3d password

18
By- Zishan Mohsin B.tech, Computer Science And Engineering Integral University.

Upload: zishan-mohsin

Post on 13-Nov-2014

5.683 views

Category:

Technology


7 download

DESCRIPTION

A Slide on 3D Password

TRANSCRIPT

Page 1: 3D Password

By- Zishan MohsinB.tech, Computer Science And EngineeringIntegral University.

Page 2: 3D Password

CONTENTS Introduction

Authentication Schemes

Functionalities Required

3D Password selection and Input

Virtual Environment Design Guidelines

Applications

Security Analysis

Attacks and Countermeasures

Conclusion

Page 3: 3D Password

INTRODUCTIONCommonly used authentication schemes are

textual passwords, graphical passwords and biometrics.

3D password is a multifactor authentication scheme.

To be authenticated, we require a 3D virtual environment.

Page 4: 3D Password

Combines recognition, recall, token, and biometrics based systems.

Users choice to select the type of authentication technique.

Page 5: 3D Password

AUTHENTICATION SCHEMES

KNOWLEDGE BASED Recall basedRecognition based

TOKEN BASEDe.g : smart card

Page 6: 3D Password

BIOMETRIC BASEDFingerprint ,palm prints ,hand geometry ,face

recognitionIntrusiveness upon a user’s personal

characteristics.GRAPHICAL PASSWORDS

Recognition basedRecall based

Page 7: 3D Password

FUNCTIONALITIES REQUIRED

New scheme should combine the existing authentication schemes

Freedom to select the type of authentication technique.

Should provide secrets that are easy to remember, difficult to guess.

Page 8: 3D Password

3D PASSWORD SELECTION AND INPUT

3D environment space represented by the co-ordinates

User navigate into the 3D virtual environment using any input device.

The sequence of actions and interactions forms the users 3D password.

Page 9: 3D Password

Representation of user actions in the 3D virtual environment(10,24,91) Action=Open the office door;(10,24,91) Action=Close the office door;(4,34,18) Action= Typing,“F”;(4,34,18) Action= Typing,”A”;(4,34,18) Action= Typing,”L”;(4,34,18) Action= Typing,”C”;(4,34,18) Action= Typing,”O”;(4,34,18) Action= Typing,”N”;(10,24,80) Action= Pick up the pen;(1,18,80) Action= Drawing, point=(330,130).

Page 10: 3D Password

Virtual Computer where user typing a textual password as a part of user’s 3D Password

Page 11: 3D Password

Snapshot of a proof-of-concept virtual art gallery

Page 12: 3D Password

State diagram of a 3D Password application

Page 13: 3D Password

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES

Real-life similarity

Object uniqueness and distinction

Three-dimensional virtual environment

System importance

Page 14: 3D Password

APPLICATIONS

Critical servers.

Nuclear and military facilities.

Airplanes and jet fighters.

ATM, desktop computers and laptops.

Page 15: 3D Password

SECURITY ANALYSIS

3D Password Space Size.

3D Password Distribution Knowledge.

Page 16: 3D Password

ATTACKS AND COUNTER MEASURES

Brute Force Attack

Well-Studied Attack

Shoulder Surfing Attack

Timing Attack

Page 17: 3D Password

CONCLUSIONCommonly used authentication schemes are

vulnerable to attacks.3D Password is a multifactor authentication

scheme.Design of 3D virtual environment, selection

of objects inside the environment, and the object type reflects the resulted password space.

User’s choice and decision to construct the desired and preferred 3D password

Page 18: 3D Password