SlideShare a Scribd company logo
3D-PASSWORD 
KULDEEP DHAKAD 
A more secured 
authentication
CONTENTS 
• What is Authentication 
• Existing system 
• Drawbacks in existing system 
• Proposed system 
• Advantages with proposed system 
• Applications 
• Attacks 
• Conclusion
AUTHENTICATION 
Authentication is a process of validating 
who are you to whom you claimed to be. 
• Human authentication techniques are as follows: 
1.Knowledge Base (What you know) 
2.Token Based(what you have) 
3.Biometrics(what you are)
THREE BASIC IDENTIFICATION METHODS OF PASSWORD 
•Password 
•PIN 
Possession 
(“something I have”) 
•Keys 
•Passport 
•Smart Card 
Biometrics 
(“something I am”) 
•Face 
•Fingerprint 
•Iris 
Knowledge 
(“something I know”)
DRAWBACKS 
Textual Password: 
– Textual Passwords should be easy to remember at the same 
time hard to guess 
– Full password space for 8 characters consisting of both numbers 
and characters is 2 X 10¹⁴ 
– From an research 25% of the passwords out of 15,000 users 
can be guessed correctly by using brute force dictionary 
Graphical Password 
 One main drawback of applying biometric is its 
intrusiveness upon a users personnel characteristics. 
 They require special scanning device to authenticate the 
user which is not acceptable for remote and internet users.
3d password 
The 3D Password is a multifactor authentication scheme that 
combine 
RECOGNITION 
+ RECALL 
+TOKENS 
+BIOMETRIC 
In one authentication 
system 
 The 3D password presents a virtual environment containing 
various virtual objects. 
 The user walks through the environment and interacts with the 
objects 
 The 3d Password is simply the combination and sequence of 
user interactions that occur in the 3D environment
Virtual objects 
• Virtual objects can be any object we encounter in real life: 
A computer on which the user can type 
 A fingerprint reader that requires users fingerprint 
A paper or white board on which user can type 
A Automated teller(ATM) machine that requires a 
token 
 A light that can be switched on/off 
 A television or radio 
A car that can be driven 
A graphical password scheme
System implementation 
• The action towards an object that exists in location 
(x1,y1,z1) 
is different from action towards an another object at 
(x2,y2,z2). 
• Therefore ,to perform the legitimate 3d password the user 
must follow the same scenario performed by the legitimate 
user. 
• This means interacting with the same objects that reside at 
exact location and perform the exact actions in the proper 
sequence
example 
 Let us consider a 3D virtual environment space of size G ×G × 
G. The 3D environment space is represented by the coordinates (x, 
y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. 
The objects are distributed in the 3D virtual environment with 
unique (x, y, z) coordinates. We assume that the user can navigate 
into the 3D virtual environment and interact with the objects using 
any input device such as a mouse, key board, fingerprint scanner, 
iris scanner, stylus, card reader, and microphone.
 For example, consider a user who navigates through the 3D virtual 
environment that consists of an office and a meeting room. Let us assume that 
the user is in the virtual office and the user turns around to the door located in 
(10, 24, 91) and opens it. Then, the user closes the door. The user then finds a 
computer to the left, which exists in the position (4, 34, 18), and the user types 
“CAT.” The initial representation of user actions in the 3Dvirtual environment 
can be recorded as follows:: 
*(10, 24, 91) Action = Open the office door; 
*(10, 24, 91) Action = Close the office door; 
*(4, 34, 18) Action = Typing, “C”; 
*(4, 34, 18) Action = Typing, “A”; 
*(4, 34, 18) Action = Typing, “T”;
Advantages 
 Flexibility: 3D Passwords allows Multifactor 
authentication biometric , textual passwords can 
be embedded in 3D password technology. 
 Strength: This scenario provides almost 
unlimited passwords possibility. 
 Ease to Memorize: can be remembered in the 
form of short story. 
 Respect of Privacy: Organizers can select 
authentication schemes that respect users 
privacy.
Applications 
The 3D password can have a password space that is very large 
compared to other authentication schemes, so the 3D password’s 
main application domains are protecting critical systems and 
resources. 
 Critical Servers: 
 Nuclear Reactors & military Facilities: 
Airplanes and missile Guiding:
Applications 
In addition,3D password can also be used in less critical 
systems 
A small virtual environment can be used in the following systems 
like 
Atm 
Personal digital assistance 
Desktop computers & laptops 
Web authentication etc..,
Attacks and counter measures 
 Brute Force Attack 
 Well studied Attack 
 Shoulder--surfing Attack
Conclusion 
The authentication can be improved with 3d password ,because 
the un- authorized person may not interact with same object at 
a particular location as the legitimate user. 
It is difficult to crack ,because it has no fixed no of steps and a 
particular procedure 
Added with biometrics and token verification this schema 
becomes almost unbreakable
3D Password by Kuldeep Dhakad

