3D PASSWORD
-
Upload
jyothish-os -
Category
Technology
-
view
2.223 -
download
1
description
Transcript of 3D PASSWORD
![Page 1: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/1.jpg)
![Page 2: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/2.jpg)
JYOTHISH.O.S
201224
![Page 3: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/3.jpg)
INTRODUCTION
• The 3D passwords3D passwords are more customizable, and very interesting way of authentication.
• A 3D password is a multifactor authentication scheme that combine
RECOGNITIONRECOGNITION ++RECALLRECALL ++TOKENSTOKENS ++BIOMETRICSBIOMETRICS in one authentication system.
![Page 4: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/4.jpg)
•The 3D password presents a virtual environmentvirtual environment containing various virtual objects.
•The user walks through the environment and interacts with the objects.
•It is the combination and sequence of user interactions that occur in the 3D environment.
•It becomes much more difficult for the attacker to guess the user’s 3-D password
![Page 5: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/5.jpg)
Virtual objects can be any object we encounter in
real life:
A computer on which the user can type in.
A fingerprint reader that requires users fingerprint.
A paper or white board on which user can type.
An Automated teller(ATM) machine that requires a token.
A light that can be switched on/off.
A television or radio where channels can be selected.
A car that can be driven.
![Page 6: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/6.jpg)
A graphical password scheme.
A biometric recognition device.
A staple that can be punched.
A book that can be moved from one place to another.
Any real life object.
Any upcoming authentication scheme
![Page 7: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/7.jpg)
AUTHENTICATION SCHEMES
KNOWLEDGE BASED Recall basedRecognition based
TOKEN BASED
e.g : smart card
![Page 8: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/8.jpg)
• BIOMETRIC BASED
– Fingerprint ,palm prints ,hand geometry ,face recognition
– Intrusiveness upon a user’s personal characteristics.
• GRAPHICAL PASSWORDS
– Recognition based
– Recall based
![Page 9: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/9.jpg)
FUNCTIONALITIES REQUIRED
• New scheme should combine the existing authentication schemes
• User can Freedom to select the type of authentication technique.
• 3d password Should provide secrets that are easy to remember, difficult to guess.
![Page 10: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/10.jpg)
3D PASSWORD SELECTION AND INPUT
• 3D environment space represented by the co-ordinates
• User navigate into the 3D virtual environment using any input device.
• The sequence of actions and interactions forms the users 3D password.
![Page 11: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/11.jpg)
• For EXAMPLE:
Let us assume the user enters a virtual office then performs the following action:
(10,24,91) Action=Open office door (10,24,91) Action=Close office door (4,34,18) Action=Tpeine,”C” (4,34,18) Action=Typing,”O” (4,34,18)Action=Typing,”N” (10,24,80)Action=Pick up the pen (1,18,80)Action=Draw point=(330,130)
![Page 12: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/12.jpg)
3D Virtual Environment3D Virtual Environment• 3-D virtual environment affects the usability,
effectiveness, and acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security requirements.
![Page 13: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/13.jpg)
3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES
• Real-life similarity
• Object uniqueness and distinction
• Three-dimensional virtual environment
• System importance
![Page 14: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/14.jpg)
APPLICATIONS
The 3D password’s main application domains are protecting critical systems and resources.
Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding
![Page 15: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/15.jpg)
A small virtual environment can be used in the following systems like-
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
![Page 16: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/16.jpg)
Attacks and Countermeasures
• Brute Force Attack: The attack is very difficult because
1. Time required to login may vary form 20s
to 2 min therefore it is very time consuming.
2. Cost of Attack: A 3D Virtual environment may
contain biometric object ,the attacker has to forge
all biometric information.
![Page 17: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/17.jpg)
• Well Studied Attack: Attacker tries to get the most probable distribution of 3D Password. This is difficult because attacker has to perform customized attack fo different virtual environment .
• Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesful
![Page 18: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/18.jpg)
CONCLUSION
• Commonly used authentication schemes are vulnerable to attacks.
• 3D Password is a multifactor authentication scheme.
• Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.
• User’s choice and decision to construct the desired and preferred 3D password
![Page 19: 3D PASSWORD](https://reader036.fdocuments.in/reader036/viewer/2022062405/557da720d8b42a467c8b47d2/html5/thumbnails/19.jpg)
Thank You!