SlideShare a Scribd company logo
ByZishan Mohsin
B.tech, Computer Science And Engineering
Integral University.
CONTENTS
 Introduction
 Authentication Schemes
 Functionalities Required
 3D Password selection and Input
 Virtual Environment Design Guidelines
 Applications
 Security Analysis
 Attacks and Countermeasures
 Conclusion
INTRODUCTION
Commonly used authentication schemes are textual

passwords, graphical passwords and biometrics.

3D password is a multifactor authentication scheme.

To be authenticated, we require a 3D virtual

environment.
Combines recognition, recall, token, and biometrics

based systems.

Users choice to select the type of authentication

technique.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED
Recall based
Recognition based

TOKEN BASED

e.g : smart card
BIOMETRIC BASED
Fingerprint ,palm prints ,hand geometry ,face

recognition
Intrusiveness upon a user’s personal characteristics.

GRAPHICAL PASSWORDS
Recognition based
Recall based
FUNCTIONALITIES REQUIRED
New scheme should combine the existing

authentication schemes

Freedom to select the type of authentication

technique.

Should provide secrets that are easy to remember,

difficult to guess.
3D PASSWORD SELECTION AND INPUT
3D environment space represented by the co-

ordinates

User navigate into the 3D virtual environment using

any input device.

The sequence of actions and interactions forms the

users 3D password.
Representation of user actions in the 3D virtual

environment

(10,24,91) Action=Open the office door;
(10,24,91) Action=Close the office door;
(4,34,18) Action= Typing,“F”;
(4,34,18) Action= Typing,”A”;
(4,34,18) Action= Typing,”L”;
(4,34,18) Action= Typing,”C”;
(4,34,18) Action= Typing,”O”;
(4,34,18) Action= Typing,”N”;
(10,24,80) Action= Pick up the pen;
(1,18,80) Action= Drawing, point=(330,130).
Virtual Computer where user typing a textual password
as a part of user’s 3D Password
Snapshot of a proof-of-concept virtual art
gallery
State diagram of a 3D Password application
3D VIRTUAL ENVIRONMENT DESIGN
GUIDELINES
Real-life similarity
Object uniqueness and distinction
Three-dimensional virtual environment
System importance
APPLICATIONS
Critical servers.
Nuclear and military facilities.
Airplanes and jet fighters.
ATM, desktop computers and laptops.
SECURITY ANALYSIS
3D Password Space Size.
3D Password Distribution Knowledge.
ATTACKS AND COUNTER MEASURES
Brute Force Attack
Well-Studied Attack
Shoulder Surfing Attack
Timing Attack
CONCLUSION
Commonly used authentication schemes are

vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
User’s choice and decision to construct the desired
and preferred 3D password
3D Password

More Related Content

What's hot

3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3D password
3D password3D password
3D password
anuradha srivastava
 
3D password
3D password3D password
3D password
Jaya Sinha
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3D internet
3D internet3D internet
3D internet
navya nandini
 

What's hot (20)

3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password
3D Password3D Password
3D Password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D password
3D password3D password
3D password
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D Password
3D Password3D Password
3D Password
 
3D internet
3D internet3D internet
3D internet
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
Kanishka Khandelwal
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
Arun Kumar
 
LinkedIn powerpoint
LinkedIn powerpointLinkedIn powerpoint
LinkedIn powerpointguest2137df
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNiki Upadhyay
 
Cloud Computing in 3-D
Cloud Computing in 3-DCloud Computing in 3-D
Cloud Computing in 3-D
Everest Group
 
Algorithm paradigms
Algorithm paradigmsAlgorithm paradigms
Algorithm paradigms
suresh5c2
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
swati singh
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Ramesh Goud
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 

Viewers also liked (18)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
LinkedIn powerpoint
LinkedIn powerpointLinkedIn powerpoint
LinkedIn powerpoint
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Cloud Computing in 3-D
Cloud Computing in 3-DCloud Computing in 3-D
Cloud Computing in 3-D
 
Algorithm paradigms
Algorithm paradigmsAlgorithm paradigms
Algorithm paradigms
 
3d pass words
3d pass words3d pass words
3d pass words
 
3dpassword
3dpassword3dpassword
3dpassword
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Similar to 3D Password

3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
3 d password
3 d password3 d password
3 d password
Murlidhar Sarda
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02bujjiflute
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
M Sangam Subudhi
 
Vivek
VivekVivek
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3d password
3d password3d password
3d password
Abhirami P S
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
3 d password
3 d password3 d password
3 d password
hetal gauswami
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
swati singh
 
3d password
3d password3d password
3d password
shivi123456
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.docAjay Kumar
 
3D - password
3D - password3D - password
3D - password
BhavikParmar24
 

Similar to 3D Password (19)

3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3 d password
3 d password3 d password
3 d password
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
Vivek
VivekVivek
Vivek
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d password
3d password3d password
3d password
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3 d password
3 d password3 d password
3 d password
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3d password
3d password3d password
3d password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3D - password
3D - password3D - password
3D - password
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

3D Password

  • 1. ByZishan Mohsin B.tech, Computer Science And Engineering Integral University.
  • 2. CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion
  • 3. INTRODUCTION Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment.
  • 4. Combines recognition, recall, token, and biometrics based systems. Users choice to select the type of authentication technique.
  • 5. AUTHENTICATION SCHEMES KNOWLEDGE BASED Recall based Recognition based TOKEN BASED e.g : smart card
  • 6. BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based
  • 7. FUNCTIONALITIES REQUIRED New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember, difficult to guess.
  • 8. 3D PASSWORD SELECTION AND INPUT 3D environment space represented by the co- ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users 3D password.
  • 9. Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
  • 10. Virtual Computer where user typing a textual password as a part of user’s 3D Password
  • 11. Snapshot of a proof-of-concept virtual art gallery
  • 12. State diagram of a 3D Password application
  • 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance
  • 14. APPLICATIONS Critical servers. Nuclear and military facilities. Airplanes and jet fighters. ATM, desktop computers and laptops.
  • 15. SECURITY ANALYSIS 3D Password Space Size. 3D Password Distribution Knowledge.
  • 16. ATTACKS AND COUNTER MEASURES Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack
  • 17. CONCLUSION Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password