SlideShare une entreprise Scribd logo
1  sur  23
INTRODUCTION
Current Authentification suffer from many
 weakness.Textual passwords are commonly used,users do
 not follow their requirements.Users tends to choose
 meaningful words from dictionaries,which makes the
 textual passwords easy to break and vulnerable to
 dictionary or brute force attacks.In this paper,we present
 and evaluate our contribution i.e. the 3D password
Existing System
Textual password
Graphical Password
Biometrics
Token Based
PASSWORD
           •How secure is your password?

             Now with the technology change,
             fast processors and many tools on
             the Internet, cracking password has
             become a Child's Play.
             Ten years back Klein performed
             such tests and he could crack 10-15
             passwords per day.
3D PASSWORD
•The 3D passwords which are more customizable,
and very interesting way of authentication.

•A 3D password is a multifactor
authentication scheme that
combine

 RECOGNITION
    +RECALL
      +TOKENS
         +BIOMETRICS

 in one authentication system.
The 3D password presents a virtual environment
 containing various virtual objects.

 The user walks through the environment and
 interacts with the objects.

It is the combination and sequence of user
 interactions that occur in the 3D environment.
Brief Description of System
The user is presented with this 3d virtual environment where
  the user navigates and interacts with various objects.




The sequence of actions and interactions towards the
  objects inside the 3d environment constructs the user’s 3d
  password.
System Implementation
For example, the user can enter the virtual environment
  and type something on a computer that exists in (x1 , y1 ,
  z1 ) position, then enter a room that has a fingerprint
  recognition device that exists in a position (x2 , y2 , z2 )
  and provide his/her fingerprint. Then, the user can go to
  the virtual garage, open the car door, and turn on the radio
  to a specific channel. The combination and the sequence
  of the previous actions toward the specific objects
  construct the user’s 3D password
Virtual objects
Virtual objects can be any object we encounter in real life:
              A computer on which the user can type in
              A fingerprint reader that requires users fingerprint
              A paper or white board on which user can type
              An Automated teller(ATM) machine that requires a
               token
              A light that can be switched on/off
              A television or radio
              A car that can be driven
              A graphical password scheme
Snapshot of a proof - of - concept virtual
    art gallery , which contains 36
     pictures and six computers
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security
requirements.




                       3D Virtual Environment
The design of 3D virtual
environments should follow
these guidelines:

Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
Advantages
              Flexibility
              Strength
              Ease to Memorize
              Respect of Privacy
Applications

 The 3D password’s main application domains are protecting
 critical systems and resources.

 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the following
 systems like-

Atm


Personal digital assistance


Desktop computers & laptops


Web authentication etc.
State Diagram
Attacks and Countermeasures

Brute Force Attack


Well studied Attack


 Shoulder-surfing Attack
Conclusion
 •The authentication can be improved with 3d
 password ,because the unauthorized person may not
 interact with same object at a particular location as
 the legitimate user.

 •It is difficult to crack ,because it has no fixed
 number of steps and a particular procedure.

 •Added with biometrics and token verification this
 schema becomes almost unbreakable.
QUERIES
3d password ppt

Contenu connexe

Tendances (20)

3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3D password
3D password3D password
3D password
 
3 d password
3 d password3 d password
3 d password
 
3D password
3D password3D password
3D password
 
3d authentication
3d authentication3d authentication
3d authentication
 

Similaire à 3d password ppt (20)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3D Password
3D Password3D Password
3D Password
 
Vivek
VivekVivek
Vivek
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3d pass words
3d pass words3d pass words
3d pass words
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3D - password
3D - password3D - password
3D - password
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 

3d password ppt

  • 1.
  • 2. INTRODUCTION Current Authentification suffer from many weakness.Textual passwords are commonly used,users do not follow their requirements.Users tends to choose meaningful words from dictionaries,which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper,we present and evaluate our contribution i.e. the 3D password
  • 3. Existing System Textual password Graphical Password Biometrics Token Based
  • 4. PASSWORD •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed such tests and he could crack 10-15 passwords per day.
  • 5.
  • 7. •The 3D passwords which are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 8. The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
  • 9. Brief Description of System The user is presented with this 3d virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 10. System Implementation For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password
  • 11. Virtual objects Virtual objects can be any object we encounter in real life:  A computer on which the user can type in  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  An Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  • 12. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  • 14. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 15. The design of 3D virtual environments should follow these guidelines: Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 16. Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy
  • 17. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 18. A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
  • 20. Attacks and Countermeasures Brute Force Attack Well studied Attack  Shoulder-surfing Attack
  • 21. Conclusion •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable.