SlideShare a Scribd company logo
1 of 31
Authentication
Authentication is a process of validating who you are to
  whom you claimed to be.

 Human authentication techniques are as follows:
    1.Knowledge Based (What you know)
    2.Token Based(what you have)
    3.Biometrics(what you are)
Three Basic Identification
Methods of password
Possession                             Knowledge
(“something I have”)               (“Something I know”)


•Keys                             •Password
•Passport                         • Pin
•Smart Card




                       •Face
    Biometrics
                       •Fingerprints
(“something I am”)     •Iris
• Password is basically an encryption
 algorithms.

 It is 8-15 character or slightly more than that.


 Mostly textual passwords nowadays are kept which are
  very simple.
Passphrase
 It’s the enhance version of password.
 It is a combination of words or simply collection of
  password in proper sequence.
 It contains any well known thought also.
 Length of passphrase is about 30-50 character or more
  than that also.
B
I
O
M
E
T
R
I
C
S
Biometrics

•Refer to a broad range of
 technologies.


•Automate the identification
or verification of an individual.
Based on human characteristics or body organs
Process
% market share
by type of
biometric
technology in
2003
PASSWORD
           •How secure is your password?

             Now with the technology
             change, fast processors and many
             tools on the Internet, cracking
             password has become a Child's
             Play.
             Ten years back Klein performed
             such tests and he could crack 10-15
             passwords per day.
PASSPHRASE

•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
BIOMETRICS
•Biometrics has also some
drawbacks.

Suppose you select your fingerprint
as a biometrics..

But what to do when you have crack
or wound in your finger.

And now a days some hackers even
implement exact copy of your
biometrics also….
3D PASSWORD
•The 3D passwords which are more
customizable, and very interesting way of
authentication.

•A 3D password is a multifactor
authentication scheme that
combine

 RECOGNITION
    +RECALL
      +TOKENS
         +BIOMETRICS

 in one authentication system.
 The 3D password presents a virtual environment
  containing various virtual objects.

 The user walks through the environment and interacts
  with the objects.

 It is the combination and sequence of user interactions
  that occur in the 3D environment.
 This is achieved through interacting only with the objects that
  acquire information that the user is comfortable in providing.



It becomes much more difficult for the attacker to guess the user’s
   3-D password.
Virtual objects
 Virtual objects can be any object we encounter in real life:
           A computer on which the user can type in
           A fingerprint reader that requires users fingerprint
           A paper or white board on which user can type
           An Automated teller(ATM) machine that requires a
            token
           A light that can be switched on/off
           A television or radio
           A car that can be driven
           A graphical password scheme
Snapshot of a proof - of - concept virtual
    art gallery , which contains 36
      pictures and six computers
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security
requirements.




                       3D Virtual Environment
The design of 3D virtual
environments should follow
these guidelines:

Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
Advantages
              Flexibility
              Strength
              Ease to Memorize
              Respect of Privacy
Applications

 The 3D password’s main application domains are protecting
 critical systems and resources.

 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the following
 systems like-

Atm


Personal digital assistance


Desktop computers & laptops


Web authentication etc.
Attacks and Countermeasures

 Brute Force Attack


 Well studied Attack


 Shoulder-surfing Attack
Conclusion
 •The authentication can be improved with 3d
 password ,because the unauthorized person may not
 interact with same object at a particular location as
 the legitimate user.

 •It is difficult to crack ,because it has no fixed
 number of steps and a particular procedure.

 •Added with biometrics and token verification this
 schema becomes almost unbreakable.
QUERIES
3D password

More Related Content

What's hot

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 

What's hot (20)

3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D Password
3D Password3D Password
3D Password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password
3d password3d password
3d password
 
3d password
3d password3d password
3d password
 
3D Password
3D Password3D Password
3D Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D password
3D password3D password
3D password
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
Warwick Uni Whats It All About Virtual Worlds Roo Reynolds
Warwick Uni   Whats It All About   Virtual Worlds   Roo ReynoldsWarwick Uni   Whats It All About   Virtual Worlds   Roo Reynolds
Warwick Uni Whats It All About Virtual Worlds Roo ReynoldsRoo Reynolds
 
