SlideShare a Scribd company logo
New Era of Authentication: 3D PASSWORD
Vinneta R,Vaibhavi K S
Students of Telecommunication Engineering,
S J C Institute Of Technology, Chikkaballapur
vineee.1993@gmail.com,vaibhavi.sp93@gmail.com
Abstract — Current authentication systems suffer
from many weaknesses. Textual passwords are
commonly used. Users tend to choose common words
from dictionaries and day to day life, which make
textual passwords easy to crack and exposed to
dictionary or basic force attacks. Smart cards or
tokens can be stolen. Many biometric authentications
have been proposed but some people hate the fact to
carry around their cards, some refuse to undergo
strong IR exposure to their retinas. The 3-D
password is a multifactor authentication scheme.
Mainly the 3-D passwords are the combination of
physical and biometric authentication. The sequence
of actions and interfaces toward the objects inside
the 3-D environment constructs the user’s 3-D
password. The 3-D password can combine most
existing authentication schemes such as textual
passwords, graphical passwords, and various types
of biometrics into a 3-D virtual environment. The
design of the 3-D virtual environment and the type of
objects selected conclude the 3-D password key space.
Keywords — 3-D password, authentication, biometric,
virtual environment
I. INTRODUCTION
Normally the authentication scheme the user
experiences are particularly very easy or very difficult.
Throughout the years authentication has been a very
exciting approach. Having a lot of technologies around,
it can be very easy for 'others' to steal identity or to hack
user’s password. Therefore many procedures have come
up for the calculation of a secret key to secure user’s
password. The algorithms or procedures are based on
approach to pick a random number in the range of 10^6
and then the risks of the same number coming is rare.
User mostly uses textual passwords, graphical
passwords or the biometrics to secure their things or
works nowadays. The above tactic is mainly used in
textual algorithm. But most of the people uses their day
to day used name or number such as their pet name or
their phone numbers or their date of birth as their
passwords which are easily detectable by a hacker.
Smart cards are also used for authentication but they also
fails and these tokens or smart card can be stolen.
Many biometric authentications have been introduced
but most of the users are not willing to biometrics due to
their inappropriateness and the effect on their privacy. So
these biometrics cannot be implemented everywhere.[3]
Therefore the idea of 3-D password is come up. This
is easily customizable and very interesting way of
authentication than before. The concept of 3-D
passwords promotes development, diplomacy, and
defence as security strategies. It is a multi feature
authentication scheme which combines the benefits of
different authentication schemes in a single virtual
environment. By this user will have the choice to select
whether this password will be only recall, biometrics,
token or recognition based, or a combination of two or
more schemes. User can make infinite number of 3-D
passwords by combining any two or more different
schemes. Therefore this scheme will be more
acceptable to user as it will provide more security than
any other authentication schemes. Giving the user the
freedom of selection as to what type of authentication
schemes will be included in their 3-D password and
given the large number of objects and items in the
environment(virtual), the number of possible 3-D
passwords will increase. Thus, it becomes much more
difficult for the attacker or say hackers to guess the
user’s 3-D password.
Fig. 1 .Basic idea of 3-D password
Recall
Recognition
Biometrics
3D
password
BRIEF DESCRIPTION OF 3-ENVIRONMENT
Fig.2. Snapshot of 3-d virtual environment [1]
2.1 Different object that can be used in 3D
environment [1]
1. A computer with which the user can type;
2. A fingerprint reader that requires the user’s fingerprint;
3. A biometric recognition device;
4. A paper or a white board that a user can write, sign, or
draw on;
5. An automated teller machine (ATM) that requests a
token;
6. A light that can be switched on/off;
7. A television or radio where channels can be selected;
8. A staple that can be punched;
9. A car that can be driven;
10. A book that can be moved from one place to another;
11. Any graphical password scheme;
12. Any real life object;
13. Any upcoming authentication scheme.
3-D PASSWORD SELECTION AND INPUTS
Let us consider a 3-D virtual environment space of size
G×G×G. The 3-D environment space is represented by
the coordinates (x, y, z) [1, . . ., G] ∈ × [1, . . . ., G] ×
[1,. . . , G]. Fig.2. Snapshot of 3-d virtual environment
[1]
The objects are distributed in the 3-D virtual
environment with
unique (x, y, z) coordinates.
We assume that the user can navigate into 3-D virtual
environment and interact with the objects using any input
device such as a mouse, keyboard, fingerprint scanner,
card reader, and microphone. We consider the
sequence of those actions and interactions using the
previous input devices as the user’s 3-D password [4].The
initial representation of user actions in the 3-D
virtual environment can be recorded as follows:
1. (10,20,21)Action = Open door;
2. (10,20,21)Action = Close door;
3. (5,7,16) Action =
Typing “S”;
4. (5,7,16) Action =
Typing, “K”;
5. (5,7,16) Action = Typing, “A”; (5,7,16) Action
Typing, “V”;
6. (5,7,16) Action = Typing, “O”; (5,7,16) Action =
Typing, “V”;
7. (10,44,71) Action = Pick up
the book;
8. (1,38, 71) Action = Drawing point
(110,290).
Fig. 3. User entering textual password in 3-D
environment [5]
II. IMPLEMENTATION OF 3-D PASSWORD
Following are the steps for authentication (refer fig.4):
1. User will connect to the server for system login.
2. After successful client-server connection registration
form will be filled up.
3. User will now enter into virtual 3-D environment.
4. Now the user will perform its authentication steps
according to set design.
5. User enters his textual password. If the textual
password is successfully logged in, it will enter into
graphical password window else it will go back to
Login form (refer fig.3).
6. On the other hand, if the graphical password is
successfully logged in various services will be
performed such as biometrics and tokens.
7. Services include Upload (), Save (), Delete (), Open
() and etc..
8. Finally, the user will log out from the 3-D
environment.
Fig.4 State diagram showing the implementation
of3-D password
V. SECURITY ANALYSIS
5.1. 3D Password space size
To find out the password space, we have to count all
possible 3D passwords that have a certain number of
actions, interactions, and inputs towards all objects that
exist in the 3D virtual environments[2].
5.2. 3D password distribution knowledge
Users tend to use meaningful words for textual passwords.
Therefore finding these different words from dictionary is a
relatively simple task which yields a high success rate for
breaking textual passwords. Pass faces users tend to choose
faces that reflect their own taste on facial attractiveness,
race, and gender. Every user has different requirements and
preferences when selecting the appropriate 3D Password.
This fact will increase the effort required to find a pattern
of user’s highly selected 3D password. In addition, since
the 3D password combines several authentication schemes
into a single authentication environment, the attacker has to
study every single authentication scheme and has to
discover what the most probable selected secrets are. Since
every 3D password system can be designed according to
the protected system requirements, the attacker has to
separately study every 3D password system. Therefore,
more effort is required to build the
knowledge of most probable 3D passwords [7].
VI. PROBABILITY OF SYSTEM HACK [6]
Let the Textual Password Hack Probability = 1/x
Let the Graphical Password I Hack Probability = 1/y1
Let the Graphical Password I Hack Probability = 1/y2
Let the Graphical Password I Hack Probability = 1/y3
Let the Graphical Password I Hack Probability = 1/y4
Let the Face Recognition Hack Probability = 1/z
Combination Probability = 1/(xy1y2y3y4z)
Combinatorics for the Choice of six
= 6C6*6C5*6C4*6C3*6C2*6C1
= 1*6*15*20*15*6
= 162000
SYSTEM BREAK PROBABILITY:
=
(1/xy1y2y3y4z)*(1/162000)
VII. 3D PASSWORD APPLICATIONS
The 3-D password can have a password space that is very
large compared to other authentication schemes. So, the
3-D password’s main application domains are protecting
critical systems and resources.
7.1. Critical servers – Many large organizations have
critical servers that are usually protected by a textual
password. A3-D password authentication proposes a
sound replacement for a textual password[4].
7.2. Nuclear and military facilities – Such facilities
should be protected by the most powerful authentication
systems. The 3-D password has a very large probable
password space, and since it can contain token,
biometrics, recognition, and knowledge-based
authentications I a single authentication system, it is a
sound choice for high level security locations[4].
7.3. Airplanes and jet fighters – Because of the possible
threat of miscuing airplanes and jet fighters for religo-
political agendas, usage of such protected by a powerful
authentication system[4].
In addition, 3D passwords can be used in less critical
systems because the 3-D virtual environment can be
designed to fit to any system needs. A small virtual
environment can be used in the following systems like
• ATM[3]
• Personal Digital Assistance
• Desktop Computers & laptop logins
• Web authentication
VIII. ADVANTAGES OF 3-D PASSWORD [3]
8.1. The new scheme provide secrets that are easy to
remember and very difficult for intruders to guess.
8.2 The new scheme provides secrets that are not easy to
write down on paper. Moreover, the scheme secrets should
be difficult to share with others.
8.3 The new scheme provides secrets that can be easily
revoked.
IX. DISADVANTAGES OF 3-D PASSWORD
9.1. As compare to traditional password approach this
approach will definitely take more time to do user
authentication [4].
9.2. More storage space required because it needs to save
images which is large binary objects [4].
9.3. More costly due to required devices like web cam,
finger print device etc.
9.4. More complex than previous authentication schemes
X. CONCLUSION
In 3D password system as number of series of action and
interaction in the virtual 3D environment increases then the
length of the codeword or the authentication key’s length
also increases. The amount of memory that is required to
store a 3D password is large when compared to a textual
password but provides far better security than textual
password. Any user can make use of it no special training is
required. Now a day’s password security is in high demand.
This 3D technique will definitely serve the purpose. The
choice of what authentication schemes will be part of the
user’s 3-d password reflects the user’s preferences and
requirements. A user who prefers to remember and recall a
password might choose textual and graphical passwords
apart of their 3-D password. On the other hand, user’s who
have more difficulty with memory or recall might prefer to
choose smart cards as their 3-D password. Moreover,
user who prefers to keep any kind of biometrical data
private might not interact with objects that require
biometric information. Therefore, it is the user’s choice and
decision to construct the desired and preferred 3-D
password.
REFERENCES
[1]. Fawaz Alsulaiman and Abdulmotaleb El Saddik ,
“Three Dimensional Password for more Secure
Authentication” ,IEEE Transactions on Instrumentations
and Measurement.
[2]. Tejal Kognule and Yugandhara Thumbre and Snehal
Kognule, “3D password”, International Journal of
Computer Applications(IJCA),2012.
[3]. NBC news, ATM Fraud: Banking on Your Money,
Dateline Hidden Cameras Show Criminals Owning ATMs,
Dec. 11, 2003.
[4].Manila M V,“Three Dimensional Password for More
SecureAuthentication”,netlab.cs.iitm.ernet.in/cs648/2009/tp
f/cs08m028.pdf ,2009.
[6]. Prof. Gauri Rao ,”SECUREZZA”, IT Journal of
Research, Volume 1, May 2010
[7]. Fawaz A Alsulaiman and Abdulmotaleb El Saddik, “A
Novel 3D Graphical Password Schema”,IEEE International
Conference on Virtual Environments, Human-Computer
Interfaces and Measurement Systems, July 2006
New era of authentication

More Related Content

What's hot

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Akhi Balakrishnan
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
Kanishka Khandelwal
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
JYoTHiSH o.s
 

What's hot (20)

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password
3d password3d password
3d password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D password
3D password 3D password
3D password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D Password
3D Password3D Password
3D Password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Similar to New era of authentication

Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
C0361419
C0361419C0361419
C0361419
iosrjournals
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.docAjay Kumar
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3D - password
3D - password3D - password
3D - password
BhavikParmar24
 
3 d password
3 d password3 d password
3 d password
Izhar Cheema
 
Vivek
VivekVivek
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3d passwords
3d passwords 3d passwords
3d passwords
Sunanda Bansal
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 

Similar to New era of authentication (20)

Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3 d password
3 d password3 d password
3 d password
 
3d authentication
3d authentication3d authentication
3d authentication
 
C0361419
C0361419C0361419
C0361419
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D - password
3D - password3D - password
3D - password
 
3 d password
3 d password3 d password
3 d password
 
Vivek
VivekVivek
Vivek
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d passwords
3d passwords 3d passwords
3d passwords
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 

More from sunil kumar

Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously
sunil kumar
 
Best ways to loose weight Naturaly
Best ways to loose weight NaturalyBest ways to loose weight Naturaly
Best ways to loose weight Naturaly
sunil kumar
 
Gam ks egnfk
Gam ks egnfkGam ks egnfk
Gam ks egnfk
sunil kumar
 
how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000
sunil kumar
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005sunil kumar
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectivessunil kumar
 
Comp tia a_220-801_objectives
Comp tia a_220-801_objectivesComp tia a_220-801_objectives
Comp tia a_220-801_objectivessunil kumar
 
Types of optical device
Types of optical deviceTypes of optical device
Types of optical devicesunil kumar
 
Classification of computers
Classification of computersClassification of computers
Classification of computerssunil kumar
 
Not bridge south bridge archexture
Not bridge  south bridge archextureNot bridge  south bridge archexture
Not bridge south bridge archexturesunil kumar
 
Dns introduction
Dns   introduction Dns   introduction
Dns introduction sunil kumar
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazysunil kumar
 

More from sunil kumar (20)

Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously
 
Best ways to loose weight Naturaly
Best ways to loose weight NaturalyBest ways to loose weight Naturaly
Best ways to loose weight Naturaly
 
Gam ks egnfk
Gam ks egnfkGam ks egnfk
Gam ks egnfk
 
how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000
 
Ping
PingPing
Ping
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectives
 
Comp tia a_220-801_objectives
Comp tia a_220-801_objectivesComp tia a_220-801_objectives
Comp tia a_220-801_objectives
 
App b
App bApp b
App b
 
Smps
SmpsSmps
Smps
 
Types of optical device
Types of optical deviceTypes of optical device
Types of optical device
 
Memoryhierarchy
MemoryhierarchyMemoryhierarchy
Memoryhierarchy
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Osi model
Osi modelOsi model
Osi model
 
Not bridge south bridge archexture
Not bridge  south bridge archextureNot bridge  south bridge archexture
Not bridge south bridge archexture
 
Dns introduction
Dns   introduction Dns   introduction
Dns introduction
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy
 
