SlideShare a Scribd company logo
PASSWORDPASSWORD
A password is a word or string of characters used
for the authentication to prove identity.
Password is basically an encryption algorithms.It is
8-15 character or slightly more than that.
Passwords are the first line of defense against cyber
criminals.
 It is the advanced version of password.
 It is a combination of words or simply collection of
password in a proper sequence.
 Length of passphrase is from 30-50 words or more
than that also.
 More secure than an ordinary password.
Authentication is a process of validating who are
you to whom you are claimed to be.
 Human authentication techniques are :
1.Knowledge based (What you know)
2.Token based (What you have)
3.Biometrics (What you are)
4.Graphical Password(What you see)
(a) Pin
(b) Password
(c) Patterns
(a) Keys
(b) Passport
(c) Smart card
(d) ID proofs
(a) Face recognition
(b) Fingerprints
(c) Iris
(d) DNA
(e) Voice
(f) Hand geometry
(a) Easy to remember -> Easy to break
Hard to guess -> Hard to remember
(b) Vulnerable to attacks like dictionary attacks, brute force attacks etc.
(a) Duplicate keys, smart cards, ID proofs are easily available.
(a) Instructiveness to privacy.
(b) Resistance to exposure of retinas to IR rays.
(c) Hackers implement exact copy of your biometrics.
3D PASSWORD
3-D PASSWORD3-D PASSWORD
A 3D password is a multifactor authentication scheme that combine
KNOWLEDGE BASED
+ TOKEN BASED
+ BIOMETRICS
in one authentication system.
The 3D passwords3D passwords which are more
customizable, and very interesting
way of authentication.
The 3D password presents a virtual environmentvirtual environment
containing various virtual objects.
 The user walks through the environment and
interacts with the objects.
It is the combination and sequence of user
interactions that occur in the 3D environment.
Virtual objects
Virtual objects can be any object we encounter in real life:
 A computer on which the user can type in
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 An Automated teller(ATM) machine that requires a
token
 A light that can be switched on/off
 A television or radio
 A car that can be driven
 A graphical password scheme
VIRTUAL ENVIRONMENTVIRTUAL ENVIRONMENT
Snapshot of a virtual environment , which contains 36
pictures and six computers as virtual objects
 A virtual environment is a computer-based simulated
environment.
 The 3D virtual environment consists of many items and
objects.
 It is created inside a 2D screen and is a real time scenario
 Each item has different responses to action.
 The user actions, interactions and inputs towards the objects
or toward the 3D virtual environment creates the user’s 3D
password.
Communication between users can range from text, graphical
icons, visual gesture, sound, and rarely, forms using touch,
voice command, and balance senses.
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
IMAGES OF VIRTUAL ENVIRONMENTIMAGES OF VIRTUAL ENVIRONMENT
The design of 3D virtual
environments should follow
these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
Brief Description of System
The user is presented with this 3d virtual environment where
the user navigates and interacts with various objects.
The sequence of actions and interactions towards the
objects inside the 3d environment constructs the user’s 3d
password.
SYSTEM IMPLEMENTATIONSYSTEM IMPLEMENTATION
The action towards an object that exists in location
(x1,y1,z1) is different from action towards an another object
at (x2,y2,z2).
 To perform the legitimate 3D password the user must
follow the same scenario performed by the legitimate user.
 This means interacting with the same objects that reside at
exact location and perform the exact actions in the proper
sequence.
Typical
Textual
Password
Enter User
Name
Performing
Graphical
Password
Moving Inside
Virtual 3D
Environment
Performing
Biometrics
Changing
Item Status
Verifying
Typing a letter or a
number
Clicks
Access not
granted
Login
password
Access
granted
Specific
key
passwor
d
Click on
a
graphical
password
itemSpecific key pressed
Biometric
item is
checked
Move object,
Turn ON/OFF
3D Password Authentication
1. Brute Force Attack: A brute force attack is a trial-and-error method used to
obtain information such as a user password or personal identification number
(PIN).  The attack is difficult because:
(i) Required time to login: Time required to login may vary from 20
seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very high.
2. Well Studied Attack:
(i) Attacker has to study whole password scheme.
(ii) Attacker has to try combination of different attacks on scheme.
(iii) As 3D password scheme is multi-factor & multi-password
authentication scheme, attacker fail to studied whole scheme. This attacks
also not much effective against 3D password scheme.
3. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so are difficult to break.
4. Key logger:
(i) Attacker install as software called key logger on system where
authentication scheme is used.
(ii) Software stores text entered through keyboard and those text are stored
in text file.
(iii) More effective and useful for only textual password. Fails in case of 3D
password because it includes biometrics which are hard to crack.
ADVANTAGES OF 3D PASSWORDADVANTAGES OF 3D PASSWORD
Flexibility:3D Passwords allows Multifactor authentication
biometric , textual passwords can be embedded in 3D password
technology.
Strength: This scenario provides almost unlimited passwords
possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes
that respect users privacy.
1. Difficult for blind people to use this technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the following
systems like-
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
•The authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
•It is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
•Added with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication

More Related Content

What's hot

3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3D password
3D password3D password
3D password
Jaya Sinha
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3D password
3D password3D password
3D password
anuradha srivastava
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 

What's hot (20)

3 d password
3 d password3 d password
3 d password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password 3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password3D password
3D password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3 d password
3 d password3 d password
3 d password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D password
3D password3D password
3D password
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 

Similar to 3D-Password: A More Secure Authentication

3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
3D - password
3D - password3D - password
3D - password
BhavikParmar24
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.docAjay Kumar
 
Vivek
VivekVivek
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
C0361419
C0361419C0361419
C0361419
iosrjournals
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
Tapesh Chalisgaonkar
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02bujjiflute
 

Similar to 3D-Password: A More Secure Authentication (20)

3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D - password
3D - password3D - password
3D - password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
Vivek
VivekVivek
Vivek
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
C0361419
C0361419C0361419
C0361419
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

3D-Password: A More Secure Authentication

  • 1.
  • 2. PASSWORDPASSWORD A password is a word or string of characters used for the authentication to prove identity. Password is basically an encryption algorithms.It is 8-15 character or slightly more than that. Passwords are the first line of defense against cyber criminals.
  • 3.  It is the advanced version of password.  It is a combination of words or simply collection of password in a proper sequence.  Length of passphrase is from 30-50 words or more than that also.  More secure than an ordinary password.
  • 4. Authentication is a process of validating who are you to whom you are claimed to be.  Human authentication techniques are : 1.Knowledge based (What you know) 2.Token based (What you have) 3.Biometrics (What you are) 4.Graphical Password(What you see)
  • 5. (a) Pin (b) Password (c) Patterns (a) Keys (b) Passport (c) Smart card (d) ID proofs (a) Face recognition (b) Fingerprints (c) Iris (d) DNA (e) Voice (f) Hand geometry
  • 6. (a) Easy to remember -> Easy to break Hard to guess -> Hard to remember (b) Vulnerable to attacks like dictionary attacks, brute force attacks etc. (a) Duplicate keys, smart cards, ID proofs are easily available. (a) Instructiveness to privacy. (b) Resistance to exposure of retinas to IR rays. (c) Hackers implement exact copy of your biometrics.
  • 8. 3-D PASSWORD3-D PASSWORD A 3D password is a multifactor authentication scheme that combine KNOWLEDGE BASED + TOKEN BASED + BIOMETRICS in one authentication system. The 3D passwords3D passwords which are more customizable, and very interesting way of authentication.
  • 9. The 3D password presents a virtual environmentvirtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
  • 10. Virtual objects Virtual objects can be any object we encounter in real life:  A computer on which the user can type in  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  An Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  • 11. VIRTUAL ENVIRONMENTVIRTUAL ENVIRONMENT Snapshot of a virtual environment , which contains 36 pictures and six computers as virtual objects  A virtual environment is a computer-based simulated environment.  The 3D virtual environment consists of many items and objects.  It is created inside a 2D screen and is a real time scenario  Each item has different responses to action.  The user actions, interactions and inputs towards the objects or toward the 3D virtual environment creates the user’s 3D password. Communication between users can range from text, graphical icons, visual gesture, sound, and rarely, forms using touch, voice command, and balance senses.
  • 12. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 13. IMAGES OF VIRTUAL ENVIRONMENTIMAGES OF VIRTUAL ENVIRONMENT
  • 14. The design of 3D virtual environments should follow these guidelines: Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 15. Brief Description of System The user is presented with this 3d virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 16. SYSTEM IMPLEMENTATIONSYSTEM IMPLEMENTATION The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2).  To perform the legitimate 3D password the user must follow the same scenario performed by the legitimate user.  This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence.
  • 17. Typical Textual Password Enter User Name Performing Graphical Password Moving Inside Virtual 3D Environment Performing Biometrics Changing Item Status Verifying Typing a letter or a number Clicks Access not granted Login password Access granted Specific key passwor d Click on a graphical password itemSpecific key pressed Biometric item is checked Move object, Turn ON/OFF
  • 18.
  • 20. 1. Brute Force Attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).  The attack is difficult because: (i) Required time to login: Time required to login may vary from 20 seconds to 2 minutes. So, is time consuming. (ii) Cost of attack: Cost of creating 3D virtual environment is very high. 2. Well Studied Attack: (i) Attacker has to study whole password scheme. (ii) Attacker has to try combination of different attacks on scheme. (iii) As 3D password scheme is multi-factor & multi-password authentication scheme, attacker fail to studied whole scheme. This attacks also not much effective against 3D password scheme.
  • 21. 3. Shoulder Suffering Attack: (i) An attacker uses a camera to record the password. (ii) 3D password contains biometric identifications, so are difficult to break. 4. Key logger: (i) Attacker install as software called key logger on system where authentication scheme is used. (ii) Software stores text entered through keyboard and those text are stored in text file. (iii) More effective and useful for only textual password. Fails in case of 3D password because it includes biometrics which are hard to crack.
  • 22. ADVANTAGES OF 3D PASSWORDADVANTAGES OF 3D PASSWORD Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology. Strength: This scenario provides almost unlimited passwords possibility. Ease to Memorize: can be remembered in the form of short story. Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 23. 1. Difficult for blind people to use this technology. 2. A lot of program coding is required. 3. Very expensive. 4. Time and memory requirement is large.
  • 24. The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 25. A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
  • 26. •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion