3D Password: For More Secure Authentication

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 16

3D PASSWORD

FOR MORE SECURE AUTHENTICATION

BY JITHIN JACOB.E NO: 12

INDRODUCTION

EXISTING SYSTEM
Current authentication systems suffer from many

weakness Textual password are commonly used Many available graphical passwords have a password space that is less than or equal to the textual password space Smart cards or tokens can be stolen Moreover, biometrics cannot be revoked. The 3Dpassword is a multifactor authentication scheme

PROPOSED SYSTEM
The proposed system is a multifactor authentication scheme that combines the benefits of various authentication schemes The following requirements are satisfied in the proposed scheme 1.The new scheme provide secrets that are easy to remember and very difficult for intruders to guess 2.The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3.The new scheme provides secrets that can be easily revoked or changed.

BRIEF DESCRIPTION OF SYSTEM


The 3D password can combine most existing authentication such as textual password, graphical password, and various types of biometrics in to a 3D virtual environment

The choice of what authentication schemes will be part of

the users 3D password reflects the users preferences and requirements

SYSTEM IMPLEMENTATION
For example, the user can enter the virtual environment and type something on a computer that exists in (x1, y1, z1) position, then enter a room that has a fingerprint recognition device that exists in a position (x2, y2, z2) and provide his/her fingerprint. then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the users 3D password

OBJECTS REQUIRED
1) 2) 3) 4) A computer with which the user can type. A fingerprint reader that requires the users fingerprint. A biometric recognition device. A paper or a white board that a user can write, sign, or draw on. 5) An automated teller machine (ATM) that requests a token. 6) A light that can be switched on/off. 7) A television or radio where channels can be selected. 8) A staple that can be punched. 9) A car that can be driven. 10) A book that can be moved from one place to another. 11) Any graphical password scheme. 12) Any real life object. 13) Any upcoming authentication scheme

PRINCIPLE
The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1,z1) is different from the action towards a similar object (another fingerprint recognition device) that exists in location (x2, y2 z2), where x1=x2, y1=y2, z1=z2. Therefore, to perform the legitimate3D password, the user must follow the same scenario performed by the legitimate user. This means interaction with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.

3D PASSWORD SELECTION AND INPUT


Let us consider a 3D virtual environment space of size G G G. The 3D environment space is represented by the coordinates (x, y, z) [1, . . . , G] [1, . . . , G] [1, . . . , G]. consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24,91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types FALCON. The initial representation of user actions in the 3Dvirtual

(10, 24, 91) Action = Open the office door; (10, 24, 91) Action = Close the office door; (4, 34, 18) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 18) Action = Typing, L; (4, 34, 18) Action = Typing, C; (4, 34, 18) Action = Typing, O; (4, 34, 18) Action = Typing, N;

3D VIRTUAL ENVIRONMENT AND DESIGN GUIDELINES


The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. 1) Real Life Similarity 2) Object uniqueness 3) Three Dimensional Virtual Environment Size 4) Number of objects and their types

3D PASSWORD APPLICATION
The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D passwords main application domains are protecting critical systems and resources. 1)Critical server 2) Nuclear and military facilities 3) Airplanes and jet fighters

In addition, 3D passwords can be used in less critical systems A small virtual environment can be used in the following systems like 1) ATM 2) Personal Digital Assistance 3) Desktop Computers & laptop logins 4) Web Authentication 5) Security Analysis

STATE DAIGRAM

SECURITY ANALYSIS
3D Password space size 3D password distribution knowledge

ATTACKS AND COUNTERMEASURES


1)Brute Force Attack 2) Well-Studied Attack 3) Shoulder Surfing Attack 4) Timing Attack

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy