3d-Password: A More Secured Authentication

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

3D-password

A more secured authentication

Avishek Verma
Regd.No:0901288323
INFORMATION TECHNOLOGY
NM Institute Of Engg.& Tech.
Guide:Mr.Raj Kumar Mohanta
Contents
• What is Authentication
• Existing system
• Drawbacks in existing system
• Proposed system
• Advantages with proposed system
• Applications
• Attacks
• Conclusion
Authentication

Authentication is a process of validating who are you


to whom you claimed to be.

• Human authentication techniques are as follows:

1.Knowledge Base (What you know)


2.Token Based(what you have)

3.Biometrics(what you are)


Three Basic Identification Methods of password

Knowledge
Possession (“something I know”)
(“something I have”)
•Password
•Keys •PIN
•Passport
•Smart Card

Biometrics
(“something I am”)

•Face
•Fingerprint
•Iris
Drawbacks
Textual Password:
– Textual Passwords should be easy to remember at the same time
hard to guess
– Full password space for 8 characters consisting of both numbers
and characters is 2 X 10¹⁴
– From an research 25% of the passwords out of 15,000 users can
be guessed correctly by using brute force dictionary
Graphical Password:
 One main drawback of applying biometric is its intrusiveness
upon a users personnel characteristics.

 They require special scanning device to authenticate the user


which is not acceptable for remote and internet users.
3d password
The 3D Password is a multifactor authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
 The 3D password presents a virtual environment containing various
virtual objects.

 The user walks through the environment and interacts with the objects

 The 3d Password is simply the combination and sequence of user


interactions that occur in the 3D environment
Virtual objects
• Virtual objects can be any object we encounter in real life:
 A computer on which the user can type
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 A Automated teller(ATM) machine that requires a token
 A light that can be switched on/off
 A television or radio
 A car that can be driven
 A graphical password scheme
System implementation

• The action towards an object that exists in location (x1,y1,z1)


is different from action towards an another object at (x2,y2,z2).

• Therefore ,to perform the legitimate 3d password the user must follow
the same scenario performed by the legitimate user.

• This means interacting with the same objects that reside at exact
location and perform the exact actions in the proper sequence
Example

 Let us consider a 3D virtual environment space of size G ×G


× G. The 3D environment space is represented by the
coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G].

The objects are distributed in the 3D virtual environment with


unique (x, y, z) coordinates. We assume that the user can
navigate into the 3D virtual environment and interact with the
objects using any input device such as a mouse, key board,
fingerprint scanner, iris scanner, stylus, card reader, and
microphone.
Advantages
 Flexibility: 3D Passwords allows Multifactor
authentication biometric , textual passwords can
be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
passwords possibility.
 Ease to Memorize: can be remembered in the
form of short story.
 Respect of Privacy: Organizers can select
authentication schemes that respect users privacy.
Applications
In addition,3D password can also be used in less critical
systems

A small virtual environment can be used in the following


systems like

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc..,


Attacks and counter measures

 Brute Force Attack

 Well studied Attack

 Shoulder--surfing Attack
 He authentication can be improved with 3d password
,because the un- authorizTed person may not interact with
same object at a particular location as the legitimate user.

It is difficult to crack ,because it has no fixed no of steps and


a particular procedure

Added with biometrics and token verification this schema


becomes almost unbreakable

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy