UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
GADISA GEMECHUGOOD POWERPOINT .pptx @here
1. AMBO UNIVERSITY
HACHALU HUNDESSA CAMPUS
SCHOOL OF INFORMATICS & ELECTRICAL ENGINEERING
DEPARTMENT OF INFORMATION TECHNOLOGY
MSc. REGULAR ….2016 E.C
COURSE: ADVANCED SEMINAR IN IT MSc
TITLE: - 3D PASSWORD
BY: GADISA GEMECHU…………………. ID..PGR/68878/15
SUBMITTED TO: Mr. BAYISA NATEA (ass. professor)
Ambo, Ethiopia
Dec 25, 2023
2. LISTS OF CONTENTS
CHAPTER ONE
Introduction to 3D password
Background of the Study
Limitations of Traditional passwords
Introducing the 3D Password
Motivation behind the seminar
Objectives of the seminar
Scope of 3D password
Significance of 3D password
Limitation of 3D password
CHAPTER TWO
Literature review
Advantage
Disadvantage
Application area of 3D password
CHAPTER THREE
Methodology
3D password design
CHAPTER FOUR
Summary and conclusion
3. Introduction to 3D password
• In today's digital era, the security of personal information and
sensitive data is crucial.
• Traditional password-based systems have demonstrated
vulnerabilities.
• Brute force attacks, dictionary attacks, and social engineering.
• The need for stronger authentication mechanisms has led to
innovative approaches.
4. Background of the Study
History and Evolution of Passwords
• Passwords have a long history, dating back to ancient
times when they were used to identify friend or foe.
• In the 1960s and 1970s, passwords gained prominence
with the rise of time-sharing systems.
• Early password systems relied on simple alphanumeric
passwords.
5. Limitations of Traditional Text-based
Passwords
• As computer systems advanced, so did password
cracking techniques, such as brute-force attacks and
dictionary attacks.
• Password complexity requirements were
implemented, including the use of uppercase and
lowercase letters, numbers, and special characters.
• However, single-factor authentication based on text-
based passwords has inherent limitations.
6. Introducing the 3D Password
• In response to the limitations of traditional passwords, the
concept of the 3D password was introduced.
• The 3D password is a multi-factor authentication scheme
that leverages three-dimensional graphical environments.
• It integrates various authentication factors, such as
gestures, biometrics, and graphical objects, to create a
more complex and secure authentication process
7. Motivation Behind Organizing the Seminar
on 3D Password Authentication
• In the face of increasing cyber security threats, the seminar
aims to address the need for stronger authentication methods.
• Traditional password-based systems have proven vulnerable to
various attacks, compromising user data and system security.
• The seminar seeks to explore innovative approaches like the
3D password to enhance authentication security.
8. Cont…
• Need for Stronger Authentication Methods
• With the proliferation of digital systems and online services,
the importance of robust authentication methods cannot be
overstated.
• Cybercriminals continuously develop sophisticated techniques
to exploit password vulnerabilities.
• Stronger authentication methods are essential to protect
sensitive information and prevent unauthorized access.
9. Objectives of the Seminar
• To Raise Awareness: Increase awareness among
participants about the vulnerabilities of traditional
password-based systems and the need for stronger
authentication methods.
• To Understand the Benefits of 3D Passwords: Provide
a comprehensive understanding of the 3D password
concept, its underlying principles, and its potential
advantages over traditional methods.
10. Scope of the Seminar
• The seminar focuses on the technical aspects of work of
3D password system and evaluating its usability.
• It covers various topics related to 3D passwords, including
architectural study, and working mechanisms.
• The seminar explores the potential applications of 3D
passwords in different domains and industries.
• It also discusses the limitations and challenges associated
with 3D password authentication.
11. Significance of the Seminar
• Knowledge Enrichment: Attending this seminar will provide
me with valuable insights into the concept of 3D password
authentication. I have gain a deep understanding of its benefits,
implementation challenges, and potential applications.
• Professional Development: The seminar offers an opportunity
to expand Our professional network by connecting with
researchers, practitioners, and industry experts. Engaging in
discussions and collaborations can lead to new ideas, insights,
and potential career opportunities.
12. Cont…
• Addressing Industry Needs: The seminar addresses the
growing need for stronger authentication methods in
various industries.
• Promoting Innovation: By actively participating in the
seminar, participant contribute to the collective effort of
advancing authentication technologies and driving
innovation in the field of cyber security.
13. Limitations of 3D Password Authentication
• User Acceptance: The adoption of 3D password authentication
may face resistance from users who are accustomed to
traditional text-based passwords. The initial learning curve and
adjustment to the new authentication method may pose
challenges.
• Implementation Complexity: Designing and implementing a
3D password system requires expertise in and complexity of
integrating multiple authentication factors can increase the
implementation effort and cost.
14. Cont…
• System Compatibility: Compatibility issues may arise
when integrating 3D password authentication with
existing systems and infrastructure. Ensuring seamless
integration and interoperability with different platforms
and technologies can be a challenge.
• Usability and Convenience: While 3D passwords aim to
enhance security, there is a need to balance it with
usability and convenience. Complex authentication
processes or frequent interactions with 3D environments
may impact user experience and efficiency.
