3D PASSWORD
-
Upload
amrit-sharma -
Category
Technology
-
view
526 -
download
0
Transcript of 3D PASSWORD
![Page 1: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/1.jpg)
3-D Password SchemeFor more secure authentication
Presented By
Amrit Narayan Thakur
Roll No:123151320
BSCIT
![Page 2: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/2.jpg)
Introduction
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break. In this presentation ,we present and evaluate our contribution, i.e., the 3-D password.
![Page 3: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/3.jpg)
Authentication
Authentication is a process of validating who are you to whom you claimed to be
Human authentication techniques are as follows:
1. Knowledge Base (What you know)
2. Token Based(what you have)
3. Biometrics(what you are)
4. Recognition Based(What you recognize)
![Page 4: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/4.jpg)
Common Authentication Techniques used in computer world1. Textual Passwords(Recall Based)-:Recall
what you have created before.
2. Graphical Passwords:
(Recall Based+Recognition Based)
Biometric schemes
(fingerprints,voice recognition etc)
![Page 5: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/5.jpg)
Drawbacks
Textual Password:◦ Textual Passwords should be easy to
remember at the same time hard to guess
◦ Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴
◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
![Page 6: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/6.jpg)
Drawbacks
Graphical Password◦ Graphical passwords can be easily
recorded as these schemes take a long time.
◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
![Page 7: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/7.jpg)
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
![Page 8: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/8.jpg)
The 3D password presents a virtual environment containing various virtual objects.
The user walks through the environment and interacts with the objects
The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
![Page 9: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/9.jpg)
3D Password selection
Virtual objects can be any object we encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
![Page 10: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/10.jpg)
3D Passwords Differentiators
Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.
Strength: This scenario provides almost unlimited passwords possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
![Page 11: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/11.jpg)
3D Password Application Areas
Critical Servers
Nuclear and military Facilities
Airplanes and JetFighters
ATMs,Desktop and Laptop Logins, Web Authentication
![Page 12: 3D PASSWORD](https://reader036.fdocuments.us/reader036/viewer/2022082705/55a2b07d1a28abf6318b4609/html5/thumbnails/12.jpg)
CONTACTSE-mail:[email protected]