SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
By:
Jaya Sinha (115415)
Oindrila Gupta (115416)
CONTENTS
 Introduction
 Three Factors of Authentication
 Existing Authentication Techniques
 Drawbacks of Existing Authentication Schemes
 3D Password Scheme
 3D Password Selection
 Designing of a 3D Virtual Environment
 Advantages of 3D Passwords
 Applications of 3D Passwords
 Attacks and Counter­Measures
 Conclusion
INTRODUCTION
Authentication  is  any  protocol  or 
process  that  permits  one  entity  to 
establish  the  identity  of  another 
entity.
➢

In  other  words,  authentication  is 
the  process  of  determining  whether 
someone or something is, in fact, who 
or what it is declared to be.
✔
Three Factors of Authentication
 1. Knowledge Based: Something you     
      know like PASSWORD, PIN

 2. Token Based: Something you possess  
      like KEYS, PASSPORT, SMART 
CARD

 3. Biometrics: Something you are like       
      FINGERPRINT, FACE, IRIS
Existing Authentication Techniques

➔

Textual Password: Recall 

Based
➔

Graphical Password: 

Recall Based + Recognition 
Based (Biometrics)
Drawbacks of Existing
Authentication Schemes
Drawbacks of Textual Passwords
Textual Passwords should be easy to 
remember, but at the same time, difficult to 
guess
●

Full password space for 8 characters, 
consisting of both numbers and characters, 
is 2*(10^14)
●

A research showed that 25% of the 
passwords out of 15,000 users could be 
guessed correctly using brute force 
dictionary
●
Drawbacks of Graphical Passwords
Graphical Passwords can be easily recorded as 
these schemes take a long time
●

The main drawback of using biometric is its 
intrusiveness upon a user's personal 
characteristics which are liable to change under 
certain situations. For example, a bruised finger 
will lead to an inconsistency in fingerprint 
pattern
●

They require special scanning device to 
authenticate the user which is not acceptable 
for remote and internet users
●
3D PASSWORD to the rescue...
3D PASSWORD SCHEME
The 3D Password scheme is a new     
  authentication scheme that 
combines
  RECOGNITION
         + RECALL
                 + TOKENS
                         + BIOMETRIC
in one authentication system
➢
The 3D password presents a virtual 
environment containing various virtual 
objects
➢

The user walks through the 
environment and interacts with 
the objects
➢

The 3D Password is simply the 
combination and sequence of 
user interactions that occur in the 
3D environment
➢
The 3D password can combine the existing authentication 
schemes such as textual passwords, graphical passwords, 
and various types of biometrics into a 3D virtual 
environment. The design of the 3D virtual environment 
and the type of objects selected determine the 3D 
password key space.
➢
3D PASSWORD SELECTION
Virtual objects can be any object       
that we encounter in real life:
a computer on which the user can type

✔

a fingerprint reader that requires the   
 user’s fingerprint
✔

a biometrical recognition device

✔

a paper or white board that a user can 
 write, sign, or draw on
✔

an automated teller machine (ATM)     
 that requires a token
✔
✔

a light that can be switched on/off

a television or radio where channels    
 can be selected
✔

✔

a stapler that can be punched

✔

a car that can be driven

a book that can be moved from one      
  place to another
✔

✔

any graphical password scheme

✔

any real­life object

✔

any upcoming authentication scheme
3D VIRTUAL ENVIRONMENT
Designing of a 3D Virtual Environment
Designing a well­studied 3­D virtual 
environment affects the usability, effectiveness, 
and acceptability of a 3­D password system. 
Therefore, the first step in building a 3­D 
password system is to design a 3­D environment 
that reflects the administration needs and the 
security requirements. The design of 3­D virtual 
environments should follow the following 
guidelines:
●

Real­life similarity: The prospective 3­D 

virtual environment should reflect what 
people are used to seeing in real life.
●

Object uniqueness and distinction: The 

design of the 3­D virtual environment 
should consider that every object should be 
distinguishable from other objects.

