This document proposes a new 3D password authentication scheme. It combines existing authentication methods like passwords, PINs, biometrics into a 3D virtual environment. Users can navigate the environment and interact with virtual objects, with the sequence and combination of interactions forming their unique 3D password. The scheme aims to provide passwords that are easy to remember but difficult to guess. It discusses designing the virtual environment, selecting objects, and analyzing the security and potential attacks against 3D password schemes.
2. CONTENTS
3D password overview
Aim
Three basic identification method of password
Authentication schemes
Functionalities required
3d password selection and input
3d virtual environment design guidelines
3D environment
Applications
SecurityAnalysis
Attacks and Countermeasures
Conclusion
2
3. 3d password overview
The three dimensional password(3D password) is new authentication
methodology that combines recognition ,recall what you have(tokens),and what
you are(biometrics) in one authentication systems. The idea is simply outlined
as follow.
The user navigates through a three dimensional virtual environments. The
combination and the sequence of the user action and interaction towards the
object in the three dimensional. Virtual environment constructs the user 3D
passwords. Therefore the user can walk in the virtual environment and type
something on a computer that exit in(x1,y1,z1)Position , then walk into a room
that has a white board that exit in a position(x2,y2,z2) and draw something on
the white board. The combination and the sequence of the previous two
actions towards the specific objects construct the users 3D passwords. Users
can navigate through a three dimensional virtual environment that can contain
any virtual object.
3
4. Virtual object can be any types. We will list some possible
objects to clarify the idea.
An object can be:
1.An ATM machine that requires a smart card and PIN
2.A light that can be switched on/off
3.Any real object
4.Any biometric device
5.A computer that user can type in
4
5. AIM
The aim of 3D password scheme is to propose and evaluate a new scheme
Of authentication. This scheme is based on a virtual three dimensional
environment .User navigate through the virtual environment and interact
with items inside the virtual three dimensional environment .The 3D password’s
Combines most existing authentication schemes such as textual passwords,
Graphical passwords and biometrics into one virtual three dimensional
environment .The 3D password’s main application is the protection of critical
resources and systems.
Authentication is the process of validating who you are to whom you claimed
to be .In general , there are four human authentication techniques:
1.What you know(knowledge based).
2.What you have(token based).
3.What you are(biometrics).
4.What you recognize(recognition based).
5
8. BIOMETRIC BASED
Fingerprint ,palm prints ,hand geometry ,face recognition
Intrusiveness upon a user’s personal characteristics.
GRAPHICAL PASSWORDS
Recognition based
Recall based
8
9. FUNCTIONALITIES REQUIRED
New scheme should combine the existing
authentication schemes
Freedom to select the type of authentication
technique.
Should provide secrets that are easy to
remember, difficult to guess.
9
10. 3D PASSWORD SELECTION AND
INPUT
3D environment space represented by the co-
ordinates
User navigate into the 3D virtual environment
using any input device.
The sequence of actions and interactions
forms the users 3D password.
10
11. 3D VIRTUAL ENVIRONMENT DESIGN
GUIDELINES
Real-life similarity
Object uniqueness and distinction
Three-dimensional virtual environment
System importance
11
16. CONCLUSION
Commonly used authentication schemes are
vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
User’s choice and decision to construct the desired
and preferred 3D password
16