SlideShare a Scribd company logo
1 of 18
1
3 D- PASSWORD
SCHEMES
BY:-
SWATI SINGH
B.TECH IN CSE
REG NO:-1401298347
SL NO:-46
SESSION:-2016-17
SEMESTER:-6TH
COLLEGE:-GIFT,BBSR
CONTENTS
 3D password overview
 Aim
 Three basic identification method of password
 Authentication schemes
 Functionalities required
 3d password selection and input
 3d virtual environment design guidelines
 3D environment
 Applications
 SecurityAnalysis
 Attacks and Countermeasures
 Conclusion
2
3d password overview
The three dimensional password(3D password) is new authentication
methodology that combines recognition ,recall what you have(tokens),and what
you are(biometrics) in one authentication systems. The idea is simply outlined
as follow.
The user navigates through a three dimensional virtual environments. The
combination and the sequence of the user action and interaction towards the
object in the three dimensional. Virtual environment constructs the user 3D
passwords. Therefore the user can walk in the virtual environment and type
something on a computer that exit in(x1,y1,z1)Position , then walk into a room
that has a white board that exit in a position(x2,y2,z2) and draw something on
the white board. The combination and the sequence of the previous two
actions towards the specific objects construct the users 3D passwords. Users
can navigate through a three dimensional virtual environment that can contain
any virtual object.
3
Virtual object can be any types. We will list some possible
objects to clarify the idea.
An object can be:
1.An ATM machine that requires a smart card and PIN
2.A light that can be switched on/off
3.Any real object
4.Any biometric device
5.A computer that user can type in
4
AIM
The aim of 3D password scheme is to propose and evaluate a new scheme
Of authentication. This scheme is based on a virtual three dimensional
environment .User navigate through the virtual environment and interact
with items inside the virtual three dimensional environment .The 3D password’s
Combines most existing authentication schemes such as textual passwords,
Graphical passwords and biometrics into one virtual three dimensional
environment .The 3D password’s main application is the protection of critical
resources and systems.
Authentication is the process of validating who you are to whom you claimed
to be .In general , there are four human authentication techniques:
1.What you know(knowledge based).
2.What you have(token based).
3.What you are(biometrics).
4.What you recognize(recognition based).
5
ThreeBasicIdentificationMethodsofpassword
•Password
•PIN
•Keys
•Passport
•Smart Card
•Face
•Fingerprint
•Iris
Possession
(“something I have”)
Biometrics
(“something I am”)
Knowledge
(“something I know”)
6
AUTHENTICATION SCHEMES
 KNOWLEDGE BASED
 Recall based
 Recognition based
 TOKEN BASED
EG: smart card
7
 BIOMETRIC BASED
 Fingerprint ,palm prints ,hand geometry ,face recognition
 Intrusiveness upon a user’s personal characteristics.
 GRAPHICAL PASSWORDS
 Recognition based
 Recall based
8
FUNCTIONALITIES REQUIRED
 New scheme should combine the existing
authentication schemes
 Freedom to select the type of authentication
technique.
 Should provide secrets that are easy to
remember, difficult to guess.
9
3D PASSWORD SELECTION AND
INPUT
 3D environment space represented by the co-
ordinates
 User navigate into the 3D virtual environment
using any input device.
 The sequence of actions and interactions
forms the users 3D password.
10
3D VIRTUAL ENVIRONMENT DESIGN
GUIDELINES
 Real-life similarity
 Object uniqueness and distinction
 Three-dimensional virtual environment
 System importance
11
Snapshotofavirtualenvironment,whichcontains36
picturesandsixcomputersasvirtualobjects
3D environment
12
APPLICATIONS
 Critical servers.
 Nuclear and military facilities.
 Airplanes and jet fighters.
 ATM, desktop computers and laptops.
13
SECURITY ANALYSIS
 3D Password Space Size.
 3D Password Distribution Knowledge.
14
ATTACKS AND COUNTER
MEASURES
 Brute ForceAttack
 Well-Studied Attack
 Shoulder Surfing Attack
 Timing Attack
15
CONCLUSION
 Commonly used authentication schemes are
vulnerable to attacks.
 3D Password is a multifactor authentication scheme.
 Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
 User’s choice and decision to construct the desired
and preferred 3D password
16
17
18

More Related Content

What's hot (20)

3d passwords
3d passwords3d passwords
3d passwords
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 

Viewers also liked

Cloud Computing in 3-D
Cloud Computing in 3-DCloud Computing in 3-D
Cloud Computing in 3-DEverest Group
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computerAnjali Agarwal
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 

Viewers also liked (10)

Cloud Computing in 3-D
Cloud Computing in 3-DCloud Computing in 3-D
Cloud Computing in 3-D
 
3 d password
3 d password3 d password
3 d password
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 

Similar to NOVEL 3d GRAPHICAL PASSWORD SCHEMA

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakadkuldeepdhakad
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriyajanapriyanaidu
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02bujjiflute
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.docAjay Kumar
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schemaIOSR Journals
 

Similar to NOVEL 3d GRAPHICAL PASSWORD SCHEMA (20)

3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
C0361419
C0361419C0361419
C0361419
 
3D password
3D password3D password
3D password
 
Vivek
VivekVivek
Vivek
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password
3D Password3D Password
3D Password
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

NOVEL 3d GRAPHICAL PASSWORD SCHEMA

  • 1. 1 3 D- PASSWORD SCHEMES BY:- SWATI SINGH B.TECH IN CSE REG NO:-1401298347 SL NO:-46 SESSION:-2016-17 SEMESTER:-6TH COLLEGE:-GIFT,BBSR
  • 2. CONTENTS  3D password overview  Aim  Three basic identification method of password  Authentication schemes  Functionalities required  3d password selection and input  3d virtual environment design guidelines  3D environment  Applications  SecurityAnalysis  Attacks and Countermeasures  Conclusion 2
  • 3. 3d password overview The three dimensional password(3D password) is new authentication methodology that combines recognition ,recall what you have(tokens),and what you are(biometrics) in one authentication systems. The idea is simply outlined as follow. The user navigates through a three dimensional virtual environments. The combination and the sequence of the user action and interaction towards the object in the three dimensional. Virtual environment constructs the user 3D passwords. Therefore the user can walk in the virtual environment and type something on a computer that exit in(x1,y1,z1)Position , then walk into a room that has a white board that exit in a position(x2,y2,z2) and draw something on the white board. The combination and the sequence of the previous two actions towards the specific objects construct the users 3D passwords. Users can navigate through a three dimensional virtual environment that can contain any virtual object. 3
  • 4. Virtual object can be any types. We will list some possible objects to clarify the idea. An object can be: 1.An ATM machine that requires a smart card and PIN 2.A light that can be switched on/off 3.Any real object 4.Any biometric device 5.A computer that user can type in 4
  • 5. AIM The aim of 3D password scheme is to propose and evaluate a new scheme Of authentication. This scheme is based on a virtual three dimensional environment .User navigate through the virtual environment and interact with items inside the virtual three dimensional environment .The 3D password’s Combines most existing authentication schemes such as textual passwords, Graphical passwords and biometrics into one virtual three dimensional environment .The 3D password’s main application is the protection of critical resources and systems. Authentication is the process of validating who you are to whom you claimed to be .In general , there are four human authentication techniques: 1.What you know(knowledge based). 2.What you have(token based). 3.What you are(biometrics). 4.What you recognize(recognition based). 5
  • 7. AUTHENTICATION SCHEMES  KNOWLEDGE BASED  Recall based  Recognition based  TOKEN BASED EG: smart card 7
  • 8.  BIOMETRIC BASED  Fingerprint ,palm prints ,hand geometry ,face recognition  Intrusiveness upon a user’s personal characteristics.  GRAPHICAL PASSWORDS  Recognition based  Recall based 8
  • 9. FUNCTIONALITIES REQUIRED  New scheme should combine the existing authentication schemes  Freedom to select the type of authentication technique.  Should provide secrets that are easy to remember, difficult to guess. 9
  • 10. 3D PASSWORD SELECTION AND INPUT  3D environment space represented by the co- ordinates  User navigate into the 3D virtual environment using any input device.  The sequence of actions and interactions forms the users 3D password. 10
  • 11. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES  Real-life similarity  Object uniqueness and distinction  Three-dimensional virtual environment  System importance 11
  • 13. APPLICATIONS  Critical servers.  Nuclear and military facilities.  Airplanes and jet fighters.  ATM, desktop computers and laptops. 13
  • 14. SECURITY ANALYSIS  3D Password Space Size.  3D Password Distribution Knowledge. 14
  • 15. ATTACKS AND COUNTER MEASURES  Brute ForceAttack  Well-Studied Attack  Shoulder Surfing Attack  Timing Attack 15
  • 16. CONCLUSION  Commonly used authentication schemes are vulnerable to attacks.  3D Password is a multifactor authentication scheme.  Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.  User’s choice and decision to construct the desired and preferred 3D password 16
  • 17. 17
  • 18. 18