SlideShare a Scribd company logo
5/1/2014 1
Presentation By: SHUBHAM RUNGTA
III year- CSE (Section-B2)
Introduction
Authentication Techniques.
Authentication Schemes.
Drawbacks Of Common Use Authentication Techniques.
3D-Password.
Virtual Environment.
Objective Of 3d Password
Short Video.
3D-Password Secure Authentication Scheme
• Attacks & Countermeasures
• Applications
• Advantages And Disadvantages
Future Scope.
Conclusion.
Acknowledgement.
References.
 Authentication is one of the most important security service provided to system by the different authentication
schemes or algorithms.
 To protect any system authentication must be provided, so that only authorized persons can have right to use or
handle that system & data related to that system securely.
 There are many authentication algorithms are available some are effective & secure but having some drawback.
 Previously there are many authentication techniques were introduced such as Graphical password, Text
password, Biometric authentication, etc.
5/1/2014 3
1. Knowledge based: means what you know.
Textual password is the best example of this
authentication scheme.
2. Token based: means what you have.
This includes Credit cards, ATM cards, etc
as an example.
GENERALLY, There Are Four Types Of AUTHENTICATION TECHNIQUES
Are Available Such As:
5/1/2014 4
Types Continued…
3. Biometrics: means what you are.
Includes Thumb impression, etc.
4. Recognition Based: means what you
recognize. Includes graphical password,
iris recognition, face recognition, etc
5/1/2014
5
Ideally there are two types of Authentication schemes are available according
to nature of scheme & techniques used, those types are :-
1) Recall based:
User need to recall or remember his/her password which is created before. Knowledge
based authentication is a part of this technique, E.g. Textual password, graphical
password etc. this technique is commonly used all over the world where security needed.
2) Recognition based:
User need to identify, recognize password created before. Recognition based
authentication can be used in graphical password.
Generally this technique is not use much more as Recall based is used.
5/1/2014 6
Still both recall based & recognition based authentication techniques having some drawbacks
& limitations when they are used separately or used single authentication scheme at a time.
Drawbacks:- Current authentication systems suffer from many
weaknesses
 Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or
brute force attacks.
 Smart cards or tokens can be stolen.
 We don‘t use biometric scheme because biometric
having some major drawbacks (like h/w cost is more).
5/1/2014 7
3D-Password
8



