAGES
Provide high security.
Flexible, as it provides multifactor authentication such as
token based, knowledge based, biometrics.
Provide infinite number of password possibilities.
Ease to change password anytime.
Helps to keep lot of personal details.
Due to the use of multiple schemes in one scheme
password space is increased to great extent.
DISADVANTAGES
Difficult for blind people to use this technology.
A lot of program coding is required.
Very expensive.
Time and memory requirement is large.
APPLICATIONS
Critical servers
Nuclear reactors
Military facilities
Airplanes
Jet fighters
Missile guiding
Networking
ATM
ATTACK AND COUNTER MEASURES
Brute Force Attack
Well studied Attack
Shoulder-surfing Attack
Timing Attack
Key logger
ATTACKS AND COUNTER MEASURES
BRUTE FORCE ATTACK:
The attacker has to try all possible 3D passwords,this kind of
attack is very difficult for the following reasons:
a) Time required to login
b) Cost of attacks
WELL STUDIED ATTACK:
a) The attacker tries to find the highest probable distribution of
3D passwords ,However to launch such an attack, the attacker
has to acquire knowledge of the most probable 3D password
distribution.
ATTACK AND COUNTER MEASURES
SHOULDER SURFING ATTACK:
a) An attacker uses a camera to record the user’s 3D password, this attack
is the most successful type of attack against D passwords and some
other graphical passwords.
TIMING ATTACK:
a) In this attack,attacker observes how long it takes the
legitimate user to perform a correct sign-in using 3D
password,this observation gives the attacker an indication of
the legitimate user’s 3D password length.
CONCLUSION
The authentication can be improved with 3D password,
because the unauthorized person may not interact with
same object at a particular location as the legitimate user.
It is difficult to crack because it has no fixed number of
steps and a particular procedure.
Added with biometrics and token verification this scheme
becomes almost unbreakable.
3D PASSWORD
3D PASSWORD

3D PASSWORD

  • 1.
    3D PASSWORD BASED AUTHENTICATION N.PUJITHA 1V BTECHEIE REG NO:16711A1019 This Photo by Unknown Author is licensed under CC BY
  • 2.
    CONTENTS  INTRODUCTION  NEEDAND PURPOSE  EXISTING AUTHENTICATION TECHNIQUES  DRAWBACKS  HOW 3D PASSWORD WORKS?  VIRTUAL ENVIRONMENT  STATE DIAGRAM  ADVANTAGES  DISADVANTAGES  APPLICATIONS  COUNTER ATTACKS AND MEASURE  CONCLUSION
  • 3.
    INTRODUCTION The 3-D passwordis a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. The 3-D virtual environment contains several objects or items with which the user can interact. This type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user by observing the sequence of such actions.
  • 4.
    NEED AND PURPOSE NEED:  Current Authentication suffers from many weakness because simple password is only based on human memory. So, now a days a new technique are use called “3D password “. PURPOSE:  3D Password provide secure services with a password to protect your online transactions. Easy to access.
  • 5.
  • 6.
    EXISTING AUTHENTICATION TECHNIQUES KNOWLEDGE BASED: 1.Password 2. Pattern 3. Pin TOKEN BASED: 1. ATM Cards 2. Smart cards
  • 7.
    EXISTING AUTHENTICATION TECHNIQUES BIO METRICS: 1.Thumb impression 2. Iris 3. Voice 4. Face recognition
  • 8.
    DRAWBACKS OF EXISTING AUTHENTICATION TECHNIQUESKNOWLEDGEBASED: a) Easy to hack b) Hard to remember. TOKEN BASED: a) Availability of duplicate smart cards and ATM cards. BIOMETRICS: a) Exposure of retina in IR rays.
  • 9.
    3D-PASSWORD A 3D passwordis a multifactor authentication scheme that combines: RECOGNISATION RECALL TOKENS BIOMETICS In one authentication system.
  • 10.
    WORKING OF 3DPASSWORD SCHEME
  • 11.
    VIRTUAL ENVIRONMENT 3D passwordpresents a “VIRTUAL ENVIRONMENT’’ containing various virtual objects. The user navigates through this environment and interacts with the with the objects. The user actions,interactions and inputs towards the objects or objects or toward the 3D virtual environment creates the Users 3D Users 3D password.
  • 12.
  • 13.
    VIRTUAL OBJECTS A Computerwith which the user can type. A Light that can be switched on or off. A Television or radio where channels can be selected. A car that can be driven. A Graphical password scheme. An ATM machine that requires a token.
  • 14.
    SYSTEM IMPLEMENTATION The actiontowards an object that exists in location(x1,y1,z1) is different from action towards an another object at (x,y2,z2). To perform the legitimate 3D password the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence.
  • 16.
  • 17.
    ADVANTAGES Provide high security. Flexible,as it provides multifactor authentication such as token based, knowledge based, biometrics. Provide infinite number of password possibilities. Ease to change password anytime. Helps to keep lot of personal details. Due to the use of multiple schemes in one scheme password space is increased to great extent.
  • 18.
    DISADVANTAGES Difficult for blindpeople to use this technology. A lot of program coding is required. Very expensive. Time and memory requirement is large.
  • 19.
    APPLICATIONS Critical servers Nuclear reactors Militaryfacilities Airplanes Jet fighters Missile guiding Networking ATM
  • 20.
    ATTACK AND COUNTERMEASURES Brute Force Attack Well studied Attack Shoulder-surfing Attack Timing Attack Key logger
  • 21.
    ATTACKS AND COUNTERMEASURES BRUTE FORCE ATTACK: The attacker has to try all possible 3D passwords,this kind of attack is very difficult for the following reasons: a) Time required to login b) Cost of attacks WELL STUDIED ATTACK: a) The attacker tries to find the highest probable distribution of 3D passwords ,However to launch such an attack, the attacker has to acquire knowledge of the most probable 3D password distribution.
  • 22.
    ATTACK AND COUNTERMEASURES SHOULDER SURFING ATTACK: a) An attacker uses a camera to record the user’s 3D password, this attack is the most successful type of attack against D passwords and some other graphical passwords. TIMING ATTACK: a) In this attack,attacker observes how long it takes the legitimate user to perform a correct sign-in using 3D password,this observation gives the attacker an indication of the legitimate user’s 3D password length.
  • 23.
    CONCLUSION The authentication canbe improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user. It is difficult to crack because it has no fixed number of steps and a particular procedure. Added with biometrics and token verification this scheme becomes almost unbreakable.