SlideShare a Scribd company logo
PAGE 1
Company Proprietary and Confidential
Company Proprietary and Confidential
For more secure authentication
Sk. Saddam Ahmed
M.TECH in Computer Science & Engineering
Class Roll No : 02
Session : 2014-15
Semester : 2
BY
PAGE 2
Company Proprietary and Confidential
Company Proprietary and Confidential
INDEX
• Authentication Slide 3
• Common Authentication Techniques Slide 4
• Drawbacks of Common Authentication Techniques Slide 5
• 3D Password Scheme with Example Slide 6-7
• 3D Password Scheme Selection and Inputs Slide 8
• Formal View of 3D Password Scheme Slide 9
• Snapshot of the concept of 3d-Virtual Environment Slide 10
• 3D Virtual Environment Design Guidelines Slide 11
• 3D Password Advantages and Disadvantages Slide 12
• Attacks on 3D Password Slide 13
• 3D Password Application Areas Slide 14
Slide NoPresentation Topics
PAGE 3
Company Proprietary and Confidential
Company Proprietary and Confidential
Authentication
• Authentication is a process of validating who are you to whom you claimed
to be.
• Human authentication techniques are as follows:
1. Knowledge Base (What you know)
2. Token Based(what you have)
3. Biometrics(what you are)
Human
Authentication
Techniques
Knowledge Base
( What you know )
Token Based
( What you have )
Biometrics
( What you are)
Textual Password
Graphical Password
ATM Card
Keys
ID Cards
Fingerprints,Palmprint
Hand Geometry
Face,iris,voice,retina
Human Authentication
Techniques
PAGE 4
Company Proprietary and Confidential
Company Proprietary and Confidential
Common Authentication Techniques used in
computer world
1. Textual Passwords(Recall Based)-:Recall what you have
created before.
2. Graphical Passwords:
(Recall Based + Recognition Based).
3. Token Based : ATM Cards, Keys , ID Cards
4. Biometric Passwords : fingerprints, palm prints, hand
geometry, face recognition, voice recognition, iris
recognition, and retina recognition
PAGE 5
Company Proprietary and Confidential
Company Proprietary and Confidential
Drawbacks of Common Authentication Techniques
Textual Password:
• Textual Passwords should be easy to remember at the same time hard to guess.
• Full password space for 8 characters consisting of both numbers and characters is at most
2 X 10¹⁴.
• From an research 25% of the passwords out of 15,000 users can guessed correctly by
using brute force dictionary.
Graphical Password :
• Graphical passwords can be easily recorded but some schemes take a long time to perform.
Token Password: Most unsecured one, if stolen can breech through any security levels.
Biometric Password:
• One main drawback of applying biometric is its intrusiveness upon a user’s personal
characteristic .
• Retina biometrical recognition schemes require the user to willingly subject their eyes to a low-
intensity infrared light so specified environment is required.
• In addition, most biometric systems require a special scanning device to authenticate users,
which is not applicable for remote and Internet users.
PAGE 6
Company Proprietary and Confidential
Company Proprietary and Confidential
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL
+ TOKENS
+ BIOMETRIC
In one authentication system
 The 3D password presents a virtual environment containing various virtual
objects.
 The user walks through the environment and interacts with the objects .
 The 3d Password is simply the combination and sequence of user interactions
that occur in the 3D environment.
PAGE 7
Company Proprietary and Confidential
Company Proprietary and Confidential
Example of 3D-Password
PAGE 8
Company Proprietary and Confidential
