SlideShare a Scribd company logo
1 of 31
PRESENTED BY :
MANISHA SAINI
1. Password
2. Passphrase
3. Authentication
4. Drawbacks of Human Authentication Techniques
5. 3D password
6. Virtual Environment
7. Virtual Objects
8. System Implementation
9. Mathematical Concept Related to 3D password
10. Example
11. State Diagram
12. Working of 3D password
13. Programming languages
14. Attacks and Counter Measures
15. Advantages
16. Disadvantages
17. Applications
18. References
• A password is a word or string of characters
used for the authentication to prove identity.
• Password is basically an encryption
algorithms.
• It is 8-15 character or slightly more than that.
• Passwords are the first line of defense against
cyber criminals.
 It is the advanced version of password.
 It is a combination of words or simply
collection of password in a proper sequence.
 Length of passphrase is from 30-50 words or
more than that also.
 More secure than an ordinary password.
 Authentication is a process of validating who
are you to whom you are claimed to be.
 Human authentication techniques are :
1. Knowledge based (What you know)
2. Token based (What you have)
3. Biometrics (What you are)
(a) Pin
(b) Password
(c) Patterns
(a) Keys
(b) Passport
(c) Smart card
(d) ID proofs
(a) Face recognition
(b) Fingerprints
(c) Iris
(d) DNA
(e) Voice
(f) Hand geometry
(a) Easy to remember -> Easy to break
Hard to guess -> Hard to remember
(b) Vulnerable to attacks like dictionary attacks, brute force attacks etc.
(a) Duplicate keys, smart cards, ID proofs are easily available.
(a) Instructiveness to privacy.
(b) Resistance to exposure of retinas to IR rays.
(c) Hackers implement exact copy of your biometrics.
 The 3D password is a multifactor authentication
scheme that combine KNOWLEDGE BASED + TOKEN
BASED + BIOMETRICS in one authentication system.
 It presents a virtual environment containing various
virtual objects.
 It is simply the combination and sequence of user
interactions that occur in the 3D environment.
 The user walks through the environment and
interacts with the objects.
 More customizable and very interesting way of
authentication.
• A virtual environment is a computer-based simulated
environment.
• The 3D virtual environment consists of many items and
objects.
• It is created inside a 2D screen and is a real time scenario .
• Each item has different responses to action.
• The user actions, interactions and inputs towards the objects
or toward the 3D virtual environment creates the user’s 3D
password.
• Communication between users can range from text, graphical
icons, visual gesture, sound, and rarely, forms using touch,
voice command, and balance senses.
• 3D virtual environment affects the usability,
effectiveness and acceptability of a 3D
password system.
• 3D environment reflects the administration
needs and security requirements.
Virtual objects can be any objects we encounter in real life such as:
 A computer on which user can type.
 An ATM machine that requires a token (ATM card).
 A fingerprint reader that requires user fingerprints.
 A paper or white board on which user can write.
 A light that can be switched on/off.
 A television.
 A radio.
 A car that can be driven.
 A graphical password scheme.
 The action towards an object that exists in
location (x1,y1,z1) is different from action towards
an another object at (x2,y2,z2).
 To perform the legitimate 3D password the user
must follow the same scenario performed by the
legitimate user.
 This means interacting with the same objects
that reside at exact location and perform the exact
actions in the proper sequence.
1. Time Complexity :
Let us assume that A is the virtual 3D environment plotting and B is
algorithmic processing. Then,
Time complexity = Am + Bn
where ‘m’ is time required to communicate with system, and ‘n’ is time
required to process each algorithm in 3D environment.
2. Space Complexity:
• System include 3D virtual environment, so that each point in this
environment will having 3 co-ordinate values.
• Any point from 3D virtual environment is represented in the form
of (X, Y, Z). X, Y & Z are the coordinate values stored for particular
point.
• Space complexity = n3
3. Class Of Problem:
Three types of classes provided are:
(a) P class: A decision problem is in P if there is a known
polynomial-time algorithm to get that answer.
(b) NP-hard class: Decision problem is in NP if there is a known
polynomial-time algorithm for a non-deterministic machine to
get the answer.
(c) NP complete class: NP-complete if you can prove that (1) it‘s
in NP, and (2) show that it‘s poly-time reducible to a problem
already known to be NP-complete.
• Let us consider a 3D virtual environment space
of size G x G x G. The 3D environment space is
represented by the coordinates (x,y,z) ϵ [1,…,G] x
[1,…,G] x [1,…,G].
• The objects are distributed in the 3D virtual
environment with unique (x,y,z) coordinates. We
assume that the user can navigate into the 3D
virtual environment and interact with the
objects using any input device such as a mouse,
keyboard, fingerprint scanner, iris scanner, card
readers, microphones, stylus, etc.
• Let us consider a user who navigates through the 3D virtual
environment that consists of an office and a meeting room.
Let us assume that the user is in the virtual office and the
user turns around the door located in (1,2,3) and opens it.
Then, the user closes the door. The user then finds a
computer to the left, which exists in the position (4,5,6),
and the user types “ABC”. The initial representation of user
actions in the 3D virtual environment can be recorded as
follows:
(1,2,3) action = open the office door
(1,2,3) action = close the office door
(4,5,6) action = typing “A”
(4,5,6) action = typing “B”
(4,5,6) action = typing “C”
Typical
Textual
Password
Enter User Name
Performing
Graphical Password
Moving Inside
Virtual 3D
Environment
Performing
Biometrics
Changing
Item Status
Verifying
Typing a letter or a number Clicks
Access not
granted
Login
password
Access
granted
Specific
key
password
Click on a
graphical
password
item
Specific key pressed
Biometric item
is checked
Move object,
Turn ON/OFF
 C++
 Java and Java3D
 .NET languages such as C# or Visual Basics
 Parrot virtual machine
 OpenGL library :
(i) uses both graphics and CAD programs.
(ii) supported on Windows, Macintosh, UNIX workstations,
PCs, X-Box, Linux, etc.
 GLUT :
(i) library for using C++ and OpenGL
 Direct 3D :
(i) supported only on Microsoft windows platforms and X-
box.
1. Brute Force Attack: A brute force attack is a trial-and-error
method used to obtain information such as a user password or
personal identification number (PIN). The attack is difficult
because:
(i) Required time to login: Time required to login may vary from
20 seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very
high.
2. Well Studied Attack:
(i) Attacker has to study whole password scheme.
(ii) Attacker has to try combination of different attacks on
scheme.
(iii) As 3D password scheme is multi-factor & multi-password
authentication scheme, attacker fail to studied whole scheme.
This attacks also not much effective against 3D password
scheme.
3. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so
are difficult to break.
4. Timing Attack:
(i) The attacker observes how long it takes a
legitimate user to perform a correct sign-in using 3D
password.
(ii) Helps in determining length of password.
(iii) Effective if the 3D virtual environment is
designed correctly.
5. Key logger:
(i) Attacker install as software called key logger on
system where authentication scheme is used.
(ii) Software stores text entered through
keyboard and those text are stored in text file.
(iii) More effective and useful for only textual
password. Fails in case of 3D password because it
includes biometrics which are hard to crack.
1. Provides high security.
2. Flexible, as it provides multifactor authentication ,i.e., token
based, knowledge based, biometrics.
3. Provides infinite number of password possibilities.
4. Can be memorized in form of short stories.
5. Implementation of system is easy.
6. Ease to change password anytime.
7. Helps to keep lot of personal details.
8. Due to the use of multiple schemes in one scheme password
space is increased to great extent.
1. Difficult for blind people to use this
technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
1. Critical servers.
2. Nuclear reactors and military facilities.
3. Airplanes, jet fighters and missile guiding.
4. Networking.
5. A small virtual environment can be used in following
areas:
(i) ATM.
(ii) Desktop computers and laptop logins.
(iii) Web authentication.
(iv) Security analysis.
 The authentication can be improved with 3D
password, because the unauthorized person
may not interact with same object at a
particular location as the legitimate user.
 It is difficult to crack because it has no fixed
number of steps and a particular procedure.
 Added with biometrics and token verification
this scheme becomes almost unbreakable.
 www.ifet.ac.in
3Dvas.com
 www.ijesit.com
 www.sri.com
https://www.youtube.com/watch?v=Tw1
mXjMshJE
3d password ppt
3d password ppt

More Related Content

What's hot (20)

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password
3D Password3D Password
3D Password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3 d password
3 d password 3 d password
3 d password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Viewers also liked

3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide- Mark - Fullbright
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure ProtocolVlad Petre
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Social network trends_kfj_mai_2010
Social network trends_kfj_mai_2010Social network trends_kfj_mai_2010
Social network trends_kfj_mai_2010davidroethler
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Abstract chameleon chip
Abstract chameleon chipAbstract chameleon chip
Abstract chameleon chipAnugrah James
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Quantum teleportation.ppt
Quantum teleportation.pptQuantum teleportation.ppt
Quantum teleportation.pptnastrika
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPTVishnu Mysterio
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentationsismailraesha
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017Carol Smith
 

Viewers also liked (19)

3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide3-D Secure Acquirer and Merchant Implementation Guide
3-D Secure Acquirer and Merchant Implementation Guide
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
Das Social Network
Das Social NetworkDas Social Network
Das Social Network
 
3d internet
3d internet3d internet
3d internet
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Social network trends_kfj_mai_2010
Social network trends_kfj_mai_2010Social network trends_kfj_mai_2010
Social network trends_kfj_mai_2010
 
4D_Presentation
4D_Presentation4D_Presentation
4D_Presentation
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Teleportation
TeleportationTeleportation
Teleportation
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Abstract chameleon chip
Abstract chameleon chipAbstract chameleon chip
Abstract chameleon chip
 
chameleon chip
chameleon chipchameleon chip
chameleon chip
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
Quantum teleportation.ppt
Quantum teleportation.pptQuantum teleportation.ppt
Quantum teleportation.ppt
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Similar to 3d password ppt

Similar to 3d password ppt (20)

3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D - password
3D - password3D - password
3D - password
 
3d pass words
3d pass words3d pass words
3d pass words
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
Vivek
VivekVivek
Vivek
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3d authentication
3d authentication3d authentication
3d authentication
 
3 dpswd
3 dpswd3 dpswd
3 dpswd
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
C0361419
C0361419C0361419
C0361419
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

3d password ppt

  • 2. 1. Password 2. Passphrase 3. Authentication 4. Drawbacks of Human Authentication Techniques 5. 3D password 6. Virtual Environment 7. Virtual Objects 8. System Implementation 9. Mathematical Concept Related to 3D password 10. Example 11. State Diagram 12. Working of 3D password 13. Programming languages 14. Attacks and Counter Measures 15. Advantages 16. Disadvantages 17. Applications 18. References
  • 3. • A password is a word or string of characters used for the authentication to prove identity. • Password is basically an encryption algorithms. • It is 8-15 character or slightly more than that. • Passwords are the first line of defense against cyber criminals.
  • 4.  It is the advanced version of password.  It is a combination of words or simply collection of password in a proper sequence.  Length of passphrase is from 30-50 words or more than that also.  More secure than an ordinary password.
  • 5.  Authentication is a process of validating who are you to whom you are claimed to be.  Human authentication techniques are : 1. Knowledge based (What you know) 2. Token based (What you have) 3. Biometrics (What you are)
  • 6. (a) Pin (b) Password (c) Patterns (a) Keys (b) Passport (c) Smart card (d) ID proofs (a) Face recognition (b) Fingerprints (c) Iris (d) DNA (e) Voice (f) Hand geometry
  • 7. (a) Easy to remember -> Easy to break Hard to guess -> Hard to remember (b) Vulnerable to attacks like dictionary attacks, brute force attacks etc. (a) Duplicate keys, smart cards, ID proofs are easily available. (a) Instructiveness to privacy. (b) Resistance to exposure of retinas to IR rays. (c) Hackers implement exact copy of your biometrics.
  • 8.  The 3D password is a multifactor authentication scheme that combine KNOWLEDGE BASED + TOKEN BASED + BIOMETRICS in one authentication system.  It presents a virtual environment containing various virtual objects.  It is simply the combination and sequence of user interactions that occur in the 3D environment.  The user walks through the environment and interacts with the objects.  More customizable and very interesting way of authentication.
  • 9. • A virtual environment is a computer-based simulated environment. • The 3D virtual environment consists of many items and objects. • It is created inside a 2D screen and is a real time scenario . • Each item has different responses to action. • The user actions, interactions and inputs towards the objects or toward the 3D virtual environment creates the user’s 3D password. • Communication between users can range from text, graphical icons, visual gesture, sound, and rarely, forms using touch, voice command, and balance senses.
  • 10. • 3D virtual environment affects the usability, effectiveness and acceptability of a 3D password system. • 3D environment reflects the administration needs and security requirements.
  • 11.
  • 12.
  • 13. Virtual objects can be any objects we encounter in real life such as:  A computer on which user can type.  An ATM machine that requires a token (ATM card).  A fingerprint reader that requires user fingerprints.  A paper or white board on which user can write.  A light that can be switched on/off.  A television.  A radio.  A car that can be driven.  A graphical password scheme.
  • 14.  The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2).  To perform the legitimate 3D password the user must follow the same scenario performed by the legitimate user.  This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence.
  • 15. 1. Time Complexity : Let us assume that A is the virtual 3D environment plotting and B is algorithmic processing. Then, Time complexity = Am + Bn where ‘m’ is time required to communicate with system, and ‘n’ is time required to process each algorithm in 3D environment.
  • 16. 2. Space Complexity: • System include 3D virtual environment, so that each point in this environment will having 3 co-ordinate values. • Any point from 3D virtual environment is represented in the form of (X, Y, Z). X, Y & Z are the coordinate values stored for particular point. • Space complexity = n3 3. Class Of Problem: Three types of classes provided are: (a) P class: A decision problem is in P if there is a known polynomial-time algorithm to get that answer. (b) NP-hard class: Decision problem is in NP if there is a known polynomial-time algorithm for a non-deterministic machine to get the answer. (c) NP complete class: NP-complete if you can prove that (1) it‘s in NP, and (2) show that it‘s poly-time reducible to a problem already known to be NP-complete.
  • 17. • Let us consider a 3D virtual environment space of size G x G x G. The 3D environment space is represented by the coordinates (x,y,z) ϵ [1,…,G] x [1,…,G] x [1,…,G]. • The objects are distributed in the 3D virtual environment with unique (x,y,z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, card readers, microphones, stylus, etc.
  • 18. • Let us consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around the door located in (1,2,3) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4,5,6), and the user types “ABC”. The initial representation of user actions in the 3D virtual environment can be recorded as follows: (1,2,3) action = open the office door (1,2,3) action = close the office door (4,5,6) action = typing “A” (4,5,6) action = typing “B” (4,5,6) action = typing “C”
  • 19. Typical Textual Password Enter User Name Performing Graphical Password Moving Inside Virtual 3D Environment Performing Biometrics Changing Item Status Verifying Typing a letter or a number Clicks Access not granted Login password Access granted Specific key password Click on a graphical password item Specific key pressed Biometric item is checked Move object, Turn ON/OFF
  • 20.
  • 21.  C++  Java and Java3D  .NET languages such as C# or Visual Basics  Parrot virtual machine  OpenGL library : (i) uses both graphics and CAD programs. (ii) supported on Windows, Macintosh, UNIX workstations, PCs, X-Box, Linux, etc.  GLUT : (i) library for using C++ and OpenGL  Direct 3D : (i) supported only on Microsoft windows platforms and X- box.
  • 22. 1. Brute Force Attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). The attack is difficult because: (i) Required time to login: Time required to login may vary from 20 seconds to 2 minutes. So, is time consuming. (ii) Cost of attack: Cost of creating 3D virtual environment is very high. 2. Well Studied Attack: (i) Attacker has to study whole password scheme. (ii) Attacker has to try combination of different attacks on scheme. (iii) As 3D password scheme is multi-factor & multi-password authentication scheme, attacker fail to studied whole scheme. This attacks also not much effective against 3D password scheme.
  • 23. 3. Shoulder Suffering Attack: (i) An attacker uses a camera to record the password. (ii) 3D password contains biometric identifications, so are difficult to break. 4. Timing Attack: (i) The attacker observes how long it takes a legitimate user to perform a correct sign-in using 3D password. (ii) Helps in determining length of password. (iii) Effective if the 3D virtual environment is designed correctly.
  • 24. 5. Key logger: (i) Attacker install as software called key logger on system where authentication scheme is used. (ii) Software stores text entered through keyboard and those text are stored in text file. (iii) More effective and useful for only textual password. Fails in case of 3D password because it includes biometrics which are hard to crack.
  • 25. 1. Provides high security. 2. Flexible, as it provides multifactor authentication ,i.e., token based, knowledge based, biometrics. 3. Provides infinite number of password possibilities. 4. Can be memorized in form of short stories. 5. Implementation of system is easy. 6. Ease to change password anytime. 7. Helps to keep lot of personal details. 8. Due to the use of multiple schemes in one scheme password space is increased to great extent.
  • 26. 1. Difficult for blind people to use this technology. 2. A lot of program coding is required. 3. Very expensive. 4. Time and memory requirement is large.
  • 27. 1. Critical servers. 2. Nuclear reactors and military facilities. 3. Airplanes, jet fighters and missile guiding. 4. Networking. 5. A small virtual environment can be used in following areas: (i) ATM. (ii) Desktop computers and laptop logins. (iii) Web authentication. (iv) Security analysis.
  • 28.  The authentication can be improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this scheme becomes almost unbreakable.
  • 29.  www.ifet.ac.in 3Dvas.com  www.ijesit.com  www.sri.com https://www.youtube.com/watch?v=Tw1 mXjMshJE