3 d secure password

14
A Seminar Presentation on 3-D Secure Password Jaiprakash (113013000010) Institute of Engineering and Technology Bhagwant University Ajmer 4/23/2015 1 3-D Secure Password

Upload: jai-chaudhary

Post on 16-Jul-2015

52 views

Category:

Engineering


6 download

TRANSCRIPT

Page 1: 3 d secure password

A Seminar Presentationon

3-D Secure Password

Jaiprakash

(113013000010)

Institute of Engineering and Technology

Bhagwant University

Ajmer4/23/2015 13-D Secure Password

Page 2: 3 d secure password

PRESENTATION OUTLINE

• Introduction

• Three Factors of Authentication

• Existing Authentication Techniques

• Drawbacks of Existing Authentication Schemes

• 3D Password Scheme

• 3D Password Selection

• Advantages of 3D Passwords

• Applications of 3D Passwords

• Attacks and Countermeasures

• Conclusion

4/23/2015 23-D Secure Password

Page 3: 3 d secure password

INTRODUCTION

•Authentication is any protocol or process that permits

one entity to establish the identity of another entity.

•In other words, authentication is the process of

determining whether someone or something is, in fact,

who or what it is declared to be.

4/23/2015 33-D Secure Password

Page 4: 3 d secure password

THREE FACTORS OF AUTHENTICATION

•Knowledge Based: Something you know like

PASSWORD, PIN

•Token Based: Something you possess like

•KEYS, PASSPORT, SMART CARD

•Biometrics: Something you are like

•FINGERPRINT, FACE, IRIS

4/23/2015 43-D Secure Password

Page 5: 3 d secure password

EXISTING AUTHENTICATION TECHNIQUES

•Textual Password:

Recall Based

•Graphical Password:

Recall Based + Recognition Based (Biometrics)

4/23/2015 53-D Secure Password

Page 6: 3 d secure password

DRAWBACKS OF EXISTING AUTHENTICATION

SCHEMES

Drawbacks of Textual Passwords

•Textual Passwords should be easy to remember, but at

the same time, difficult to guess.

•Full password space for 8 characters, consisting of both

numbers and characters, is 2*(10^14).

•A research showed that 25% of the passwords out of

15,000 users could be guessed correctly using brute

force dictionary.

Continue..4/23/2015 63-D Secure Password

Page 7: 3 d secure password

DRAWBACKS OF GRAPHICAL

PASSWORDS •Graphical Passwords can be easily recorded as these

schemes take a long time.

•The main drawback of using biometric is its

intrusiveness upon a user's personal characteristics

which are liable to change under certain situations.

For example, a bruised finger will lead to an

inconsistency in fingerprint pattern.

•They require special scanning device to authenticate the

user which is not acceptable for remote and internet

users.

4/23/2015 73-D Secure Password

Page 8: 3 d secure password

3D PASSWORD SCHEME

•The 3D password can combine the existing

authentication schemes such as textual passwords,

graphical passwords, and various types of biometrics into

a 3D virtual environment. The design of the 3D virtual

environment and the type of objects selected determine

the 3D password key space.

4/23/2015 83-D Secure Password

Page 9: 3 d secure password

3D PASSWORD SELECTION

•A fingerprint reader that requires the user’s fingerprint.

•A biometrical recognition device.

•A paper or white board that a user can write, sign, or

draw on.

•An automated teller machine (ATM) that requires a

token.

4/23/2015 93-D Secure Password

Page 10: 3 d secure password

ADVANTAGES OF 3D PASSWORDS

• Flexibility: 3D Passwords allow Multifactor

Authentication.

• Strength: This scenario provides almost unlimited

possibilities of Passwords.

• Easy to memorize: Can be remembered in the form of

a short story.

• Respect of Privacy: Organizers can select

authentication schemes that respect the privacy of the

users.

4/23/2015 103-D Secure Password

Page 11: 3 d secure password

APPLICATIONS OF 3D PASSWORDS

•Servers: Many large organizations have critical

servers that require very high security but are usually

protected by a textual password. A 3D password

authentication proposes a sound replacement for a

textual password. so, it can be used to protect the

entrance to such locations as well as protect the usage of

such servers.

•Nuclear and military facilities: Such facilities should

be protected by the most powerful authentication 3D

password systems.

•ATMs, Desktop and Laptop Logins, Web Authentication etc.

4/23/2015 113-D Secure Password

Page 12: 3 d secure password

ATTACKS AND COUNTERMEASURES

•Brute Force Attack: This attack is very difficult because:

It is very time consuming. Attack is highly expensive

•Well Studied Attack: This attack is difficult because the

attacker has to perform customized attack for different

virtual environments.

•Shoulder Surfing Attack: This attack is comparatively

more successful because the attacker uses camera to

record the 3D Passwords of the users.

4/23/2015 123-D Secure Password

Page 13: 3 d secure password

CONCLUSION

•3D Password improves authentication.

•It is difficult to crack as there are no fixed number of

steps or particular procedure.

•Added with biometrics and token verification, this

schema becomes almost unbreakable.

4/23/2015 133-D Secure Password

Page 14: 3 d secure password

Please ask Queries

4/23/2015 143-D Secure Password