Company Proprietary and Confidential
3D Password selection and Inputs
Virtual objects can be any object we encounter in real life:
• A computer with which the user can type;
• A fingerprint reader that requires the user’s fingerprint;
• A biometrical recognition device;
• A paper or a white board that a user can write, sign, or Draw on;
• An automated teller machine (ATM) that requests a token;
• A light that can be switched on/off;
• A television or radio where channels can be selected;
• A staple that can be punched;
• A car that can be driven;
• A book that can be moved from one place to another;
• Any graphical password scheme;
• Any real-life object;
• Any upcoming authentication scheme
PAGE 9
Company Proprietary and Confidential
Company Proprietary and Confidential
For Example :
Let us assume the user enters a virtual office then performs the following action:
 (10,24,91) Action=Open office door
 (10,24,91) Action=Close office door
 (4,34,18) Action=Typing,”C”
 (4,34,18) Action=Typing,”O”
 (4,34,18)Action=Typing,”N”
 (10,24,80)Action=Pick up the pen
 (1,18,80)Action=Draw point=(330,130)
3D Password selection and Inputs
( Formal View )
 Let us consider a 3-D virtual environment space of size G x G x G.
 The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . ,
G] x [1, . . . , G] x [1, . . . , G].
 The objects are distributed in the 3-D virtual environment with unique (x, y, z)
coordinates.
 We assume that the user can navigate into the 3-D virtual environment and interact
with the objects using any input device such as a mouse, keyboard, fingerprint
scanner, iris scanner, stylus, card reader, and microphone.
PAGE 10
Company Proprietary and Confidential
Company Proprietary and Confidential
(a) Snapshot of a proof-of-concept 3-D virtual environment, where the
user is typing a textual password on a virtual computer as a part of the
user’s 3-D password. (b) Snapshot of a proof-of-concept virtual art
gallery, which contains 36 pictures and six computers
(a) (b)
Snapshot of the concept of 3d-Virtual
Environment
PAGE 11
Company Proprietary and Confidential
Company Proprietary and Confidential
3-D Virtual Environment Design
Guidelines
State diagram of a possible
3-D password application
Design Guidelines
1. Real-life similarity.
2. Object uniqueness and distinction.
3. Three-dimensional virtual
environment.
4. Number of objects (items) and their
types .
5. System importance.
PAGE 12
Company Proprietary and Confidential
Company Proprietary and Confidential
3D Passwords Advantages & Disadvantages
 Flexibility:3D Passwords allows Multifactor authentication biometric ,
textual passwords can be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited passwords possibility.
 Ease to Memorize: can be remembered in the form of short story.
 Respect of Privacy: Organizers can select authentication schemes that
respect users privacy.
 Difficult for blind people to use this technology.
 Requires sophisticated computers technology expensive.
 A lot of program coding is required.
Advantages
Disadvantages
PAGE 13
Company Proprietary and Confidential
Company Proprietary and Confidential
Attacks and Countermeasures
• Brute Force Attack.
• Well Studied Attack
• Shoulder Surfing Attacks
• Timing Attack
PAGE 14
Company Proprietary and Confidential
Company Proprietary and Confidential
3D Password Application Areas
• Critical Servers
• Nuclear and military Stations
• Airplanes and Jet Fighters
• ATMs, Desktop and Laptop Logins, Web
Authentication
PAGE 15
Company Proprietary and Confidential
Company Proprietary and Confidential
Thank
You

