SlideShare une entreprise Scribd logo
1  sur  34
PRESENTED TO:-
MR.VIJAY SEHGAL
(PROFESSOR)
S.C.D.GOVT.COLLEGE.LD
H
PRESENTED BY:-
VIVEK GUPTA
B.C.A.III
2916
 Authentication & their types.
 Knowledge Based Authentication.
 Token Based Authentication.
 Biometrics Authentication.
 Drawbacks.
 3D Password.
 3D Virtual Environment.
 Advantages & Application.
 Attacks & Countermeasures.
 Conclusion.
Areas Of Discussion
Authentication
Authentication is a process of validating who you are to
whom you claimed to be or a process of identifying an
individual, usually based on a username and password.
 Human authentication techniques are as follows:
1. Knowledge Based (What you know)
2. Token Based (What you have)
3. Biometrics (What you are)
Three Basic Identification
Methods of password
Possession
(“something I have”)
•Keys
•Passport
•Smart Card
Knowledge
(“Something I know”)
•Password
• Pin
Biometrics
(“something I am”)
•Face
•Fingerprints
•Iris
Password
• Password is basically an encryption
algorithms.
 It is 8-15 character or slightly more than that.
 Mostly textual passwords nowadays are
kept which are very simple.
T
O
K
E
N
B
A
S
E
D
A security token (or sometimes a hardware
token, authentication token, software token) may be a
physical device that an authorized user of computer
services is given to ease authentication.
B
I
O
M
E
T
R
I
C
S
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
•How secure is your password?
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Approximately, Ten years back
Klein performed such tests and he
could crack 10-15 passwords per
day.
PASSWORD
Token
 Involves additional costs, such as the cost of the token and
any replacement fees.
 Users always need to carry the token with them.
 Users need multiple tokens for multiple Web sites and
devices.
 Does not protect fully from man-in-the-middle attacks (i.e.,
attacks where an intruder intercepts a user's session and steals
the user's credentials by acting as a proxy between the user and
the authentication device without the user's knowledge).
BIOMETRICS
•Biometrics has also some
drawbacks.
Suppose you select your fingerprint
as a biometrics..
But what to do when you have crack
or wound in your finger.
And now a days some hackers even
implement exact copy of your
biometrics also….
•The 3D passwords are more customizable, and
very interesting way of authentication.
•A 3D password is a multifactor
authentication scheme that
combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICS
in one authentication system.
 The 3D password presents a virtual environment
containing various virtual objects.
 The user walks through the environment and interacts
with the objects.
 It is the combination and sequence of user interactions
that occur in the 3D environment.
 It becomes much more difficult for the attacker to
guess the user’s 3-D password.
Virtual objects
 Virtual objects can be any object we encounter in real life:
A computer on which the user can type in.
A fingerprint reader that requires users fingerprint.
A paper or white board on which user can type.
An Automated teller(ATM) machine that requires a token.
A light that can be switched on/off.
A television or radio where channels can be selected.
A car that can be driven.
A graphical password scheme.
A biometric recognition device.
A staple that can be punched.
A book that can be moved from one place to another.
Snapshot of a proof - of - concept virtual
art gallery
System Implimentation
The 3D password is a multi factor authentication scheme. The 3D password
presents a 3D virtual environment containing various virtual objects. The user
navigates through this environment and interacts with the objects. The 3D
password is simply the combination and the sequence of user interactions that
occur in the 3D virtual environment. The 3D password can combine
recognition, recall, token, and biometrics based systems into one
authentication scheme. This can be done by designing a 3D virtual
environment that contains objects that request information to be recalled,
information to be recognized, tokens to be presented, and biometric data to be
verified.
For example, the user can enter the virtual environment and type something on
a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a
fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and
provide his/her fingerprint. Then, the user can go to the virtual garage, open
the car door, and turn on the radio to a specific channel. The combination and
the sequence of the previous actions toward the specific objects construct the
user’s 3D password.
STATE DIAGRAM OF A 3D PASSWORD APPLICATION
Example
consider a user who navigates through the 3D virtual environment that consists of an
office and a meeting room. Let us assume that the user is in the virtual office and the
user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes
the door. The user then finds a computer to the left, which exists in the position (4, 34,
18), and the user types “CAT”. The user then walks over turns on the light located in
(50,6,20) and then goes to a white board located in (55,3,30) and draws just one dot in
the (x , y) coordinate of the white board at the specific point of (420,170). The initial
representation of user actions in the 3D virtual environment can be recorded as
follows::
*(10, 24, 91) Action = Open the office door;
*(10, 24, 91) Action = Close the office door;
*(4, 34, 18) Action = Typing, “C”;
*(4, 34, 18) Action = Typing, “A”;
*(4, 34, 18) Action = Typing, “T”;
*(50, 6, 20)Action = Turning the light on;
*(55, 3, 30)Action = Goes to white board;
*(55, 3, 30)Action = Draws point = (420,170);
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
•We can use any real time object as a environment like any room or
village but for simplicity we suggest to use small environment like
room.
3D Virtual Environment
The design of 3D virtual environments should follow
these guidelines:
 Real Life Similarity
 Object Uniqueness & Distinction
 3D Virtual Environment Size
 Number of objects & their types
Advantages
 Flexibility:3D Passwords allows Multifactor
authentication biometric, textual passwords can be
embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
passwords possibility.
 Ease to Memorize: Can be remembered in the form of
short story.
 Respect of Privacy: Organizers can select authentication
schemes that respect users privacy.
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & Military Facilities
 Airplanes and Missile Guiding
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
 Shoulder-surfing Attack
Brute Force Attack
The attacker has to try all possible 3D passwords.
This kind of attack is very difficult for the following
reasons.
 Time required to login .
 3D Attacks are very expensive.
Well Studied Attack
The attacker tries to find the highest probable distribution of
3D passwords. In order to launch such an attack, the attacker
has to acquire knowledge of the most probable 3D password
distributions. This is very difficult because the attacker has to
study all the existing authentication schemes that are used in
the 3D environment.
Moreover, a well studied attack is very hard to accomplish
since the attacker has to perform a customized attack for every
different 3D virtual environment design.
Shoulder-surfing Attack
An attacker uses a camera to record the user’s 3D password or
tries to watch the legitimate user while the 3D password is
being performed. This attack is the most successful type of
attack against 3D passwords and some other graphical
passwords. However, the user’s 3D password may contain
biometric data or textual passwords that cannot be seen from
behind. Therefore, we assume that the 3D password should be
performed in a secure place where a shoulder surfing attack
cannot be performed.
 The authentication can be improved with 3D password,
because the unauthorized person may not interact with same
object at a particular location as the legitimate user.
 It is difficult to crack, because it has no fixed number of
steps and a particular procedure.
 Added with biometrics and token verification this schema
becomes almost unbreakable.
Conclusion
Vivek

Contenu connexe

Tendances

Tendances (20)

Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Password
3D Password3D Password
3D Password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3 d password
3 d password3 d password
3 d password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Similaire à Vivek

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 

Similaire à Vivek (20)

3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d authentication
3d authentication3d authentication
3d authentication
 
3d pass words
3d pass words3d pass words
3d pass words
 
3 d password
3 d password3 d password
3 d password
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
C0361419
C0361419C0361419
C0361419
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D - password
3D - password3D - password
3D - password
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3d passwords
3d passwords 3d passwords
3d passwords
 

Dernier

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Dernier (18)

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 

Vivek

  • 2.  Authentication & their types.  Knowledge Based Authentication.  Token Based Authentication.  Biometrics Authentication.  Drawbacks.  3D Password.  3D Virtual Environment.  Advantages & Application.  Attacks & Countermeasures.  Conclusion. Areas Of Discussion
  • 3. Authentication Authentication is a process of validating who you are to whom you claimed to be or a process of identifying an individual, usually based on a username and password.  Human authentication techniques are as follows: 1. Knowledge Based (What you know) 2. Token Based (What you have) 3. Biometrics (What you are)
  • 4. Three Basic Identification Methods of password Possession (“something I have”) •Keys •Passport •Smart Card Knowledge (“Something I know”) •Password • Pin Biometrics (“something I am”) •Face •Fingerprints •Iris
  • 5.
  • 6. Password • Password is basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple.
  • 8. A security token (or sometimes a hardware token, authentication token, software token) may be a physical device that an authorized user of computer services is given to ease authentication.
  • 10. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 11.
  • 12. •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Approximately, Ten years back Klein performed such tests and he could crack 10-15 passwords per day. PASSWORD
  • 13. Token  Involves additional costs, such as the cost of the token and any replacement fees.  Users always need to carry the token with them.  Users need multiple tokens for multiple Web sites and devices.  Does not protect fully from man-in-the-middle attacks (i.e., attacks where an intruder intercepts a user's session and steals the user's credentials by acting as a proxy between the user and the authentication device without the user's knowledge).
  • 14. BIOMETRICS •Biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics.. But what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….
  • 15.
  • 16. •The 3D passwords are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 17.  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.  It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 18. Virtual objects  Virtual objects can be any object we encounter in real life: A computer on which the user can type in. A fingerprint reader that requires users fingerprint. A paper or white board on which user can type. An Automated teller(ATM) machine that requires a token. A light that can be switched on/off. A television or radio where channels can be selected. A car that can be driven. A graphical password scheme. A biometric recognition device. A staple that can be punched. A book that can be moved from one place to another.
  • 19. Snapshot of a proof - of - concept virtual art gallery
  • 20. System Implimentation The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified. For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
  • 21. STATE DIAGRAM OF A 3D PASSWORD APPLICATION
  • 22. Example consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “CAT”. The user then walks over turns on the light located in (50,6,20) and then goes to a white board located in (55,3,30) and draws just one dot in the (x , y) coordinate of the white board at the specific point of (420,170). The initial representation of user actions in the 3D virtual environment can be recorded as follows:: *(10, 24, 91) Action = Open the office door; *(10, 24, 91) Action = Close the office door; *(4, 34, 18) Action = Typing, “C”; *(4, 34, 18) Action = Typing, “A”; *(4, 34, 18) Action = Typing, “T”; *(50, 6, 20)Action = Turning the light on; *(55, 3, 30)Action = Goes to white board; *(55, 3, 30)Action = Draws point = (420,170);
  • 23.
  • 25. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. •We can use any real time object as a environment like any room or village but for simplicity we suggest to use small environment like room. 3D Virtual Environment
  • 26. The design of 3D virtual environments should follow these guidelines:  Real Life Similarity  Object Uniqueness & Distinction  3D Virtual Environment Size  Number of objects & their types
  • 27. Advantages  Flexibility:3D Passwords allows Multifactor authentication biometric, textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: Can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 28. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & Military Facilities  Airplanes and Missile Guiding
  • 29. Attacks and Countermeasures Brute Force Attack Well studied Attack  Shoulder-surfing Attack
  • 30. Brute Force Attack The attacker has to try all possible 3D passwords. This kind of attack is very difficult for the following reasons.  Time required to login .  3D Attacks are very expensive.
  • 31. Well Studied Attack The attacker tries to find the highest probable distribution of 3D passwords. In order to launch such an attack, the attacker has to acquire knowledge of the most probable 3D password distributions. This is very difficult because the attacker has to study all the existing authentication schemes that are used in the 3D environment. Moreover, a well studied attack is very hard to accomplish since the attacker has to perform a customized attack for every different 3D virtual environment design.
  • 32. Shoulder-surfing Attack An attacker uses a camera to record the user’s 3D password or tries to watch the legitimate user while the 3D password is being performed. This attack is the most successful type of attack against 3D passwords and some other graphical passwords. However, the user’s 3D password may contain biometric data or textual passwords that cannot be seen from behind. Therefore, we assume that the 3D password should be performed in a secure place where a shoulder surfing attack cannot be performed.
  • 33.  The authentication can be improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack, because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion