1
3 D- PASSWORD
SCHEMES
BY:-
SWATI SINGH
B.TECH IN CSE
REG NO:-1401298347
SL NO:-46
SESSION:-2016-17
SEMESTER:-6TH
COLLEGE:-GIFT,BBSR
CONTENTS
 3D password overview
 Aim
 Three basic identification method of password
 Authentication schemes
 Functionalities required
 3d password selection and input
 3d virtual environment design guidelines
 3D environment
 Applications
 SecurityAnalysis
 Attacks and Countermeasures
 Conclusion
2
3d password overview
The three dimensional password(3D password) is new authentication
methodology that combines recognition ,recall what you have(tokens),and what
you are(biometrics) in one authentication systems. The idea is simply outlined
as follow.
The user navigates through a three dimensional virtual environments. The
combination and the sequence of the user action and interaction towards the
object in the three dimensional. Virtual environment constructs the user 3D
passwords. Therefore the user can walk in the virtual environment and type
something on a computer that exit in(x1,y1,z1)Position , then walk into a room
that has a white board that exit in a position(x2,y2,z2) and draw something on
the white board. The combination and the sequence of the previous two
actions towards the specific objects construct the users 3D passwords. Users
can navigate through a three dimensional virtual environment that can contain
any virtual object.
3
Virtual object can be any types. We will list some possible
objects to clarify the idea.
An object can be:
1.An ATM machine that requires a smart card and PIN
2.A light that can be switched on/off
3.Any real object
4.Any biometric device
5.A computer that user can type in
4
AIM
The aim of 3D password scheme is to propose and evaluate a new scheme
Of authentication. This scheme is based on a virtual three dimensional
environment .User navigate through the virtual environment and interact
with items inside the virtual three dimensional environment .The 3D password’s
Combines most existing authentication schemes such as textual passwords,
Graphical passwords and biometrics into one virtual three dimensional
environment .The 3D password’s main application is the protection of critical
resources and systems.
Authentication is the process of validating who you are to whom you claimed
to be .In general , there are four human authentication techniques:
1.What you know(knowledge based).
2.What you have(token based).
3.What you are(biometrics).
4.What you recognize(recognition based).
5
ThreeBasicIdentificationMethodsofpassword
•Password
•PIN
•Keys
•Passport
•Smart Card
•Face
•Fingerprint
•Iris
Possession
(“something I have”)
Biometrics
(“something I am”)
Knowledge
(“something I know”)
6
AUTHENTICATION SCHEMES
 KNOWLEDGE BASED
 Recall based
 Recognition based
 TOKEN BASED
EG: smart card
7
 BIOMETRIC BASED
 Fingerprint ,palm prints ,hand geometry ,face recognition
 Intrusiveness upon a user’s personal characteristics.
 GRAPHICAL PASSWORDS
 Recognition based
 Recall based
8
FUNCTIONALITIES REQUIRED
 New scheme should combine the existing
authentication schemes
 Freedom to select the type of authentication
technique.
 Should provide secrets that are easy to
remember, difficult to guess.
9
3D PASSWORD SELECTION AND
INPUT
 3D environment space represented by the co-
ordinates
 User navigate into the 3D virtual environment
using any input device.
 The sequence of actions and interactions
forms the users 3D password.
10
3D VIRTUAL ENVIRONMENT DESIGN
GUIDELINES
 Real-life similarity
 Object uniqueness and distinction
 Three-dimensional virtual environment
 System importance
11
Snapshotofavirtualenvironment,whichcontains36
picturesandsixcomputersasvirtualobjects
3D environment
12
APPLICATIONS
 Critical servers.
 Nuclear and military facilities.
 Airplanes and jet fighters.
 ATM, desktop computers and laptops.
13
SECURITY ANALYSIS
 3D Password Space Size.
 3D Password Distribution Knowledge.
14
ATTACKS AND COUNTER
MEASURES
 Brute ForceAttack
 Well-Studied Attack
 Shoulder Surfing Attack
 Timing Attack
15
CONCLUSION
 Commonly used authentication schemes are
vulnerable to attacks.
 3D Password is a multifactor authentication scheme.
 Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
 User’s choice and decision to construct the desired
and preferred 3D password
16
17
18

NOVEL 3d GRAPHICAL PASSWORD SCHEMA

  • 1.
    1 3 D- PASSWORD SCHEMES BY:- SWATISINGH B.TECH IN CSE REG NO:-1401298347 SL NO:-46 SESSION:-2016-17 SEMESTER:-6TH COLLEGE:-GIFT,BBSR
  • 2.
    CONTENTS  3D passwordoverview  Aim  Three basic identification method of password  Authentication schemes  Functionalities required  3d password selection and input  3d virtual environment design guidelines  3D environment  Applications  SecurityAnalysis  Attacks and Countermeasures  Conclusion 2
  • 3.
    3d password overview Thethree dimensional password(3D password) is new authentication methodology that combines recognition ,recall what you have(tokens),and what you are(biometrics) in one authentication systems. The idea is simply outlined as follow. The user navigates through a three dimensional virtual environments. The combination and the sequence of the user action and interaction towards the object in the three dimensional. Virtual environment constructs the user 3D passwords. Therefore the user can walk in the virtual environment and type something on a computer that exit in(x1,y1,z1)Position , then walk into a room that has a white board that exit in a position(x2,y2,z2) and draw something on the white board. The combination and the sequence of the previous two actions towards the specific objects construct the users 3D passwords. Users can navigate through a three dimensional virtual environment that can contain any virtual object. 3
  • 4.
    Virtual object canbe any types. We will list some possible objects to clarify the idea. An object can be: 1.An ATM machine that requires a smart card and PIN 2.A light that can be switched on/off 3.Any real object 4.Any biometric device 5.A computer that user can type in 4
  • 5.
    AIM The aim of3D password scheme is to propose and evaluate a new scheme Of authentication. This scheme is based on a virtual three dimensional environment .User navigate through the virtual environment and interact with items inside the virtual three dimensional environment .The 3D password’s Combines most existing authentication schemes such as textual passwords, Graphical passwords and biometrics into one virtual three dimensional environment .The 3D password’s main application is the protection of critical resources and systems. Authentication is the process of validating who you are to whom you claimed to be .In general , there are four human authentication techniques: 1.What you know(knowledge based). 2.What you have(token based). 3.What you are(biometrics). 4.What you recognize(recognition based). 5
  • 6.
  • 7.
    AUTHENTICATION SCHEMES  KNOWLEDGEBASED  Recall based  Recognition based  TOKEN BASED EG: smart card 7
  • 8.
     BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition  Intrusiveness upon a user’s personal characteristics.  GRAPHICAL PASSWORDS  Recognition based  Recall based 8
  • 9.
    FUNCTIONALITIES REQUIRED  Newscheme should combine the existing authentication schemes  Freedom to select the type of authentication technique.  Should provide secrets that are easy to remember, difficult to guess. 9
  • 10.
    3D PASSWORD SELECTIONAND INPUT  3D environment space represented by the co- ordinates  User navigate into the 3D virtual environment using any input device.  The sequence of actions and interactions forms the users 3D password. 10
  • 11.
    3D VIRTUAL ENVIRONMENTDESIGN GUIDELINES  Real-life similarity  Object uniqueness and distinction  Three-dimensional virtual environment  System importance 11
  • 12.
  • 13.
    APPLICATIONS  Critical servers. Nuclear and military facilities.  Airplanes and jet fighters.  ATM, desktop computers and laptops. 13
  • 14.
    SECURITY ANALYSIS  3DPassword Space Size.  3D Password Distribution Knowledge. 14
  • 15.
    ATTACKS AND COUNTER MEASURES Brute ForceAttack  Well-Studied Attack  Shoulder Surfing Attack  Timing Attack 15
  • 16.
    CONCLUSION  Commonly usedauthentication schemes are vulnerable to attacks.  3D Password is a multifactor authentication scheme.  Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.  User’s choice and decision to construct the desired and preferred 3D password 16
  • 17.
  • 18.