15. Problems in 3D password
• Designing and implementing a reliable 3D password
system requires substantial expertise in various fields
such as computer graphics, computer vision, and user
behavior analysis.
• While they have the potential to provide enhanced
security, they may also introduce usability issues for
users
• Users might find it difficult to remember the exact
sequence of actions required to authenticate themselves,
especially if the system demands a high level of
precision.
.
16. CHAPTER TWO
Literature review
What is 3d password
• 3D password is a novel authentication method that aims to
enhance the security of traditional password-based systems.
• Unlike traditional passwords that are typically based on
alphanumeric characters, the 3D password adds an extra
dimension to the authentication process by incorporating three
different factors: something the user knows, something the
user has, and something the user is.
17. Cont….
• The first factor, something the user knows
• The second factor, something the user has
• The third factor, something the user is, utilizes biometric
characteristics to authenticate as follow:-
18. Advantage
• 3D passwords establish a robust defense against
unauthorized access.
• The personalization inherent in spatial and biometric
components contributes to a sense of ownership and user
engagement, fostering a more secure authentication
experience.
• The utilization of multimodal biometrics enhances
accuracy and resilience against spoofing attempts
19. Disadvantages
1. Requires high system resources – 3D passwords demand a
lot of system resources, which can slow down the overall
performance of your device.
2. Can be hard to remember – Remembering a 3D password can
be challenging because it involves recalling a sequence of
actions in a virtual environment.
3. Takes longer to authenticate – The process of entering a 3D
password can take more time compared to traditional
passwords, which can be frustrating for users.
20. Applications of 3D Passwords
1. Enterprise Security.
For example, an employee may need to enter their username
and password (something they know), swipe a smart card
(something they possess), and provide a fingerprint scan
(something they are) to gain access to sensitive company
systems or data.
2. Financial Services.
one-time passwords (OTP) generated by a mobile app or
hardware token, and voice recognition. For instance, a user
may log in with their username and password, enter a time-
based OTP displayed on their smartphone (something they
possess), and provide a voice sample for voice recognition
(something they are) to complete the authentication process
for online banking transactions.
22. CHAPTER THREE
METHODOLOGY
• The methodology used to prepare the seminar on 3D
Password involved extensive research and information
gathering from the internet.
• As the internet serves as a vast repository of knowledge
and resources, it was leveraged to access a wide range of
information related to the 3D password
• The methodology began with identifying credible and
authoritative sources that provided valuable insights into
the 3D password concept. sword concept.
23. Cont…
• The methodology also involved organizing and
structuring the gathered information in a logical and
coherent manner.
• The collected data was categorized into relevant sections,
such as introduction, background, motivation, problem
statement, objectives, literature review, and significance
of study.
• In conclusion, the methodology employed for preparing
the 3D Password seminar involved extensive research and
information gathering from the internet.
24. 3D password design
• The design should consider factors such as navigation
controls, object manipulation, and visual cues that guide
users through the authentication process.
• platform compatibility and scalability should be
considered to ensure the system can be deployed across
various devices and operating environments.
25. Working of 3D password scheme
1. Registration
• Whenever a new user tries to register, he must enter all the
details are available in the registration form.
• Now the user enters a virtual environment where he must input
textual password an also select images from the multiple
images option available.
• all these interactions now get stored in the database in an
encrypted form.
2. Authentication
• user must enter the username and password.
• Then he needs to click on the images in a proper
sequence.
• After that, all the interactions get fetched from the
database and get compared one after another upon the
grant of the access to authorized user, now he can access
all the application.
26. CHAPTER FOUR
Summary and conclusion
• The seminar titled "3D Password" aims to address the
vulnerabilities of traditional authentication systems in
today's digital era by introducing a novel approach that
utilizes three-dimensional graphical environments for
authentication.
• The 3D password is a multi-factor authentication scheme
that incorporates gestures, biometrics, and graphical
objects to create a robust and secure authentication
system.
• Furthermore, the seminar explores the security strengths
and weaknesses of the 3D password approach.
27. Cont…
• It highlights how the 3D password mitigates common
security threats, such as password guessing, shoulder
surfing, and key logger.
• Therefore, the seminar delves into user experiences,
preferences, and potential challenges in real-world
deployment, providing participants with insights to
address these usability concerns effectively.
28. Conclusion
• In conclusion, the seminar on 3D passwords has shed
light on the potential of this innovative authentication
paradigm to transform the field of security.
• With the limitations of traditional password-based
authentication systems becoming increasingly evident, the
need for stronger authentication mechanisms has become
imperative.
• The 3D password approach offers a promising solution by
incorporating multiple factors and leveraging three-
dimensional graphical environments.
29. Cont…
• The seminar has emphasized the importance of stronger
authentication methods in today's digital landscape, where the
security of personal information and sensitive data is of utmost
concern.
• By attending the seminar, participants have gained a deeper
understanding of the underlying principles, technical aspects,
and security implications of the 3D password concept.
• Generally, the seminar on 3D passwords has not only provided
participants with a comprehensive overview of the concept but
has also inspired them to explore the potential benefits and
applications of this innovative authentication paradigm.