3D Password ppts
-
Upload
vidhya-chougule -
Category
Documents
-
view
122 -
download
13
description
Transcript of 3D Password ppts
![Page 1: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/1.jpg)
3D PASSWORDFOR MORE SECUREAUTHENTICATION
Presented By:Pallavi Shelke &Vidhya Chougule
![Page 2: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/2.jpg)
EXISTING SYSTEMCurrent authentication systems suffer from many
weakness
Textual password are commonly used
Many available graphical passwords have a password space that is less than or equal to the textual password space
Smart cards or tokens can be stolen
Moreover, biometrics cannot be revoked. The 3Dpassword is a multifactor authentication scheme
![Page 3: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/3.jpg)
Three Basic Identification Methods of password
Possession (Something I have) Biometrics
(Something I am) Knowledge
(Something I know)
![Page 4: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/4.jpg)
Passphrase
It’s nothing but the enhance version of password.
Usually it is a combination of words or simply collection of password in proper sequence is Passphrase.
It contains any well known thought also. Length of Passphrase is about 30-50
character or more than that also. But it has also some limitations because 30-
50 character is creates ambiguity to remember if there is no any proper sequence.
![Page 5: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/5.jpg)
Biometrics
Refer to a broad range of technologies Automate the identification or
verification of an individual Based on human characteristics or
body organs Physiological: Face, fingerprint, iris Behavioral: Hand-written signature,
voice
![Page 6: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/6.jpg)
View of retinal scan
Eyes
Face
Fingerrin-tingp
Voice
![Page 7: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/7.jpg)
DrawbacksTextual Password:From an research 25% of the password out of 15,000
users can guessed correctly by using brute force dictionary
Graphical Password:Graphical passwords can be easily recorded as these
schemas take a longtimeOne main drawback of applying biometric is its
intrusiveness upon a users personnel characteristicsThey require special scanning device to authenticate
the user which is not acceptable for remote and internet users
![Page 8: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/8.jpg)
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL+TOKENS
+BIOMETRIC
(In one authentication system)
![Page 9: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/9.jpg)
The 3D password presents a virtual environment containing various virtual objects
The user walks through the environment and interact with the objects
The 3D password is simply the combination and sequence of user interaction that occur in the 3D environment
![Page 10: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/10.jpg)
BRIEF DESCRIPTION OF SYSTEM The 3D password can combine most existing
authentication such as textual password, graphical password, and various types of biometrics in to a 3D virtual environment
![Page 11: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/11.jpg)
![Page 12: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/12.jpg)
![Page 13: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/13.jpg)
SYSTEM IMPLEMENTATION For example, the user can enter the virtual
environment and type something on a computer that exists in (x1, y1, z1) position, then enter a room that has a fingerprint recognition device that exists in a position (x2, y2, z2) and provide his/her fingerprint.
then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password
![Page 14: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/14.jpg)
FOR EXAMPLE:
Virtual Enviornment (Chess)
![Page 15: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/15.jpg)
3D Password selection Virtual objects can be any object we encounter in real
life:A computer on which the user can typeA fingerprint reader that requires users fingerprintA paper or white board on which user can typeA Automated teller (ATM) machine that requires a
token A light that can be switched on/offA television or radioA car that can be drivenA graphical password scheme
![Page 16: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/16.jpg)
3D PASSWORD APPLICATIONThe 3D password can have a password space
that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources.
1)Critical server
2) Nuclear and military facilities
3) Airplanes and jet fighters
![Page 17: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/17.jpg)
In addition, 3D passwords can be used in less critical systems
A small virtual environment can be used in the following systems like
1) ATM
2) Personal Digital Assistance
3) Desktop Computers & laptop logins
4) Web Authentication
5) Security Analysis
![Page 18: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/18.jpg)
STATE DAIGRAM
![Page 19: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/19.jpg)
SECURITY ANALYSIS
3D Password space size
3D password distribution knowledge
![Page 20: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/20.jpg)
ATTACKS AND COUNTERMEASURES
1)Brute Force Attack
2) Well-Studied Attack
3) Shoulder Surfing Attack
4) Timing Attack
![Page 21: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/21.jpg)
CONCLUSION : -
1.The user can decide his own authentication schemes. If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above.
2.The authentication can be improved since the unauthorized persons will not interact with the same object as a legitimate user would. We can also include a timer .Higher the security higher the time.
3.The 3D environment can change according to users request. 4.It would be difficult to crack using regular techniques .Since all the
algorithms follow steps to authenticate ,our project has no fixed number of steps .Hence to calculate all those possibilities and decipher them is not easy.
5.Can be used in critical areas such as Nuclear Reactors, Missile Guiding Systems etc.
6.Added with biometrics and card verification ,the scheme becomes almost unbreakable.
![Page 22: 3D Password ppts](https://reader033.fdocuments.in/reader033/viewer/2022061416/552a156a550346646e8b4682/html5/thumbnails/22.jpg)
?