More Related Content

What's hot

SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3D password
3D password3D password
3D password
Jaya Sinha
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D password
3D password3D password
3D password
anuradha srivastava
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 

What's hot (20)

3d password
3d password3d password
3d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password 3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D password
3D password3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D password
3D password3D password
3D password
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
3d password
3d password3d password
3d password
shivi123456
 
3 d password
3 d password3 d password
3 d password
Murlidhar Sarda
 
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
screen-less displays
screen-less displays screen-less displays
screen-less displays
Bhumika Varshney
 
Screenless display
Screenless displayScreenless display
Screenless display
chnaveed
 
3 d internet
3 d internet3 d internet
3 d internet
Ankur Prakash Singh
 
Shtanchaev_SPEKTR
Shtanchaev_SPEKTRShtanchaev_SPEKTR
Shtanchaev_SPEKTR
shtanchaev
 
Special Photo Effects
Special Photo EffectsSpecial Photo Effects
Special Photo Effects
Marco Belzoni
 
GLSL Shading with OpenSceneGraph
GLSL Shading with OpenSceneGraphGLSL Shading with OpenSceneGraph
GLSL Shading with OpenSceneGraph
Mike Weiblen
 
Radiosity algorithm
Radiosity algorithmRadiosity algorithm
Radiosity algorithm
Hung Sun
 
Pelican Mapping - FOSS4G 2011
Pelican Mapping - FOSS4G 2011Pelican Mapping - FOSS4G 2011
Pelican Mapping - FOSS4G 2011
Glenn Waldron
 

Viewers also liked (16)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3d password
3d password3d password
3d password
 
3 d password
3 d password3 d password
3 d password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
screen-less displays
screen-less displays screen-less displays
screen-less displays
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Screenless display
Screenless displayScreenless display
Screenless display
 
3 d internet
3 d internet3 d internet
3 d internet
 
Shtanchaev_SPEKTR
Shtanchaev_SPEKTRShtanchaev_SPEKTR
Shtanchaev_SPEKTR
 
Special Photo Effects
Special Photo EffectsSpecial Photo Effects
Special Photo Effects
 
GLSL Shading with OpenSceneGraph
GLSL Shading with OpenSceneGraphGLSL Shading with OpenSceneGraph
GLSL Shading with OpenSceneGraph
 
Radiosity algorithm
Radiosity algorithmRadiosity algorithm
Radiosity algorithm
 
Pelican Mapping - FOSS4G 2011
Pelican Mapping - FOSS4G 2011Pelican Mapping - FOSS4G 2011
Pelican Mapping - FOSS4G 2011
 

Similar to 3d password 23 mar 14

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02bujjiflute
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
3 d ppt
3 d ppt3 d ppt
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
Tapesh Chalisgaonkar
 
Vivek
VivekVivek
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
Maheshbabu319
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
Nirzar Bhaidkar
 

Similar to 3d password 23 mar 14 (20)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Vivek
VivekVivek
Vivek
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
3d pass words
3d pass words3d pass words
3d pass words
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 

Recently uploaded

De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 

Recently uploaded (20)

De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 

3d password 23 mar 14

  • 1. PAGE 1 Company Proprietary and Confidential Company Proprietary and Confidential For more secure authentication Sk. Saddam Ahmed M.TECH in Computer Science & Engineering Class Roll No : 02 Session : 2014-15 Semester : 2 BY
  • 2. PAGE 2 Company Proprietary and Confidential Company Proprietary and Confidential INDEX • Authentication Slide 3 • Common Authentication Techniques Slide 4 • Drawbacks of Common Authentication Techniques Slide 5 • 3D Password Scheme with Example Slide 6-7 • 3D Password Scheme Selection and Inputs Slide 8 • Formal View of 3D Password Scheme Slide 9 • Snapshot of the concept of 3d-Virtual Environment Slide 10 • 3D Virtual Environment Design Guidelines Slide 11 • 3D Password Advantages and Disadvantages Slide 12 • Attacks on 3D Password Slide 13 • 3D Password Application Areas Slide 14 Slide NoPresentation Topics
  • 3. PAGE 3 Company Proprietary and Confidential Company Proprietary and Confidential Authentication • Authentication is a process of validating who are you to whom you claimed to be. • Human authentication techniques are as follows: 1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are) Human Authentication Techniques Knowledge Base ( What you know ) Token Based ( What you have ) Biometrics ( What you are) Textual Password Graphical Password ATM Card Keys ID Cards Fingerprints,Palmprint Hand Geometry Face,iris,voice,retina Human Authentication Techniques
  • 4. PAGE 4 Company Proprietary and Confidential Company Proprietary and Confidential Common Authentication Techniques used in computer world 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based + Recognition Based). 3. Token Based : ATM Cards, Keys , ID Cards 4. Biometric Passwords : fingerprints, palm prints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition
  • 5. PAGE 5 Company Proprietary and Confidential Company Proprietary and Confidential Drawbacks of Common Authentication Techniques Textual Password: • Textual Passwords should be easy to remember at the same time hard to guess. • Full password space for 8 characters consisting of both numbers and characters is at most 2 X 10¹⁴. • From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary. Graphical Password : • Graphical passwords can be easily recorded but some schemes take a long time to perform. Token Password: Most unsecured one, if stolen can breech through any security levels. Biometric Password: • One main drawback of applying biometric is its intrusiveness upon a user’s personal characteristic . • Retina biometrical recognition schemes require the user to willingly subject their eyes to a low- intensity infrared light so specified environment is required. • In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users.
  • 6. PAGE 6 Company Proprietary and Confidential Company Proprietary and Confidential 3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL + TOKENS + BIOMETRIC In one authentication system  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects .  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment.
  • 7. PAGE 7 Company Proprietary and Confidential Company Proprietary and Confidential Example of 3D-Password
  • 8. PAGE 8 Company Proprietary and Confidential Company Proprietary and Confidential 3D Password selection and Inputs Virtual objects can be any object we encounter in real life: • A computer with which the user can type; • A fingerprint reader that requires the user’s fingerprint; • A biometrical recognition device; • A paper or a white board that a user can write, sign, or Draw on; • An automated teller machine (ATM) that requests a token; • A light that can be switched on/off; • A television or radio where channels can be selected; • A staple that can be punched; • A car that can be driven; • A book that can be moved from one place to another; • Any graphical password scheme; • Any real-life object; • Any upcoming authentication scheme
  • 9. PAGE 9 Company Proprietary and Confidential Company Proprietary and Confidential For Example : Let us assume the user enters a virtual office then performs the following action:  (10,24,91) Action=Open office door  (10,24,91) Action=Close office door  (4,34,18) Action=Typing,”C”  (4,34,18) Action=Typing,”O”  (4,34,18)Action=Typing,”N”  (10,24,80)Action=Pick up the pen  (1,18,80)Action=Draw point=(330,130) 3D Password selection and Inputs ( Formal View )  Let us consider a 3-D virtual environment space of size G x G x G.  The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . , G] x [1, . . . , G] x [1, . . . , G].  The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates.  We assume that the user can navigate into the 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone.
  • 10. PAGE 10 Company Proprietary and Confidential Company Proprietary and Confidential (a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the user’s 3-D password. (b) Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers (a) (b) Snapshot of the concept of 3d-Virtual Environment
  • 11. PAGE 11 Company Proprietary and Confidential Company Proprietary and Confidential 3-D Virtual Environment Design Guidelines State diagram of a possible 3-D password application Design Guidelines 1. Real-life similarity. 2. Object uniqueness and distinction. 3. Three-dimensional virtual environment. 4. Number of objects (items) and their types . 5. System importance.
  • 12. PAGE 12 Company Proprietary and Confidential Company Proprietary and Confidential 3D Passwords Advantages & Disadvantages  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.  Difficult for blind people to use this technology.  Requires sophisticated computers technology expensive.  A lot of program coding is required. Advantages Disadvantages
  • 13. PAGE 13 Company Proprietary and Confidential Company Proprietary and Confidential Attacks and Countermeasures • Brute Force Attack. • Well Studied Attack • Shoulder Surfing Attacks • Timing Attack
  • 14. PAGE 14 Company Proprietary and Confidential Company Proprietary and Confidential 3D Password Application Areas • Critical Servers • Nuclear and military Stations • Airplanes and Jet Fighters • ATMs, Desktop and Laptop Logins, Web Authentication
  • 15. PAGE 15 Company Proprietary and Confidential Company Proprietary and Confidential Thank You