3D-Password
5/1/2014 9
3D-Password
5/1/2014 10
For authentication with 3D password a new virtual environment is introduced called as
3D virtual environment where user navigate , moving in 3D virtual environment to create
a password which is based on both the schemes.
There is a 3D Virtual Environment:-
snapshot of Art Gallery snapshot of study room snapshot of weather forecasting office
11
To provide more secure authentication technique than existing one.
To design & develop more user friendly & easier authentication scheme
and giving user to freedom of selecting more than one password scheme as
single system.
To overcome the drawbacks & limitations of previously existing systems
(textual password, graphical password etc. )
New scheme should be combination of recall-, recognition -, biometrics-,
and token based authentication schemes.
Objective Of 3D Password?
5/1/2014 12
By: Fawaz A.
Alsulaiman, PhD
Researcher
&
Abdulmotaleb El
Saddik, Director
MCRLAb
Document
of
University
of
Ottawa
5/1/2014 13
3D PASSWORD
SECURE
AUTHENTICATION
SCHEME
5/1/2014 14
A. Attacks & Countermeasures:
1) Timing Attacks:
This attack is based on how much time required completing successful sign-in using
3D password scheme.
2) Brute force Attacks
In this kind of attacks the attacker has to try n number of possibilities of 3D Password.
5/1/2014 15
A. Attacks & Countermeasures:……………continued
3) Well-studied attacks
• In this attack attacker has to study whole password scheme.
• After studied about scheme the attacker tries combination of different attacks on
scheme.
• As 3d password scheme is multi-factor & multi-password authentication scheme,
attacker fail to studied whole scheme. this attacks also not much effective against
3D password scheme
5/1/2014 16
4) Key logger
• In this attack attacker install as software called key logger on system where
authentication scheme is used.
• This software stores text entered through keyboard & those text are stored in text
file.
• In this way this attacks is more effective & useful for only textual password, but as
3D password is multi password authentication scheme.
• So that this kind of attacks are not much effective in this case
A. Attacks & Countermeasures:……………continued
5/1/2014 17
A. Attacks & Countermeasures:……………continued
5) Shoulder Surfing attacks
• Attacker uses camera for capturing & recording of 3D password.
• This attack is more effective than any other attacks on 3D password.
• So that 3D password must be performed in a secure place where this attack can‘t
be performed.
• Shoulder surfing attacks is still effective & easily possible against 3D password
5/1/2014 18
1) Networking
Networking involves many areas of computer networks like client-server architecture,
critical servers, etc. To provide more security to server of this architecture 3D password can
be used. It very efficient & more secure way to keep data or important information secure
from unauthorized people. For email applications 3D password is most secure & easier
scheme to used.
2) Nuclear & military areas
3) Airplane & jetfighters
4) Other areas :we can use 3d password authentication scheme to areas such as ATM, Cyber
cafes, Industries (for data security), Laptop‘s or PC‘s, critical servers, web services, etc. &
many more
B. APPLICATIONS
5/1/2014 19
 3D Password scheme is combination of re-call based, recognized based into single
authentication technique.
 Due to use of multiple schemes into one scheme password space is increased to great
extend.
 3D graphical password has no limit.
 Password can remember easily.
 More secure authentication scheme over currently available schemes.
C . Advantages And Disadvantages
Advantages :
5/1/2014 20
 Time and memory requirement is large.
 Shoulder-suffering attack is still can affect the schema.
 More Expensive
 Difficult for blind people to use this technology.
 Requires sophisticated computer technology.
 A lot of program coding is required.
C . Advantages And Disadvantages
…continued
Disadvantages :
5/1/2014 21
Future
Scope Time and memory requirement can reduce.
 Shoulder-suffering attack is still can be remove.
 More Expensive to less expensive
 Allow the blind people to use this technology.
 A lot of program coding can be reduce.
5/1/2014 22
 Commonly used authentication schemes are vulnerable to attacks.
 3D Password is a multifactor authentication scheme.
 Design of 3D virtual environment, selection of objects inside the
environment, and the object type reflects the resulted password
space.
 User’s choice and decision to construct the desired and preferred
3D password.
5/1/2014 23
ACKNOWLEDGEMENT
 I would like to that adroit person who gave us the word “Thank” , if he would not then
how would I thank to my friends ,faculties and family for their motivation and
encouragement.
 I would like to thank ABES Engineering College to provide me the facilities and resources
to complete this presentation.
 Thanks to Engineers and Inventors for bringing us to meet the modern tactics and
techniques.
 I would like thank the Almighty God without whose grace this paper would not have
achieved success. 5/1/2014 24
[1].Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D Graphical Password
Schema‖, IEEE International Conference on Virtual Environments, Human-Computer
Interfaces, and Measurement Systems, July 2006.
[2].Duhan Pooja, Gupta Shilpi , Sangwan Sujata, & Gulati Vinita, ―SECURED
AUTHENTICATION: 3D PASSWORD‖, I.J.E.M.S., VOL.3(2),242 – 245, 2012.
[3].Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar & Pranjal Rathod, Secure Authentication
with 3D Password‖ , IJESIT, Volume 2, Issue 2, ISSN: 2319-5967 ISO 9001:2008
[4].Tejal Kognule, Yugandhara Thumbre, Snehal Kognule-3D PASSWORD, ICACACT,
IJCA
[5].en.wikipedia.org/wiki/3-D_Secure
[6] www.google.com
5/1/2014 25
Your Queries????
5/1/2014
Thank you
Very much!!
5/1/2014 28

More Related Content

What's hot

3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
JYoTHiSH o.s
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3D password
3D password3D password
3D password
anuradha srivastava
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abhijit Akotkar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 

What's hot (20)

3D-Password
3D-Password 3D-Password
3D-Password
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password3D password
3D password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
3D Password
3D Password3D Password
3D Password
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
3d password
3d password3d password
3d password
shivi123456
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
shalini singh
 
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held
 
14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in EducationVala Afshar
 
Seminar_3D INTERNET
Seminar_3D INTERNETSeminar_3D INTERNET
Seminar_3D INTERNET
Preeti Rajak
 
Seminar on 3 d internet
Seminar on 3 d internetSeminar on 3 d internet
Seminar on 3 d internetPabitra Padhy
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
Khwaja Aamer
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
Parth Godhani
 

Viewers also liked (18)

3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3d password
3d password3d password
3d password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
Karsten Held: Internet Of Things (IOT), SmartBuilding & SmartHome Research (J...
 
14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education14 Google Glass Innovative Use Cases in Education
14 Google Glass Innovative Use Cases in Education
 
Seminar_3D INTERNET
Seminar_3D INTERNETSeminar_3D INTERNET
Seminar_3D INTERNET
 
Seminar on 3 d internet
Seminar on 3 d internetSeminar on 3 d internet
Seminar on 3 d internet
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
3d internet
3d internet3d internet
3d internet
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 

Similar to 3D Password

3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
Jai Chaudhary
 
3 d password
3 d password3 d password
3 d password
Izhar Cheema
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
gadisagemechu1
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
IRJET Journal
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
Mr Smith
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
eSAT Publishing House
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_systemSameer Dighe
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
WilheminaRossi174
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 

Similar to 3D Password (20)

3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3 d password
3 d password3 d password
3 d password
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 

3D Password

  • 1. 5/1/2014 1 Presentation By: SHUBHAM RUNGTA III year- CSE (Section-B2)
  • 2. Introduction Authentication Techniques. Authentication Schemes. Drawbacks Of Common Use Authentication Techniques. 3D-Password. Virtual Environment. Objective Of 3d Password Short Video. 3D-Password Secure Authentication Scheme • Attacks & Countermeasures • Applications • Advantages And Disadvantages Future Scope. Conclusion. Acknowledgement. References.
  • 3.  Authentication is one of the most important security service provided to system by the different authentication schemes or algorithms.  To protect any system authentication must be provided, so that only authorized persons can have right to use or handle that system & data related to that system securely.  There are many authentication algorithms are available some are effective & secure but having some drawback.  Previously there are many authentication techniques were introduced such as Graphical password, Text password, Biometric authentication, etc. 5/1/2014 3
  • 4. 1. Knowledge based: means what you know. Textual password is the best example of this authentication scheme. 2. Token based: means what you have. This includes Credit cards, ATM cards, etc as an example. GENERALLY, There Are Four Types Of AUTHENTICATION TECHNIQUES Are Available Such As: 5/1/2014 4
  • 5. Types Continued… 3. Biometrics: means what you are. Includes Thumb impression, etc. 4. Recognition Based: means what you recognize. Includes graphical password, iris recognition, face recognition, etc 5/1/2014 5
  • 6. Ideally there are two types of Authentication schemes are available according to nature of scheme & techniques used, those types are :- 1) Recall based: User need to recall or remember his/her password which is created before. Knowledge based authentication is a part of this technique, E.g. Textual password, graphical password etc. this technique is commonly used all over the world where security needed. 2) Recognition based: User need to identify, recognize password created before. Recognition based authentication can be used in graphical password. Generally this technique is not use much more as Recall based is used. 5/1/2014 6
  • 7. Still both recall based & recognition based authentication techniques having some drawbacks & limitations when they are used separately or used single authentication scheme at a time. Drawbacks:- Current authentication systems suffer from many weaknesses  Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.  Smart cards or tokens can be stolen.  We don‘t use biometric scheme because biometric having some major drawbacks (like h/w cost is more). 5/1/2014 7
  • 11. For authentication with 3D password a new virtual environment is introduced called as 3D virtual environment where user navigate , moving in 3D virtual environment to create a password which is based on both the schemes. There is a 3D Virtual Environment:- snapshot of Art Gallery snapshot of study room snapshot of weather forecasting office 11
  • 12. To provide more secure authentication technique than existing one. To design & develop more user friendly & easier authentication scheme and giving user to freedom of selecting more than one password scheme as single system. To overcome the drawbacks & limitations of previously existing systems (textual password, graphical password etc. ) New scheme should be combination of recall-, recognition -, biometrics-, and token based authentication schemes. Objective Of 3D Password? 5/1/2014 12
