1 / 23

3D Password

password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements.

Download Presentation

3D Password

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 3D PASSWORD FOR SECURE AUTHENTICATION ASHA KUMARI MONA THAKUR NEHA THAKUR POOJA KUMARI SHALINI KUMARI

  2. CONTENTS • Password • Advantages and disadvantages • Introduction • 3d password • Functionalities Required • Mathematical concept • Working • Attacks and counter measure • Applications • 4d password differentiator • Future work

  3. PASSWORD:- • A password is a secret word used for user authentication to prove identity or access approval to gain access to a resource. • In modern times, username and passwords are commonly used by people during a login process that controls access to protected computer operating systems, mobiles phones, cable TV decoders, automated teller machines (ATMs), etc.

  4. TYPES OF PASSWORD:- • Random password • Common password

  5. RANDOM PASSWORD • Random password:-An easy to remember password, which is based on a pass-phrase that is important to you, the user. • This phrase can be a set of words taken from a book, a song, a quotation, a statement, or anything else that you always easily remember. • No one else should ever think about attributing it to you. • E.G: pass-phrase: “four score and seven years ago our fathers” • Password: “Fs&7yA0F”.

  6. COMMON PASSWORD • Easy to remember password, which is based on a combination of two unrelated words with a mixed case of letters, numbers and symbols. • E.G: pass-words: “funny bone” • Password: “phnyb0ne”.

  7. ADVANTAGES AND DISADVANTAGES • Can only be accessed by the owner of the site. • A password protected website. • Password may protect files, folders and documents. • Disadvantages:- • If you don’t have strong server security, someone can break into the database and read the password.

  8. INTRODUCTION • Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. • 3D password is a multifactor authentication scheme. • To be authenticated, were 3D virtual environment. • Combines recognition, recall, token, and biometrics-based systems. • Users choice to select the type of authentication technique.

  9. 3D PASSWORD • It is a multi factor authentication scheme. • It is not only based on recall and recognition. • It is the combination of recall, recognition, biometrics as well as token-based authentication schemes. • It is also known as 3 dimensional virtual environment. • It contain any virtual object.

  10. VIRTUAL OBJECTS ARE: • A computer with which user can type. • A fingerprint reader that requires the user’s fingerprint. • An ATM machine that requires a smart card and PIN. • A light that can be switched ON/OFF. • A television or radio where channels can be selected. • A car that can be driven. • A paper or a whiteboard that a user can write, sign, or draw on.

  11. AUTHENTICATION SCHEMES • KNOWLEDGE BASED • Recall based • Recognition based • TOKEN BASED e.g. : smart card

  12. BIOMETRIC BASED • Fingerprint ,palm prints ,hand geometry ,face recognition • GRAPHICAL PASSWORDS • Picture based.

  13. FUNCTIONALITIES REQUIRED • New scheme should combine the existing authentication schemes • Freedom to select the type of authentication technique. • Should provide secrets that are easy to remember ,difficult to guess.

  14. MATHEMATICAL CONCEPT • Time complexity • Space complexity

  15. WORKING OF 3D PASSWORD • Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing, “A”; (4,34,18) Action= Typing, “N”; (4,34,18) Action= Typing, “G”; (4,34,18) Action= Typing, “E”; (4,34,18) Action= Typing, “L”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).

  16. Virtual Computer where user typing a textual password as a part of user’s 3D Password

  17. State diagram of a 3D Password application

  18. ATTACKS AND COUNTER MEASURE • Time attacks. • Brute force attacks. • Well studied attacks. • Key logger. • Shoulder suffering attacks.

  19. APPLICATION • Nuclear and military areas. • Air plans and jetfighters. • Critical server. • Other areas.

  20. 4D PASSWORD DIFFERENTIATOR • Flexibility: allow multifactor authentication. • Biometrics and textual passwords can be embedded in 4d password. • Strength: provides unlimited password possibilities. • Easy to remember: can be remembered in the form of short story. • Privacy: organizer can select authentication schemes that respect the user’s privacy.

  21. FUTURE WORK • Use different password for different accounts. • Use 3d password. • The 3d password will protect against many brute force attacks. • A brute password cracker will simply attempt to guess your password. • Use longer password, harder to crack. • Brute force attack known as a dictionary attack.

  22. CONCLUSION • Commonly used authentication schemes are vulnerable to attacks. • 3D Password is a multifactor authentication scheme. • User’s choice and decision to construct the desired and preferred 3D password.

  23. Thank You!

More Related