3d password
TRANSCRIPT
3D Graphical Password
BY DEVI GOMATHI. A
& ABINAYA. S
PRE-FINAL YEAR
DEPT. OF COMPUTER SCIENCE &
ENGINEERING
KARPAGAM COLLEGE OF ENGINEERING
Authentication
Authentication is a process of validating who you are to whom you claimed to be.
General authentication techniques are as follows:
1.Knowledge Based (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
Three Basic Identification Methods of password
Possession(“something I have”)
•Keys •Passport •Smart Card
Knowledge(“Something I
know”)
•Password • Pin
Biometrics(“something I
am”)
•Face•Fingerprints•Iris
• Password is basically an encryption
algorithms.
It is 8-15 character or slightly more than that.
Mostly textual passwords nowadays are kept which are very simple, some taken from dictionary, pet’s name or their favorite actor actress etc..
PASSWORD
Passphrase
It’s the enhance version of password.
It is a combination of words or simply collection of password in proper sequence.
It contains any well known thought also.
Length of passphrase is about 30-50 character or more than that also.
BIOMETRICS
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed
such tests and he could crack 10-15 passwords per day.
Guessable!
PASSWORD
DRAWBACKS
PASSPHRASE
•Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
BIOMETRICS
Suppose you select your fingerprint as a biometrics..but what to do when you have crack or wound in your finger.And now a days some hackers even implement exact copy of your biometrics also…. Intrusiveness to privacy Biometrics cannot be revoked Resistance to exposure of
retinas to IR rays
The 3D passwords which are more customizable, and very interesting way of authentication.
•A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICs in one authentication system.
3D PASSWORD
Measures of security
This is achieved through interacting only with the objects that acquire
information that the user is comfortable in providing.
It becomes much more difficult for the attacker to guess the user’s 3-D
password.
Snapshot of a proof - of - concept virtual
art gallery , which contains 36 pictures and six computers
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security requirements.
3D Virtual Environment
PRINCIPLE IMPLIED
The action towards an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different
A similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ).
Therefore to perform the legitimate 3D password,user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence
Advantages
FlexibilityStrengthEase to
MemorizeRespect of
Privacy
Applications
The 3D password’s main application domains are protecting critical systems and resources.
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
A small virtual environment can be used in the following systems like-
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
Shoulder-surfing Attack
•The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.
•It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
•Added with biometrics and token verification this schema becomes almost unbreakable.
Conclusion
Thank you