Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract
Existing systems of authentication are plagued by many
weaknesses. Commonly, textual passwords are used to secure
data or user accounts. However these can be cracked by the
application of various brute-force algorithms as the maximum
password length is fixed and there are a finite number of
possibilities which exist.
Presently existing graphical
passwords have password space which is lesser than or equal
to the textual password space. The 3D password authentication
scheme is based on a combination of multiple sets of factors.
A 3D virtual environment is presented to the user where he
navigates and interacts with a multitude of objects which are
present. The order in which actions and interactions are
performed with respect to the objects constitutes the users 3D
password. The 3D password key space is built on the basis of
the design of the 3D virtual environment and the nature of the
objects selected. The advantage of the 3D password is that it
can combine many existing systems of authentication,
providing an extremely high degree of security to the user.
Biometrics can be coupled with the 3D password to further
increase the degree of security, making it extremely secure
and suitable for applications in which information security is
of essence. Several techniques like face recognition,
fingerprint recognition, hand geometry, iris recognition, and
palm print, vascular pattern recognition can be used. Pins and
passwords may be forgotten and token based identification
methods such as passports and driver licenses may be forged,
stolen, or lost. Thus the biometric system of identification
enjoys a new interest. It can even be applied in the most basic
level such as for a user on a home system as it is based on
recall on recognition and is easy to use.
1. Introduction
1.1 History
Users commonly use textual passwords, but do not take their
recommendations into account. They are inclined to select
words of significance from dictionaries, making then liable to
dictionary or brute force attacks. [3]
The fundamental principle behind graphical passwords is that
users would find it easier to remember and identify pictures as
compared to words. However, this paradigm faces a number of
complications. