3D Password

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

INTRODUCTION

• Current Authentification suffer from many weakness.


Textual passwords are commonly used, users do not
follow their requirements. Users tends to choose
meaningful words from dictionaries, which makes the
textual passwords easy to break and vulnerable to
dictionary or brute force attacks. In this paper, we present
and evaluate our contribution i.e. the 3D password
Existing System

Textual password
 Graphical Password
Biometrics
Token Based
PASSWORD
How secure is your password?

Now with the technology change, fast processors and


many tools on the Internet, cracking password has
become a Child's Play. Ten years back Klein performed
such tests and he could crack 10-15 passwords per day.
Drawbacks
The 3D-password Which-are more customizable; and very interesting way of authentication.
A 3D password is a multifactor authentication scheme
that combine
RECOGNITION
 RECALL
 +TOKENS

 +BIOMETRICS
in one authentication system.
 The 3D password presents a virtual environment
containing various virtual objects.
The user walks through the environment and interacts
with the objects.
It is the combination and sequence of user
interactions that occur in the 3D environment.
Brief Description of System
 The user is presented with this 3d virtual
environment where the user navigates and interacts
with various objects.
•e sequence o actions an interactions towar s e objects
inside the 3d environment constructs the user's 3d
password.
System Implementation

For example, the user can enter the virtual environment


and type something on a computer that exists in (xl , yl ,
zl ) position, then enter a room that has a fingerprint
recognition device that exists in a position (x2 , y2 , z2 )
and provide his/her fingerprint. Then, the user can go to
the virtual garage, open the car door, and turn on the radio
to a specific channel. The combination and the sequence
of the previous actions toward the specific objects
construct the user's 3D password
Virtual Objects
Virtual objects can be any object we encounter in real life:
 A computer on which the user can type in
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 An Automated teller(ATM) machine that requires a token
 A light that can be switched on/off
 A television or radio
 A car that can be driven
 A graphical password scheme
3D VIRTUAL
ENVIRONMENT
Virtual Environment
3-D virtual environment affects the usability,
effectiveness, and acceptability of a 3-D password
system.
3-D environment reflects the administration needs
and the security requirements.
The design of 3D virtual environments should follow theseuitgletes:

❑Real Life Similarity


❑Object Uniqueness & Distinction
❑3D Virtual Environment Size
 ❑Number of objects & their types
 ❑System Importance
Advantages
Flexibility
Strength
Easy to Memorize
Respect of Privacy
Applications
The 3D password's main application domains are
protecting critical systems and resources.
• Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the
following systems like
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
State Diagram
Attacks and Countermeasures
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
Shoulder-surfing Attack
Conclusion
The authentication can be improved with 3d password
,because the unauthorized person may not interact
with same object at a particular location as the
legitimate user.
It is difficult to crack ,because it has no fixed number
of steps and a particular procedure.
Added with biometrics and token verification this
schema becomes almost unbreakable.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy