Submitted By: Name: S.Vaishnavi@ Bhavani Class: II M.SC (CS & IT) Roll - No: BPN10

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 20

Submitted By

Name Class : S.Vaishnavi@ Bhavani : II M.sc (CS & IT)

Roll.no : BPN10

INDEX
Introduction Proposed System 3D Password

3-D Password Scheme

3-D Password Overview 3-D Password Selection and Inputs 3-D Virtual Environment Design Guidelines 3-D Password Applications Security Analysis Conclusion And Future work

ABSTRACT
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someones password. Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the users 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment.

Introduction
Three Basic Identification Methods of password

Possession (Something I have)

Biometrics (Something I am)

Knowledge (Something I know)

Password It is basically an encryption algorithm. Usually it is 8-15 character or slightly more than that. Mostly textual passwords now a day are kept very simple say a word from the dictionary or their pet names, friends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

Biometrics Refer to a broad range of technologies Automate the identification or verification of an individual Based on human characteristics or body organs o Physiological: Face, fingerprint, iris o Behavioral: Hand-written signature, voice

Characteristics Templates
011001010010101 011010100100110 001100010010010...

But biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics. But what to do when you have crack or wound in your finger. In this situation you might be in trouble. And now days some hackers even implement exact copy of your biometrics also

PROPOSED SYSTEM

The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the users freedom of selection is important.

The following requirements are satisfied in the proposed scheme 1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3. The new scheme provides secrets that can be easily revoked or changed.

3D PASSWORD
The dramatic increase of computer usage has given rise to many security concerns. One

major security concern is authentication, which is the process of validating who you are to whom you claimed to be. In general, human authentication techniques can be classified as knowledge based (what you know), token based (what you have), and biometrics (what you are).

Knowledge-based authentication can be further divided into two categories as follows: 1)

recall based and 2) recognition based. Recall-based techniques require the user to repeat or reproduce a secret that the user created before. Recognition based techniques require the user to identify and recognize the secret, or part of it, that the user selected before. One of the most common recall-based authentication schemes used in the computer world

is textual passwords. One major drawback of the textual password is its two conflicting requirements: the selection of passwords that are easy to remember and, at the same time, are hard to guess.

Many biometric schemes have been proposed; fingerprints, palm prints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition are all different biometric schemes. Each biometric recognition scheme has its advantages and disadvantages based on several factors such as consistency, uniqueness, and acceptability. One of the main drawbacks of applying biometrics is its intrusiveness upon a users personal characteristic. Moreover, retina biometrical recognition schemes require the user to willingly subject their eyes to a low-intensity infrared light. In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users. The 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. It is the users choice to select which type of authentication techniques will be part of their 3-D password. This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring the objects that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase. Thus, it becomes much more difficult for the attacker to guess the users 3-D password.

3-D PASSWORD SCHEME


1) The new scheme should not be either recall based or Recognition based only. Instead, the scheme should be a combination of recall-, recognition-, biometrics-, and Token-based authentication schemes. 2) Users ought to have the freedom to select whether the 3-D password will be solely recall-, biometrics-, recognition-, or token-based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Some users do not like to carry cards. Some users do not like to provide biometrical data, and some users have poor memories. Therefore, to ensure high user acceptability, the users freedom of selection is important. 3) The new scheme should provide secrets that are easy to remember and very difficult for intruders to guess. 4) The new scheme should provide secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 5) The new scheme should provide secrets that can be easily revoked or changed.

3-D Password Overview


The 3-D password is a multifactor authentication scheme. The 3-D password presents a

3-D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3-D password is simply the combination and the sequence of user interactions that occur in the 3-D virtual environment. The 3-D password can combine recognition-, recall-, token-, and biometrics-based systems into one authentication scheme. This can be done by designing a 3-D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometrical data to be verified. For example, the user can enter the virtual environment and type something on a computer that exists in (x1, y1, z1) position, then enter a room that has a fingerprint recognition device that exists in a position (x2, y2, z2) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a

specific channel. The combination and the sequence of the previous actions toward the specific objects construct the users 3-D password.

Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real-life objects can be done in the virtual 3-D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3-D environment can be considered as a part of the 3-D password. We can have the following objects:

1) A computer with which the user can type; 2) A fingerprint reader that requires the users fingerprint; 3) A biometrical recognition device; 4) A paper or a white board that a user can write, sign, or Draw on; 5) An automated teller machine (ATM) that requests a token; 6) A light that can be switched on/off; 7) A television or radio where channels can be selected; 8) A staple that can be punched; 9) A car that can be driven; 10) A book that can be moved from one place to another; 11) Any graphical password scheme; 12) Any real-life object; 13) Any upcoming authentication scheme.

The action toward an object (assume a fingerprint recognition device) that exists in

location (x1, y1, z1) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2, y2, z2), where x1!= x2, y1!= y2, and z1!= z2. Therefore, to perform the legitimate 3-D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.

3-D Password Selection and Inputs

Let us consider a 3-D virtual environment space of size G x G x G. The 3-D environment

space is represented by the coordinates (x, y, z) [1, . . . , G] x [1, . . . , G] x [1, . . . , G]. The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone. We consider the sequence of those actions and interactions using the previous input devices as the users 3-D password. For example, consider a user who navigates through the 3-D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18),And the user types FALCON. Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button. The initial representation of user actions in the 3-D virtual environment can be recorded as follows:

(10, 24, 91) Action = Open the office door; (10, 24, 91) Action = Close the office door;

(4, 34, 18) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 18) Action = Typing, L; (4, 34, 18) Action = Typing, C; (4, 34, 18) Action = Typing, O; (4, 34, 18) Action = Typing, N; (10, 24, 80) Action = Pick up the pen; (1, 18, 80) Action = Drawing, point = (330, 130).

This representation is only an example. The extensive real representation will not be discussed in this paper. In order for a legitimate user to be authenticated, the user has to follow the same sequence and type of actions and interactions toward the objects for the users original 3-D password. Fig. 1 shows a virtual computer that accepts textual passwords as a part of a users 3-D password.

Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the users 3-D password

Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers

3-D Virtual Environment Design Guidelines


Designing a well-studied 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. Therefore, the first step in building a 3-D password system is to design a 3-D environment that reflects the administration needs and the security requirements. The design of 3-D virtual environments should follow these guidelines. Real-life similarity The prospective 3-D virtual environment should reflect what people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real-life situations. Object responses should be realistic. The target should have a 3-D virtual environment that users can interact with, by using common sense.

Object uniqueness and distinction Every virtual object or item in the 3-D virtual environment is different from any other virtual object. The uniqueness comes from the fact that every virtual object has its own attributes such as position. Therefore, the design of the 3-D virtual environment should consider that every object should be distinguishable from other objects. In designing a 3-D virtual environment, it should be easy for users to navigate through and to distinguish between objects. The distinguishing factor increases the users recognition of objects. Therefore, it improves the system usability. Three-dimensional virtual environment size A 3-D virtual environment can depict a city or even the world. On the other hand, it can depict a space as focused as a single room or office. A large 3-D virtual environment will increase the time required by the user to perform a 3-D password. Moreover, a large 3-D virtual environment can contain a large number of virtual objects. However, a small 3-D virtual environment usually contains only a few objects, and thus, performing a 3-D password will take less time. Number of objects (items) and their types Part of designing a 3-D virtual environment is determining the types of objects and how many objects should be placed in the environment. The types of objects reflect what kind of responses the object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3-D password. System importance The 3-D virtual environment should consider what systems will be protected by a 3-D password. The number of objects and the types of objects that have been used in the 3-D virtual environment should reflect the importance of the protected system.

3-D Password Applications

Because a 3-D password can have a password space that is very large compared to other authentication schemes, the 3-D passwords main application domains are protecting critical systems and resources. Possible critical applications include the following.

State diagram of a possible 3-D password application

1) Critical servers: Many large organizations have critical servers that are usually protected by a textual password. A 3-D password authentication proposes a sound replacement for a textual password. Moreover, entrances to such locations are usually protected by access cards and sometimes PIN numbers. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers.

2) Nuclear and military facilities: Such facilities should be protected by the most powerful authentication systems. The 3-D password has a very large probable password space, and since it can contain token-, biometrics-, recognition-, and knowledge-based authentications in a single authentication system, it is a sound choice for high level security locations.

3) Airplanes and jetfighters: Because of the possible threat of misusing airplanes and jetfighters for religion-political agendas, usage of such airplanes should be protected by a powerful authentication system. The 3-D password is recommended for these systems.

In addition, 3-D passwords can be used in less critical systems because the 3-D virtual environment can be designed to fit any systems needs. A small 3-D virtual environment can be used in many systems, including the following:

1) ATMs; 2) Personal digital assistants; 3) Desktop computers and laptop logins; 4) Web authentication.

SECURITY ANALYSIS

3D Password space size To determine the password space, we have to count all possible 3D passwords that have a certain number of actions, interactions, and inputs towards all objects that exist in the 3D virtual environments.

3D password distribution knowledge

Users tend to use meaningful words for textual passwords. Therefore finding these different words from dictionary is a relatively simple task which yields a high success rate for breaking textual passwords. Pass faces users tend to choose faces that reflect their own taste on facial attractiveness, race, and gender. Every user has different requirements and preferences when selecting the appropriate 3D Password. This fact will increase the effort required to find a pattern of users highly selected 3D password. In addition, since the 3D password combines several authentication schemes into a single authentication environment, the attacker has to study every single authentication scheme and has to discover what the most probable selected secrets are. Since every 3D password system can be designed according to the protected system requirements, the attacker has to separately study every 3D password system. Therefore, more effort is required to build the knowledge of most probable 3D passwords.

Attacks and Countermeasures To realize and understand how far an authentication scheme is secure, we have to consider all possible attack methods. We have to study whether the authentication scheme proposed is immune against such attacks or not. Moreover, if the proposed authentication scheme is not immune, we then have to find the countermeasures that prevent such attacks. In this section, we try to cover most possible attacks and whether the attack is valid or not. Moreover, we try to propose countermeasures for such attacks.

1)Brute Force Attack: The attacker has to try all possible 3D passwords. This kind of attack is very difficult for the following reasons. a. Time required to login The total time needed for a legitimate user to login may vary depending on the number of interactions and actions, the size of the 3D virtual environment, and the type of actions and interactions. Therefore, a brute force attack on a 3D password is very difficult and time consuming b. Cost of attacks the 3D virtual environment contains biometric recognition objects and token based objects. The attacker has to forge all possible biometric information and forge all the required tokens. The cost of forging such information is very high, therefore cracking the 3D password is more challenging. The high number of possible 3D password spaces leaves the attacker with almost no chance of breaking the 3D password. 2)Well-Studied Attack : The attacker tries to find the highest probable distribution of 3D passwords. In order to launch such an attack, the attacker has to acquire knowledge of the most probable 3D password distributions. This is very difficult because the attacker has to study all the existing authentication schemes that are used in the 3D environment. It requires a study of the users selection of objects for the 3D password. Moreover, a well studied attack is very hard to accomplish since the attacker has to perform a customized attack for every different 3D virtual environment design. This environment has a number of objects and types of object responses that differ from any other 3D virtual environment. Therefore, a carefully customized study is required to initialize an effective attack. 3)Shoulder Surfing Attack :An attacker uses a camera to record the users 3D password or tries to watch the legitimate user while the 3D password is being performed. This attack is the most successful type of attack against 3D passwords and some other graphical passwords. However, the users 3D password may contain biometric data or textual passwords that cannot be seen from behind. Therefore, we assume that the 3D password should be performed in a secure place where a shoulder surfing attack cannot be performed.

4) Timing Attack: In this attack, the attacker observes how long it takes the legitimate user to perform a correct sign in using the 3D password. This observation gives the attacker an indication of the legitimate users 3D password length. However, this kind of attack alone cannot be very successful since it gives the attacker mere hints. Therefore, it would probably be launched as part of a well studied or brute force attack. Timing attacks can be very effective if the 3D virtual environment is poorly designed.

CONCLUSION AND FUTURE WORK

There are many authentication schemes in the current state. Some of them are based on users physical and behavioral properties, and some other authentication schemes are based on users knowledge such as textual and graphical passwords. Moreover, there are some other important authentication schemes that are based on what you have, such as smart cards. Among the various authentication schemes, textual password and tokenbased schemes, or the combination of both, are commonly applied. However, as mentioned before, both authentication schemes are vulnerable to certain attacks. Moreover, there are many authentication schemes that are currently under study and they may require additional time and effort to be applicable for commercial use.

The 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single 3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes. The design of the 3-D virtual environment, the selections of objects inside the environment, and the objects type reflect the resulted password space. It is the task of the

system administrator to design the environment and to select the appropriate object that reflects the protected system requirements. Additionally, designing a simple and easy to use 3-D virtual environment is a factor that leads to a higher user acceptability of a 3-D password system.

The choice of what authentication schemes will be part of the users 3-D password reflects the users preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical passwords as part of their 3-D password. On the other hand, users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3-D password. Moreover, users who prefer to keep any kind of biometrical data private might not interact with objects that require biometric information. Therefore, it is the users choice and decision to construct the desired and preferred 3-D password.

The 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments, deciding on password spaces, and interpreting user feedback and experiences from such environments will result in enhancing and improving the user experience of the 3-D password. Moreover, gathering attackers from different backgrounds to break the system is one of the future works that will lead to system improvement and prove the complexity of breaking a 3-D password. Moreover, it will demonstrate how the attackers will acquire the knowledge of the most probable 3-D passwords to launch their attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy