Sunteți pe pagina 1din 20

3D PASSWORD

AUTHENTICATION

PRESENTED BY:
GOURANGI AGRAWAL

1
CONTENTS
Authentication
Authentication Techniques
Need for 3D Password
3D Password Scheme
3D Virtual Environment
3D Password Selection
Working
State Diagram
Possible Attacks
Techniques to prevent Shoulder Surfing Attacks
Advantages
Disadvantages
Conclusion
References

2
AUTHENTICATION

Authentication is a process of validating who you are to whom you


claimed to be.

3
AUTHENTICATION TECHNIQUES

KNOWLEDGE
BASED

AUTHENTICATION
TOKEN
TECHNIQUES
BASED

BIOMETRICS

4
NEED FOR 3D PASSWORD
TEXTUAL PASSWORD:
Easy to remember-easy to guess.
Hard to guess-hard to remember.

GRAPHICAL PASSWORDS:
Graphical passwords can be easily recorded.

TOKEN PASSWORDS:
Vulnerable to theft.
User has to carry the token whenever the access is required.

BIOMETRICS PASSWORDS:
Retina biometrical recognition schemes require the user to willingly subject their
eyes to a low-intensity infrared light so specified environment is required.

5
3D PASSWORD SCHEME
3D password scheme is a multifactor authentication scheme that
combine
knowledge+
TOKENS+
BIOMETRICS
in one authentication scheme

6
3D VIRTUAL ENVIRONMENT

Snapshot of a virtual environment containing


pictures and computers as virtual objects.
7
3D PASSWORD SELECTION
We can have the following objects in the virtual environment:

A biometric recognition device.


A paper or a white board on which a user can write, sign, or draw on.
An automated teller machine (ATM) that requests a token.
A light that can be switched on/off.
A staple that can be punched.
A chair that can be moved from one place to another.
Any graphical password scheme.

8
WORKING

This 3D virtual environment contains several objects with which the


user can interact.

The sequence of actions and interactions towards the objects inside the
3D environment constructs the users 3D password.

The 3D password can combine most existing authentication schemes.

The choice of what authentication schemes is used will be the part of


the user's 3D password that reflects the user's preferences and
requirements.

9
STATE DIAGRAM

10
POSSIBLE ATTACKS
Brute Force Attack
Shoulder Surfing Attack
Timing Attack
Key Logger

11
ADVANTAGES

Flexibility
Strength

Easy to Memorize

Difficult to Share

12
DISADVANTAGES

Highly expensive
Non-resistant to Shoulder Surfing Attack

Large time and memory requirement

13
TECHNIQUES TO PREVENT
SHOULDER SURFING ATTACKS

Eye gaze technique

Keypad recessed technology

Pass-images concept

14
CONCLUSION

The authentication can be improved with 3d password, because the


unauthorized person may not interact with same object at a particular
location as the legitimate user.

It is difficult to crack, because it has no fixed number of steps and a


particular procedure.

Added with biometrics and token verification this scheme becomes


almost unbreakable.

15
REFERENCES

123seminarsonly.com

www.youtube.com/watch?v=4bvMo1NiyX0

www.ijesit.com/Volume%202/Issue%202/IJESIT201302_16.pdf

http://www.slideshare.net/Gowsalyasri/3d-password-ppt

www.erpublication.org/admin/vol_issue1/upload%20Image/IJETR031339.pdf

16
17
ANY QUERIES?
3D PASSWORD AUTHENTICAT

PRESENTED BY:
GOURANGI AGRAWAL
SECTION-B (B2)
1308210037
19
APPLICATIONS

Critical servers
Nuclear and Military Services
Airplanes And Jet Fighters
Personal Digital Assistance
Desktop Computers And Laptop Login

20

S-ar putea să vă placă și