three basic identification methods of password possession (“something i have”) possession...

19
Easybca 3-D PASSWORD A more secured authentication

Upload: alice-tabitha-nichols

Post on 31-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Easybca

3-D PASSWORDA more secured authentication

Three Basic Identification Methods of password

Possession(“something I have”)

•Keys •Passport •Smart Card

Knowledge(“Something I

know”)

•Password • Pin

Biometrics(“something I

am”)

•Face•Fingerprints•Iris

• Password is basically an encryption

algorithms.

It is 8-15 character or slightly more than that.

Mostly textual passwords now a days are kept which are very simple.

BIOMETRICS

Biometrics •Refer to a broad range of technologies.

•Automate the identification or verification of an individual.

Based on human characteristics or body organs

Process

% market share by type of biometric technology in 2003

Drawbacks

PASSPHRASE

•Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.

BIOMETRICS

•Biometrics has also some drawbacks.

Suppose you select your fingerprint as a biometrics..

But what to do when you have crack or wound in your finger.

And now a days some hackers even implement exact copy of your biometrics also….

3D PASSWORD

The 3D password presents a virtual environment containing various virtual objects.

The user walks through the environment and interacts with the objects.

It is the combination and sequence of user interactions that occur in the 3D environment.

3D Virtual Environment•3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security requirements.

3D Virtual Environment

Advantages

Flexibility

Strength

Ease to Memorize

Respect of Privacy

A small virtual environment can be used in the following systems like-

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc.

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

QUERIES