Adeex
AdeexAdeex
Adeex
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

New era of authentication

  • 1. New Era of Authentication: 3D PASSWORD Vinneta R,Vaibhavi K S Students of Telecommunication Engineering, S J C Institute Of Technology, Chikkaballapur vineee.1993@gmail.com,vaibhavi.sp93@gmail.com Abstract — Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose common words from dictionaries and day to day life, which make textual passwords easy to crack and exposed to dictionary or basic force attacks. Smart cards or tokens can be stolen. Many biometric authentications have been proposed but some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas. The 3-D password is a multifactor authentication scheme. Mainly the 3-D passwords are the combination of physical and biometric authentication. The sequence of actions and interfaces toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected conclude the 3-D password key space. Keywords — 3-D password, authentication, biometric, virtual environment I. INTRODUCTION Normally the authentication scheme the user experiences are particularly very easy or very difficult. Throughout the years authentication has been a very exciting approach. Having a lot of technologies around, it can be very easy for 'others' to steal identity or to hack user’s password. Therefore many procedures have come up for the calculation of a secret key to secure user’s password. The algorithms or procedures are based on approach to pick a random number in the range of 10^6 and then the risks of the same number coming is rare. User mostly uses textual passwords, graphical passwords or the biometrics to secure their things or works nowadays. The above tactic is mainly used in textual algorithm. But most of the people uses their day to day used name or number such as their pet name or their phone numbers or their date of birth as their passwords which are easily detectable by a hacker. Smart cards are also used for authentication but they also fails and these tokens or smart card can be stolen. Many biometric authentications have been introduced but most of the users are not willing to biometrics due to their inappropriateness and the effect on their privacy. So these biometrics cannot be implemented everywhere.[3] Therefore the idea of 3-D password is come up. This is easily customizable and very interesting way of authentication than before. The concept of 3-D passwords promotes development, diplomacy, and defence as security strategies. It is a multi feature authentication scheme which combines the benefits of different authentication schemes in a single virtual environment. By this user will have the choice to select whether this password will be only recall, biometrics, token or recognition based, or a combination of two or more schemes. User can make infinite number of 3-D passwords by combining any two or more different schemes. Therefore this scheme will be more acceptable to user as it will provide more security than any other authentication schemes. Giving the user the freedom of selection as to what type of authentication schemes will be included in their 3-D password and given the large number of objects and items in the environment(virtual), the number of possible 3-D passwords will increase. Thus, it becomes much more difficult for the attacker or say hackers to guess the user’s 3-D password. Fig. 1 .Basic idea of 3-D password Recall Recognition Biometrics 3D password
  • 2. BRIEF DESCRIPTION OF 3-ENVIRONMENT Fig.2. Snapshot of 3-d virtual environment [1] 2.1 Different object that can be used in 3D environment [1] 1. A computer with which the user can type; 2. A fingerprint reader that requires the user’s fingerprint; 3. A biometric recognition device; 4. A paper or a white board that a user can write, sign, or draw on; 5. An automated teller machine (ATM) that requests a token; 6. A light that can be switched on/off; 7. A television or radio where channels can be selected; 8. A staple that can be punched; 9. A car that can be driven; 10. A book that can be moved from one place to another; 11. Any graphical password scheme; 12. Any real life object; 13. Any upcoming authentication scheme. 3-D PASSWORD SELECTION AND INPUTS Let us consider a 3-D virtual environment space of size G×G×G. The 3-D environment space is represented by the coordinates (x, y, z) [1, . . ., G] ∈ × [1, . . . ., G] × [1,. . . , G]. Fig.2. Snapshot of 3-d virtual environment [1] The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, card reader, and microphone. We consider the sequence of those actions and interactions using the previous input devices as the user’s 3-D password [4].The initial representation of user actions in the 3-D virtual environment can be recorded as follows: 1. (10,20,21)Action = Open door; 2. (10,20,21)Action = Close door; 3. (5,7,16) Action = Typing “S”; 4. (5,7,16) Action = Typing, “K”; 5. (5,7,16) Action = Typing, “A”; (5,7,16) Action Typing, “V”; 6. (5,7,16) Action = Typing, “O”; (5,7,16) Action = Typing, “V”; 7. (10,44,71) Action = Pick up the book; 8. (1,38, 71) Action = Drawing point (110,290).
  • 3. Fig. 3. User entering textual password in 3-D environment [5] II. IMPLEMENTATION OF 3-D PASSWORD Following are the steps for authentication (refer fig.4): 1. User will connect to the server for system login. 2. After successful client-server connection registration form will be filled up. 3. User will now enter into virtual 3-D environment. 4. Now the user will perform its authentication steps according to set design. 5. User enters his textual password. If the textual password is successfully logged in, it will enter into graphical password window else it will go back to Login form (refer fig.3). 6. On the other hand, if the graphical password is successfully logged in various services will be performed such as biometrics and tokens. 7. Services include Upload (), Save (), Delete (), Open () and etc.. 8. Finally, the user will log out from the 3-D environment. Fig.4 State diagram showing the implementation of3-D password
  • 4. V. SECURITY ANALYSIS 5.1. 3D Password space size To find out the password space, we have to count all possible 3D passwords that have a certain number of actions, interactions, and inputs towards all objects that exist in the 3D virtual environments[2]. 5.2. 3D password distribution knowledge Users tend to use meaningful words for textual passwords. Therefore finding these different words from dictionary is a relatively simple task which yields a high success rate for breaking textual passwords. Pass faces users tend to choose faces that reflect their own taste on facial attractiveness, race, and gender. Every user has different requirements and preferences when selecting the appropriate 3D Password. This fact will increase the effort required to find a pattern of user’s highly selected 3D password. In addition, since the 3D password combines several authentication schemes into a single authentication environment, the attacker has to study every single authentication scheme and has to discover what the most probable selected secrets are. Since every 3D password system can be designed according to the protected system requirements, the attacker has to separately study every 3D password system. Therefore, more effort is required to build the knowledge of most probable 3D passwords [7].
  • 5. VI. PROBABILITY OF SYSTEM HACK [6] Let the Textual Password Hack Probability = 1/x Let the Graphical Password I Hack Probability = 1/y1 Let the Graphical Password I Hack Probability = 1/y2 Let the Graphical Password I Hack Probability = 1/y3 Let the Graphical Password I Hack Probability = 1/y4 Let the Face Recognition Hack Probability = 1/z Combination Probability = 1/(xy1y2y3y4z) Combinatorics for the Choice of six = 6C6*6C5*6C4*6C3*6C2*6C1 = 1*6*15*20*15*6 = 162000 SYSTEM BREAK PROBABILITY: = (1/xy1y2y3y4z)*(1/162000) VII. 3D PASSWORD APPLICATIONS The 3-D password can have a password space that is very large compared to other authentication schemes. So, the 3-D password’s main application domains are protecting critical systems and resources. 7.1. Critical servers – Many large organizations have critical servers that are usually protected by a textual password. A3-D password authentication proposes a sound replacement for a textual password[4]. 7.2. Nuclear and military facilities – Such facilities should be protected by the most powerful authentication systems. The 3-D password has a very large probable password space, and since it can contain token, biometrics, recognition, and knowledge-based authentications I a single authentication system, it is a sound choice for high level security locations[4]. 7.3. Airplanes and jet fighters – Because of the possible threat of miscuing airplanes and jet fighters for religo- political agendas, usage of such protected by a powerful authentication system[4]. In addition, 3D passwords can be used in less critical systems because the 3-D virtual environment can be designed to fit to any system needs. A small virtual environment can be used in the following systems like • ATM[3] • Personal Digital Assistance • Desktop Computers & laptop logins • Web authentication VIII. ADVANTAGES OF 3-D PASSWORD [3] 8.1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 8.2 The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 8.3 The new scheme provides secrets that can be easily revoked. IX. DISADVANTAGES OF 3-D PASSWORD 9.1. As compare to traditional password approach this approach will definitely take more time to do user authentication [4]. 9.2. More storage space required because it needs to save images which is large binary objects [4]. 9.3. More costly due to required devices like web cam, finger print device etc. 9.4. More complex than previous authentication schemes X. CONCLUSION In 3D password system as number of series of action and interaction in the virtual 3D environment increases then the length of the codeword or the authentication key’s length also increases. The amount of memory that is required to store a 3D password is large when compared to a textual password but provides far better security than textual password. Any user can make use of it no special training is required. Now a day’s password security is in high demand. This 3D technique will definitely serve the purpose. The choice of what authentication schemes will be part of the user’s 3-d password reflects the user’s preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical passwords apart of their 3-D password. On the other hand, user’s who have more difficulty with memory or recall might prefer to choose smart cards as their 3-D password. Moreover, user who prefers to keep any kind of biometrical data private might not interact with objects that require biometric information. Therefore, it is the user’s choice and decision to construct the desired and preferred 3-D password. REFERENCES [1]. Fawaz Alsulaiman and Abdulmotaleb El Saddik , “Three Dimensional Password for more Secure Authentication” ,IEEE Transactions on Instrumentations and Measurement. [2]. Tejal Kognule and Yugandhara Thumbre and Snehal Kognule, “3D password”, International Journal of Computer Applications(IJCA),2012. [3]. NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. [4].Manila M V,“Three Dimensional Password for More SecureAuthentication”,netlab.cs.iitm.ernet.in/cs648/2009/tp f/cs08m028.pdf ,2009. [6]. Prof. Gauri Rao ,”SECUREZZA”, IT Journal of Research, Volume 1, May 2010 [7]. Fawaz A Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D Graphical Password Schema”,IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems, July 2006