Three­dimensional virtual 
environment size: The size of a 3­D 
●

environment should be carefully studied as 
it can depict a space as focused as a single 
room (or office) or as vast as a city (or even 
the world).
Number of objects (items) and their 
types: Part of designing a 3­D virtual 
●

environment is determining the types of 
objects and how many objects should be 
placed in the environment. The types of 
objects reflect what kind of responses the 
object will have.
●

System importance: The 3­D virtual 

environment should consider what systems 
will be protected by a 3­D password.
ADVANTAGES OF 3D PASSWORDS
✔

Flexibility: 3D Passwords allow 

Multifactor Authentication
✔

Strength: This scenario provides 

almost unlimited possibilities of 
passwords
✔

Easy to memorize: Can be 

remembered in the form of a short story
✔

Respect of Privacy: Organizers can 

select authentication schemes that 
respect the privacy of the users
APPLICATIONS OF 3D 
PASSWORDS
Critical servers: Many large 

➢

organizations have critical servers that 
require very high security but are usually 
protected by a textual password. A 3­D 
password authentication proposes a 
sound replacement for a textual 
password. Moreover, entrances to such 
locations are usually protected by access 
cards and sometimes PIN numbers. 
Therefore, a 3­D password can be used to 
protect the entrance to such locations as well 
as protect the usage of such servers.
Airplanes and jetfighters: Because of 

➢

the possible threat of misusing airplanes 
and jetfighters for religious/political 
agendas, usage of such airplanes should be 
protected by a powerful authentication 
system.

Nuclear and military facilities: Such 

➢

facilities should be protected by the most 
powerful authentication systems. The 3­D 
password has a very large probable 
password space, and since it can contain 
token, biometrics, recognition, and 
knowledge based authentications in a 
single authentication system, it is a sound 
choice for high level security locations.
A small 3­D virtual 
environment can be used in 
many systems, including the 
following:
1) ATMs
2) personal digital assistants
3) desktop computers and       
         laptop logins
4) web authentication
ATTACKS AND COUNTER­MEASURES
Brute Force Attack: This attack is 

➢

very difficult because:
   1. It is very time consuming
   2. Attack is highly expensive

Well Studied Attack: This attack is 

➢

difficult because the attacker has to 
perform customized attack for different 
virtual environments.

Shoulder Surfing Attack: This 

➢

attack is comparatively more successful 
because the attacker uses camera to 
record the 3D Passwords of the users.
CONCLUSION
3D Password improves 
authentication.
✔

It is difficult to crack as there are 
no fixed number of steps or 
particular procedure.
✔

Added with biometrics and 
token verification, this schema 
becomes almost unbreakable.
✔
BIBLIOGRAPHY

http://en.wikipedia.org/wiki/3­D_Secure
http://www.slideshare.net
http://www.giac.org/cissp­papers/2.pdf
http://share.pdfonline.com/01906f50bd334cc688daf1
0648bb5d68/3d seminar report.htm
3D password

Contenu connexe

Tendances

SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 

Tendances (20)

SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password 3 d password
3 d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password3 d password
3 d password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password
3d password3d password
3d password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

En vedette

Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
Brian_Elliott
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
Anil Mahapatra
 

En vedette (20)

3d password
3d password3d password
3d password
 
Competitive programming
Competitive  programmingCompetitive  programming
Competitive programming
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer science
 
3D printing
3D printing 3D printing
3D printing
 
Iptv
IptvIptv
Iptv
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiation
 
Virtual stores the future of retail
Virtual stores the future of retailVirtual stores the future of retail
Virtual stores the future of retail
 
Blue brain by MAYANK SAHU
Blue brain by MAYANK SAHUBlue brain by MAYANK SAHU
Blue brain by MAYANK SAHU
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 

Similaire à 3D password

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 

Similaire à 3D password (20)

NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3 d
3 d3 d
3 d
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3 d password
3 d password3 d password
3 d password
 
C0361419
C0361419C0361419
C0361419
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
3D password
3D password 3D password
3D password
 
3d password
3d  password3d  password
3d password
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

3D password