B tech cs-iii-guidelined for technical seminar
B tech cs-iii-guidelined for technical seminarB tech cs-iii-guidelined for technical seminar
B tech cs-iii-guidelined for technical seminarGautam Soni
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationThe Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationVeridium
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNETrahulrj9
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1Stuart Wiltshire
 
3D Internet
3D Internet3D Internet
3D Internetnandu888
 
Cybernetics - So much more than robots
Cybernetics - So much more than robotsCybernetics - So much more than robots
Cybernetics - So much more than robotsCatherine Novak, MA
 
Nano Silver Technology
Nano Silver TechnologyNano Silver Technology
Nano Silver Technologytabirsir
 

Viewers also liked (20)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Internet
3D Internet3D Internet
3D Internet
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
Ll1 exam structure
Ll1 exam structureLl1 exam structure
Ll1 exam structure
 
Warwick Uni Whats It All About Virtual Worlds Roo Reynolds
Warwick Uni   Whats It All About   Virtual Worlds   Roo ReynoldsWarwick Uni   Whats It All About   Virtual Worlds   Roo Reynolds
Warwick Uni Whats It All About Virtual Worlds Roo Reynolds
 
B tech cs-iii-guidelined for technical seminar
B tech cs-iii-guidelined for technical seminarB tech cs-iii-guidelined for technical seminar
B tech cs-iii-guidelined for technical seminar
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationThe Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric Authentication
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1
 
Presentation on photonics by prince kushwaha(RJIT)
Presentation on photonics by prince kushwaha(RJIT)Presentation on photonics by prince kushwaha(RJIT)
Presentation on photonics by prince kushwaha(RJIT)
 
Photonics devices
Photonics devicesPhotonics devices
Photonics devices
 
3D Internet
3D Internet3D Internet
3D Internet
 
Cybernetics
CyberneticsCybernetics
Cybernetics
 
Cybernetics Tradition
Cybernetics TraditionCybernetics Tradition
Cybernetics Tradition
 
Cybernetics - So much more than robots
Cybernetics - So much more than robotsCybernetics - So much more than robots
Cybernetics - So much more than robots
 
Nano Silver Technology
Nano Silver TechnologyNano Silver Technology
Nano Silver Technology
 

Similar to 3D password (20)

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
C0361419
C0361419C0361419
C0361419
 
Vivek
VivekVivek
Vivek
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3 dpswd
3 dpswd3 dpswd
3 dpswd
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3dpassword
3dpassword3dpassword
3dpassword
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d
3d3d
3d
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

3D password

  • 1.
  • 2. Authentication Authentication is a process of validating who you are to whom you claimed to be.  Human authentication techniques are as follows: 1.Knowledge Based (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 3. Three Basic Identification Methods of password Possession Knowledge (“something I have”) (“Something I know”) •Keys •Password •Passport • Pin •Smart Card •Face Biometrics •Fingerprints (“something I am”) •Iris
  • 4.
  • 5. • Password is basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple.
  • 6. Passphrase  It’s the enhance version of password.  It is a combination of words or simply collection of password in proper sequence.  It contains any well known thought also.  Length of passphrase is about 30-50 character or more than that also.
  • 8. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 9. Based on human characteristics or body organs
  • 11. % market share by type of biometric technology in 2003
  • 12.
  • 13. PASSWORD •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed such tests and he could crack 10-15 passwords per day.
  • 14. PASSPHRASE •Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
  • 15. BIOMETRICS •Biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics.. But what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….
  • 17. •The 3D passwords which are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 18.  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.
  • 19.  This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing. It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 20. Virtual objects  Virtual objects can be any object we encounter in real life: A computer on which the user can type in A fingerprint reader that requires users fingerprint A paper or white board on which user can type An Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • 21. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  • 23. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 24. The design of 3D virtual environments should follow these guidelines: Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 25. Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy
  • 26. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 27. A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
  • 28. Attacks and Countermeasures  Brute Force Attack  Well studied Attack  Shoulder-surfing Attack
  • 29. Conclusion •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable.