2. INTRODUCTION
īCurrent Authentification suffer from many
weakness.Textual passwords are commonly used,users do
not follow their requirements.Users tends to choose
meaningful words from dictionaries,which makes the
textual passwords easy to break and vulnerable to
dictionary or brute force attacks.In this paper,we present
and evaluate our contribution i.e. the 3D password
4. âĸHow secure is your password?
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Ten years back Klein performed
such tests and he could crack 10-15
passwords per day.
PASSWORD
7. âĸThe 3D passwords3D passwords which are more customizable,
and very interesting way of authentication.
âĸA 3D password is a multifactor
authentication scheme that
combine
RECOGNITIONRECOGNITION
++RECALLRECALL
++TOKENSTOKENS
++BIOMETRICSBIOMETRICS
in one authentication system.
8. īThe 3D password presents a virtual environmentvirtual environment
containing various virtual objects.
ī The user walks through the environment and
interacts with the objects.
īIt is the combination and sequence of user
interactions that occur in the 3D environment.
9. Brief Description of System
īThe user is presented with this 3d virtual environment where
the user navigates and interacts with various objects.
īThe sequence of actions and interactions towards the
objects inside the 3d environment constructs the userâs 3d
password.
10. System Implementation
īFor example, the user can enter the virtual environment
and type something on a computer that exists in (x1 , y1 ,
z1 ) position, then enter a room that has a fingerprint
recognition device that exists in a position (x2 , y2 , z2 )
and provide his/her fingerprint. Then, the user can go to
the virtual garage, open the car door, and turn on the radio
to a specific channel. The combination and the sequence
of the previous actions toward the specific objects
construct the userâs 3D password
11. Virtual objects
īVirtual objects can be any object we encounter in real life:
īŧ A computer on which the user can type in
īŧ A fingerprint reader that requires users fingerprint
īŧ A paper or white board on which user can type
īŧ An Automated teller(ATM) machine that requires a
token
īŧ A light that can be switched on/off
īŧ A television or radio
īŧ A car that can be driven
īŧ A graphical password scheme
12. Snapshot of a proof - of - concept virtualSnapshot of a proof - of - concept virtual
art gallery , which contains 36art gallery , which contains 36
pictures and six computerspictures and six computers
14. 3D Virtual Environment
âĸ3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
âĸ 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
15. The design of 3D virtual
environments should follow
these guidelines:
īąReal Life Similarity
īąObject Uniqueness & Distinction
īą3D Virtual Environment Size
īąNumber of objects & their types
īąSystem Importance
17. Applications
The 3D passwordâs main application domains are protecting
critical systems and resources.
ī§ Critical Servers
ī§ Nuclear Reactors & military Facilities
ī§ Airplanes and missile Guiding
18. A small virtual environment can be used in the following
systems like-
īļAtm
īļPersonal digital assistance
īļDesktop computers & laptops
īļWeb authentication etc.
21. âĸThe authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
âĸIt is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
âĸAdded with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion