Lovely Bansal

download Lovely Bansal

of 22

Transcript of Lovely Bansal

  • 7/27/2019 Lovely Bansal

    1/22

    MAHARANA PRATAP COLLEGE OF

    TECHNOLOGY

    seminar on: 3D PASSWORD

    CS 507

    Submitted to:

    Prof. Pragya jain

    Submitted by:Lovely Bansal

    0903CS111029CS (3rd yr)

  • 7/27/2019 Lovely Bansal

    2/22

  • 7/27/2019 Lovely Bansal

    3/22

  • 7/27/2019 Lovely Bansal

    4/22

    INTRODUCTION

    WHAT IS A PASSWORD ?

    It is a set of characters that is used for privacy reasonto authenticate a user.

    WHAT IS AUTHENTICATION ?

    Authentication is a process of validating who youare to whom you claim to be.

    WHAT IS 3D PASSWORD ?

    More customizable, very interesting way ofauthentication.

  • 7/27/2019 Lovely Bansal

    5/22

    HISTORY Years back Klein performed many tests on password

    and he could crack 10-15 password per day. Nowwith the technology change fast processor and many

    tools on the internet this has become a child play.Then comes the graphical password schema of

    Blonder is considered to be recall based since theuser must remember location.

    Further evolution for authentication withupcoming technology Jermyn et all had come upwith drawings, making the password morecomplicated.

  • 7/27/2019 Lovely Bansal

    6/22

    Recently used technology is biometrics which

    comprises of human reorganization like iris, DNAetc.

    Now the latest and the most complex way toauthenticate the user is 3D Password.

  • 7/27/2019 Lovely Bansal

    7/22

    Three Basic Identification

    Methods of password

    Possession(something I have)

    KeysPassportSmart Card

    Knowledge(Something I know)

    Password Pin

    Biometrics

    (something I am)

    FaceFingerprints

    Iris

  • 7/27/2019 Lovely Bansal

    8/22

    WHAT IS BIOMETRICS?

    Automate the identification or verification of individualbased on human characteristics or body organs.

    Physiological : face, fingerprint, iris.

    Behavioral : Hand written signature, voice

  • 7/27/2019 Lovely Bansal

    9/22

    Based on human characteristics or body organs

  • 7/27/2019 Lovely Bansal

    10/22

    3D PASSWORD

  • 7/27/2019 Lovely Bansal

    11/22

    The 3D passwordswhich are more customizable,and very interesting way of authentication.

    A 3D password is a multifactorauthentication scheme that

    combine

    RECOGNITION

    +RECALL

    +TOKENS

    +BIOMETRICS

    in one authentication system.

  • 7/27/2019 Lovely Bansal

    12/22

    The 3D password presents a vir tual environment

    containing various virtual objects.

    The user walks through the environment and interacts

    with the objects.

    It is the combination and sequence of user interactions

    that occur in the 3D environment.

  • 7/27/2019 Lovely Bansal

    13/22

    This is achieved through interacting only with the objects that

    acquire information that the user is comfortable in providing.

    It becomes much more difficult for the attacker to guess the users

    3-D password.

    AA57218752

  • 7/27/2019 Lovely Bansal

    14/22

    3D VIRTUAL ENVIRONMENT DESIGN

    GUIDELINESReal life similarity

    Object uniqueness and distinction

    Three Dimensional Virtual Environment Size

    Number of objects and their types

    System Importance

  • 7/27/2019 Lovely Bansal

    15/22

    State diagram of a possible 3-D password

    application

  • 7/27/2019 Lovely Bansal

    16/22

    ADVANTAGE

    Highly flexible

    Strength

    Ease to memorize Respect to privacy

    Difficult to share

    Difficult to crack Extremely strong

    Designed accordingly to protected system

  • 7/27/2019 Lovely Bansal

    17/22

    DISADVANTAGES

    Difficult for blind people to use this technology.

    Requires sophisticated computer technology.

    Expensive.

    A lot of program coding is required.

  • 7/27/2019 Lovely Bansal

    18/22

    Applications

    The 3D passwords main application domains are protecting

    critical systems and resources.

    Critical Servers

    Nuclear Reactors & military Facilities

    Airplanes and missile Guiding

  • 7/27/2019 Lovely Bansal

    19/22

    ATTACKS AND COUNTER MEASURES

    Brute Force Attacka) Time required to loginb) Cost of attacks

    Well Studied Attack

    Shoulder Surfing Attack

    Timing attack

  • 7/27/2019 Lovely Bansal

    20/22

    The authentication can be improved with 3d

    password ,because the unauthorized person may not

    interact with same object at a particular location as

    the legitimate user.

    It is difficult to crack ,because it has no fixed

    number of steps and a particular procedure.

    Added with biometrics and token verification thisschema becomes almost unbreakable.

    Conclusion

  • 7/27/2019 Lovely Bansal

    21/22

  • 7/27/2019 Lovely Bansal

    22/22