  • 13. By: Fawaz A. Alsulaiman, PhD Researcher & Abdulmotaleb El Saddik, Director MCRLAb Document of University of Ottawa 5/1/2014 13
  • 15. A. Attacks & Countermeasures: 1) Timing Attacks: This attack is based on how much time required completing successful sign-in using 3D password scheme. 2) Brute force Attacks In this kind of attacks the attacker has to try n number of possibilities of 3D Password. 5/1/2014 15
  • 16. A. Attacks & Countermeasures:……………continued 3) Well-studied attacks • In this attack attacker has to study whole password scheme. • After studied about scheme the attacker tries combination of different attacks on scheme. • As 3d password scheme is multi-factor & multi-password authentication scheme, attacker fail to studied whole scheme. this attacks also not much effective against 3D password scheme 5/1/2014 16
  • 17. 4) Key logger • In this attack attacker install as software called key logger on system where authentication scheme is used. • This software stores text entered through keyboard & those text are stored in text file. • In this way this attacks is more effective & useful for only textual password, but as 3D password is multi password authentication scheme. • So that this kind of attacks are not much effective in this case A. Attacks & Countermeasures:……………continued 5/1/2014 17
  • 18. A. Attacks & Countermeasures:……………continued 5) Shoulder Surfing attacks • Attacker uses camera for capturing & recording of 3D password. • This attack is more effective than any other attacks on 3D password. • So that 3D password must be performed in a secure place where this attack can‘t be performed. • Shoulder surfing attacks is still effective & easily possible against 3D password 5/1/2014 18
  • 19. 1) Networking Networking involves many areas of computer networks like client-server architecture, critical servers, etc. To provide more security to server of this architecture 3D password can be used. It very efficient & more secure way to keep data or important information secure from unauthorized people. For email applications 3D password is most secure & easier scheme to used. 2) Nuclear & military areas 3) Airplane & jetfighters 4) Other areas :we can use 3d password authentication scheme to areas such as ATM, Cyber cafes, Industries (for data security), Laptop‘s or PC‘s, critical servers, web services, etc. & many more B. APPLICATIONS 5/1/2014 19
  • 20.  3D Password scheme is combination of re-call based, recognized based into single authentication technique.  Due to use of multiple schemes into one scheme password space is increased to great extend.  3D graphical password has no limit.  Password can remember easily.  More secure authentication scheme over currently available schemes. C . Advantages And Disadvantages Advantages : 5/1/2014 20
  • 21.  Time and memory requirement is large.  Shoulder-suffering attack is still can affect the schema.  More Expensive  Difficult for blind people to use this technology.  Requires sophisticated computer technology.  A lot of program coding is required. C . Advantages And Disadvantages …continued Disadvantages : 5/1/2014 21
  • 22. Future Scope Time and memory requirement can reduce.  Shoulder-suffering attack is still can be remove.  More Expensive to less expensive  Allow the blind people to use this technology.  A lot of program coding can be reduce. 5/1/2014 22
  • 23.  Commonly used authentication schemes are vulnerable to attacks.  3D Password is a multifactor authentication scheme.  Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.  User’s choice and decision to construct the desired and preferred 3D password. 5/1/2014 23
  • 24. ACKNOWLEDGEMENT  I would like to that adroit person who gave us the word “Thank” , if he would not then how would I thank to my friends ,faculties and family for their motivation and encouragement.  I would like to thank ABES Engineering College to provide me the facilities and resources to complete this presentation.  Thanks to Engineers and Inventors for bringing us to meet the modern tactics and techniques.  I would like thank the Almighty God without whose grace this paper would not have achieved success. 5/1/2014 24
  • 25. [1].Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D Graphical Password Schema‖, IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems, July 2006. [2].Duhan Pooja, Gupta Shilpi , Sangwan Sujata, & Gulati Vinita, ―SECURED AUTHENTICATION: 3D PASSWORD‖, I.J.E.M.S., VOL.3(2),242 – 245, 2012. [3].Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar & Pranjal Rathod, Secure Authentication with 3D Password‖ , IJESIT, Volume 2, Issue 2, ISSN: 2319-5967 ISO 9001:2008 [4].Tejal Kognule, Yugandhara Thumbre, Snehal Kognule-3D PASSWORD, ICACACT, IJCA [5].en.wikipedia.org/wiki/3-D_Secure [6] www.google.com 5/1/2014 25
  • 26.