3d password

16
E: Ms.Sumithra V. Dept.of ISE JVIT

Upload: bimbalbee

Post on 02-Nov-2014

73 views

Category:

Documents


7 download

DESCRIPTION

This gives complete details about the 3 D Password and its importance for more authentication verification

TRANSCRIPT

Page 1: 3D PASSWORD

GUIDE: Ms.Sumithra V. Dept.of ISE JVIT

Page 2: 3D PASSWORD

ABSTRACTABSTRACT

• Current systems suffers from many weakness

Textual : easy to hack

Tokens : theft

Graphical : less password space

Biometric systems : users resist

• 3D password system overcomes all the above

weakness.

3D-PASSWORD 3D-PASSWORD

Page 3: 3D PASSWORD

3D PASSWORD : WHAT IS IT ?

It is a multifactor authentication scheme, where user

navigates and interacts with various objects.

3D-PASSWORD 3D-PASSWORD

INTRODUCTIONINTRODUCTION

AuthenticationAuthentication::

It is the act of establishing or confirming something as

authentic, that is, that claims made by or about the subject are

true.

Page 4: 3D PASSWORD

INTRODUCTIONINTRODUCTION

Knowledge based (what you know)

Token based (what you have)

Biometrics (what you are )

3D-PASSWORD 3D-PASSWORD

Types of authentication:

(contd..)(contd..)

Authentication Methods:

The are two types of techniques for doing this. First is comparing the attributes of the object itself to know its origin. Second type relies on documentation or other external affirmations.

Page 5: 3D PASSWORD

3D PASSWORD SCHEME3D PASSWORD SCHEME

REQUIREMENTS:

• Should be combination of recall based, recognition based

etc.

• Freedom to select combination of the above schemes.

• Easy to remember & change.

• Difficult to share.

3D-PASSWORD 3D-PASSWORD

Page 6: 3D PASSWORD

Fig: 3.1: State diagram of the 3D PasswordFig: 3.1: State diagram of the 3D Password

Page 7: 3D PASSWORD

Fig: 3.2: Snapshot of a proof-of-concept 3-D virtual environment, Fig: 3.2: Snapshot of a proof-of-concept 3-D virtual environment,

3D-PASSWORD 3D-PASSWORD

Page 8: 3D PASSWORD

SELECTION AND INPUTSSELECTION AND INPUTS::

• Space of size G*G*G, (x,y,z) all in [1,....,G].

• For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room.

3D-PASSWORD 3D-PASSWORD

Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button.

Page 9: 3D PASSWORD

SELECTION AND INPUTS (contd..)SELECTION AND INPUTS (contd..)

3D-PASSWORD 3D-PASSWORD

· (10, 24, 91) Action = Open the office door;

· (10, 24, 91) Action = Close the office door;

· (4, 34, 18) Action = Typing, “F”;

· (4, 34, 18) Action = Typing, “A”;

· (4, 34, 18) Action = Typing, “L”;

· (4, 34, 18) Action = Typing, “C”;

· (4, 34, 18) Action = Typing, “O”;

· (4, 34, 18) Action = Typing, “N”;

· (10, 24, 80) Action = Pick up the pen;

· (1, 18, 80) Action = Drawing, point = (330, 130).

Page 10: 3D PASSWORD

3D-PASSWORD 3D-PASSWORD

Fig: 3.3: Snapshot of an experimental 3-D virtual environmentFig: 3.3: Snapshot of an experimental 3-D virtual environment

Page 11: 3D PASSWORD

APPLICATIONSAPPLICATIONS

• Critical servers

• Nuclear and military services

• Airplanes and jet fighters

• ATM

• Internet

3D-PASSWORD 3D-PASSWORD

Page 12: 3D PASSWORD

3D-PASSWORD 3D-PASSWORD

ADVANTAGES

Easiness to memorize

 Flexibility

Strength

Secrets those are not easy to write down on paper. Provide secrets that can be easily revoked or changed.

The scheme secrets should be difficult to share with others.

Page 13: 3D PASSWORD

3D-PASSWORD 3D-PASSWORD

ATTACKS AND COUNTER MEASURES 

Brute Force Attack

Well Studied Attack

Shoulder Surfing Attack

Timing Attack

Page 14: 3D PASSWORD

CONCLUSION CONCLUSION

• Combines various authentication schemes.

• Uses existing scheme or upcoming scheme.

• Environment – easy and secure.

• User's preference and requirements are valued.

• The design of the 3D virtual environment, the

selection of objects inside the environment and the

object’s type reflect the resulted password space.

3D-PASSWORD 3D-PASSWORD

Page 15: 3D PASSWORD

REFERENCESREFERENCES

• A novel 3D graphical password schema- Fawaz A

Alsulaiman and Abdulmotaleb El Saddik.

• Denial V Klien Foiling the cracker – A survey of and

improvement to pasword security.

• Greg E Blonder Graphical password United States

Patent 5559961.

3D-PASSWORD 3D-PASSWORD

Page 16: 3D PASSWORD