3 d password by m sangam subudhi
TRANSCRIPT
![Page 1: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/1.jpg)
![Page 2: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/2.jpg)
Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.
3D password is a multifactor authentication scheme.
To be authenticated, we require a 3D virtual environment.
![Page 3: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/3.jpg)
Combines recognition, recall, token, and biometrics based systems.
Users choice to select the type of authentication technique.
![Page 4: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/4.jpg)
KNOWLEDGE BASED Recall basedRecognition based
TOKEN BASEDe.g : smart card
![Page 5: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/5.jpg)
BIOMETRIC BASED
◦ Fingerprint ,palm prints ,hand geometry ,face recognition◦ Intrusiveness upon a user’s personal characteristics.
GRAPHICAL PASSWORDS
◦ Recognition based◦ Recall based
![Page 6: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/6.jpg)
New scheme should combine the existing authentication schemes
Freedom to select the type of authentication technique.
Should provide secrets that are easy to remember, difficult to guess.
![Page 7: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/7.jpg)
3D environment space represented by the co-ordinates
User navigate into the 3D virtual environment using any input device.
The sequence of actions and interactions forms the users 3D password.
![Page 8: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/8.jpg)
Real-life similarity
Object uniqueness and distinction
Three-dimensional virtual environment
System importance
![Page 9: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/9.jpg)
Critical servers.
Nuclear and military facilities.
Airplanes and jet fighters.
ATM, desktop computers and laptops.
![Page 10: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/10.jpg)
3D Password Space Size.
3D Password Distribution Knowledge.
![Page 11: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/11.jpg)
Brute Force Attack
Well-Studied Attack
Shoulder Surfing Attack
Timing Attack
![Page 12: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/12.jpg)
Commonly used authentication schemes are vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.
User’s choice and decision to construct the desired and preferred 3D password
![Page 13: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/13.jpg)
![Page 14: 3 d password by M Sangam Subudhi](https://reader034.vdocument.in/reader034/viewer/2022052214/55a683111a28ab3c498b468d/html5/thumbnails/14.jpg)