3d password ppt

23

Click here to load reader

Upload: gowsalyasri

Post on 13-Nov-2014

16.353 views

Category:

Documents


160 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 3d password ppt
Page 2: 3d password ppt

INTRODUCTION

Current Authentification suffer from many weakness.Textual passwords are commonly used,users do not follow their requirements.Users tends to choose meaningful words from dictionaries,which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper,we present and evaluate our contribution i.e. the 3D password

Page 3: 3d password ppt

Existing System

Textual passwordGraphical PasswordBiometricsToken Based

Page 4: 3d password ppt

•How secure is your password?

Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.

PASSWORD

Page 5: 3d password ppt
Page 6: 3d password ppt

3D PASSWORD

Page 7: 3d password ppt

•The 3D passwords3D passwords which are more customizable, and very interesting way of authentication.

•A 3D password is a multifactor authentication scheme that combine RECOGNITIONRECOGNITION ++RECALLRECALL ++TOKENSTOKENS ++BIOMETRICSBIOMETRICS in one authentication system.

Page 8: 3d password ppt

The 3D password presents a virtual environment virtual environment containing various virtual objects.

The user walks through the environment and interacts with the objects.

It is the combination and sequence of user interactions that occur in the 3D environment.

Page 9: 3d password ppt

Brief Description of System

The user is presented with this 3d virtual environment where the user navigates and interacts with various objects.

The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.

Page 10: 3d password ppt

System Implementation

For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password 

Page 11: 3d password ppt

Virtual objectsVirtual objects can be any object we encounter in real life:

A computer on which the user can type in

A fingerprint reader that requires users fingerprint

A paper or white board on which user can type

An Automated teller(ATM) machine that requires a token

A light that can be switched on/off

A television or radio

A car that can be driven

A graphical password scheme

Page 12: 3d password ppt

Snapshot of a proof - of - concept virtualSnapshot of a proof - of - concept virtual art gallery , which contains 36 art gallery , which contains 36

pictures and six computers pictures and six computers

Page 13: 3d password ppt

3D VIRTUAL ENVIRONMENT

Page 14: 3d password ppt

3D Virtual Environment•3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security requirements.

3D Virtual Environment

Page 15: 3d password ppt

The design of 3D virtual environments should follow these guidelines:

Real Life Similarity

Object Uniqueness & Distinction

3D Virtual Environment Size

Number of objects & their types

System Importance

Page 16: 3d password ppt

Advantages

Flexibility

Strength

Ease to Memorize

Respect of Privacy

Page 17: 3d password ppt

Applications The 3D password’s main application domains are protecting

critical systems and resources.

Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding

Page 18: 3d password ppt

A small virtual environment can be used in the following systems like-

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc.

Page 19: 3d password ppt

State Diagram

Page 20: 3d password ppt

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

Page 21: 3d password ppt

•The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.

•It is difficult to crack ,because it has no fixed number of steps and a particular procedure.

•Added with biometrics and token verification this schema becomes almost unbreakable.

Conclusion

Page 22: 3d password ppt

QUERIES

Page 23: 3d password ppt