3 d password

17
3-D Password Scheme 3-D Password Scheme For more secure authentication YOGENDRA MAHATE

Upload: yogendra-mahate

Post on 14-Jun-2015

2.024 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: 3 d password

3-D Password Scheme3-D Password Scheme

For more secure authentication

YOGENDRA MAHATE

Page 2: 3 d password

Contents

IntroductionCommon Authentication Techniques used

in computer world3D password scheme 3D password selectionShow state diagram Advantages & Disadvantages3D Application AreasConclusion

Page 3: 3 d password

Introduction

Authentication is a process of validating who are you to whom you claimed to be

Human authentication techniques are as follows:

1. Knowledge Base (What you know)2. Token Based(what you have)

3. Biometrics(what you are)

4. Recognition Based(What you recognize)

Page 4: 3 d password

Common Authentication Common Authentication Techniques used in computer Techniques used in computer worldworld1. Textual Passwords(Recall Based)-:Recall

what you have created before.

2. Graphical Passwords: (Recall Based + Recognition Based)

Biometric schemes (fingerprints , voice recognition etc)

Page 5: 3 d password

DrawbacksDrawbacks

Textual Password:◦ Textual Passwords should be easy to

remember at the same time hard to guess◦ Full password space for 8 characters

consisting of both numbers and characters is 2 X 10¹⁴

◦ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary

Page 6: 3 d password

DrawbacksDrawbacks

Graphical Password◦ Graphical passwords can be easily

recorded as these schemes take a long time.

◦ One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.

◦ They require special scanning device to authenticate the user which is not acceptable for remote and internet users.

Page 7: 3 d password

3D PASSWORD SCHEME3D PASSWORD SCHEME

The 3D Password scheme is a new authentication scheme that combine

RECOGNITION + RECALL +TOKENS +BIOMETRICIn one authentication system

Page 8: 3 d password

The 3D password presents a virtual environment containing various virtual objects.

The user walks through the environment and interacts with the objects

The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment

Page 9: 3 d password

3D Password selection3D Password selectionVirtual objects can be any object we

encounter in real life:

A computer on which the user can typeA fingerprint reader that requires users fingerprintA paper or white board on which user can typeA Automated teller(ATM) machine that requires a tokenA light that can be switched on/offA television or radioA car that can be drivenA graphical password scheme

Page 10: 3 d password

For EXAMPLE: Let us assume the user enters a virtual

office then performs the following action: (10,24,91) Action=Open office door (11,24,91) Action=Close office door (4,34,15) Action=Typing ,”C” (4,34,16) Action=Typing ,”O” (4,34,17) Action=Typing ,”N” (12,29,80) Action=Pick up the pen (1,18,80) Action=Draw point=(330,130)

Page 11: 3 d password
Page 12: 3 d password
Page 13: 3 d password

3D Passwords Differentiators3D Passwords Differentiators Flexibility:3D Passwords allows Multifactor

authentication biometric , textual passwords can be embedded in 3D password technology.

Strength: This scenario provides almost unlimited passwords possibility.

Ease to Memorize: can be remembered in the form of short story.

Respect of Privacy: Organizers can select authentication schemes that respect users privacy.

Page 14: 3 d password

Advantages

• 3D Password scheme is combination of re-call based, recognized based, Biometrics .etc into single authentication technique

• Due to use of multiple schemes into one scheme password space is increased to great extend.

• More secure authentication scheme over currently available schemes.

Disadvantages

• Time and memory requirement is large. • Shoulder-suffering attack is still can affect the schema. • More expensive as cost required is more than other schemes.

Page 15: 3 d password

3D Password Application Areas3D Password Application AreasNuclear and military FacilitiesAirplanes and Jet FightersATMs , Desktop and Laptop Logins, Web

Authentication

Page 16: 3 d password

CONCLUSION CONCLUSION

The user can decide his own authentication schemes. If he’s comfortable with Recall & Recognition method then he can choose the 3D authentication just used above.

The 3D environment can change according to user’s request.

Can be used in critical areas such as a Nuclear Reactor, Missile Guiding System etc.

Added with biometrics & card verification the scheme becomes almost unbreakable.

Page 17: 3 d password

THANK YOU…THANK YOU…