More Related Content

What's hot

3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
JYoTHiSH o.s
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
Rajashree Swain
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
BERASUDARSHAN
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3d password
3d password3d password
3d password
shivi123456
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
Jai Chaudhary
 
3 d password
3 d password3 d password
3 d password
yogendra mahate
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3d password
3d password3d password
3d password
Abinaya Sathya
 

What's hot (20)

3 d password
3 d password 3 d password
3 d password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password
3d password3d password
3d password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d passwords
3d passwords3d passwords
3d passwords
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password
3d password3d password
3d password
 

Viewers also liked

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant
1996kuldeep
 
3D password
3D password3D password
3D password
Jaya Sinha
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiation
Ayushi Gupta
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
LinkedIn
 

Viewers also liked (6)

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant
 
3D password
3D password3D password
3D password
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiation
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to 3D Password by Kuldeep Dhakad

3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
Ajay Kumar
 
3d
3d3d
3dpassword
3dpassword3dpassword
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
Vivek
VivekVivek
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
C0361419
C0361419C0361419
C0361419
iosrjournals
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
3 d ppt
3 d ppt3 d ppt
3D - password
3D - password3D - password
3D - password
BhavikParmar24
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 

Similar to 3D Password by Kuldeep Dhakad (20)

3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Vivek
VivekVivek
Vivek
 
3d pass words
3d pass words3d pass words
3d pass words
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
C0361419
C0361419C0361419
C0361419
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D - password
3D - password3D - password
3D - password
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

3D Password by Kuldeep Dhakad

  • 1. 3D-PASSWORD KULDEEP DHAKAD A more secured authentication
  • 2. CONTENTS • What is Authentication • Existing system • Drawbacks in existing system • Proposed system • Advantages with proposed system • Applications • Attacks • Conclusion
  • 3. AUTHENTICATION Authentication is a process of validating who are you to whom you claimed to be. • Human authentication techniques are as follows: 1.Knowledge Base (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 4. THREE BASIC IDENTIFICATION METHODS OF PASSWORD •Password •PIN Possession (“something I have”) •Keys •Passport •Smart Card Biometrics (“something I am”) •Face •Fingerprint •Iris Knowledge (“something I know”)
  • 5. DRAWBACKS Textual Password: – Textual Passwords should be easy to remember at the same time hard to guess – Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ – From an research 25% of the passwords out of 15,000 users can be guessed correctly by using brute force dictionary Graphical Password  One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.  They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 6. 3d password The 3D Password is a multifactor authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 7. Virtual objects • Virtual objects can be any object we encounter in real life: A computer on which the user can type  A fingerprint reader that requires users fingerprint A paper or white board on which user can type A Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio A car that can be driven A graphical password scheme
  • 8. System implementation • The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2). • Therefore ,to perform the legitimate 3d password the user must follow the same scenario performed by the legitimate user. • This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence
  • 9. example  Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone.
  • 10.  For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “CAT.” The initial representation of user actions in the 3Dvirtual environment can be recorded as follows:: *(10, 24, 91) Action = Open the office door; *(10, 24, 91) Action = Close the office door; *(4, 34, 18) Action = Typing, “C”; *(4, 34, 18) Action = Typing, “A”; *(4, 34, 18) Action = Typing, “T”;
  • 11. Advantages  Flexibility: 3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 12. Applications The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources.  Critical Servers:  Nuclear Reactors & military Facilities: Airplanes and missile Guiding:
  • 13. Applications In addition,3D password can also be used in less critical systems A small virtual environment can be used in the following systems like Atm Personal digital assistance Desktop computers & laptops Web authentication etc..,
  • 14. Attacks and counter measures  Brute Force Attack  Well studied Attack  Shoulder--surfing Attack
  • 15. Conclusion The authentication can be improved with 3d password ,because the un- authorized person may not interact with same object at a particular location as the legitimate user. It is difficult to crack ,because it has no fixed no of steps and a particular procedure Added with biometrics and token verification this schema becomes almost unbreakable