3 d password
TRANSCRIPT
CONTENTS Introduction
Authentication Schemes
Functionalities Required
3D Password selection and Input
Virtual Environment Design Guidelines
Applications
Security Analysis
Attacks and Countermeasures
Conclusion
INTRODUCTION
Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.
3D password is a multifactor authentication scheme.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED Recall basedRecognition based
TOKEN BASEDeg : smart card
BIOMETRIC BASEDFingerprint ,palm prints ,hand geometry ,face
recognitionIntrusiveness upon a user’s personal
characteristics.GRAPHICAL PASSWORDS
Recognition basedRecall based
Virtual Computer where user typing a textual password as a part of user’s 3D Password
Snapshot of a proof-of-concept virtual art gallery
APPLICATIONS
Critical servers.
Nuclear and military facilities.
Airplanes and jetfighters.
ATMs, PDA’s, desktop computers and laptops.
SECURITY ANALYSIS
3D Password Space Size.
3D Password Distribution Knowledge.
CONCLUSIONCommonly used authentication schemes are
vulnerable to attacks.3D Password is a multifactor authentication
scheme.Design of 3D virtual environment, selection
of objects inside the environment, and the object type reflects the resulted password space.
User’s choice and decision to construct the desired and preferred 3D password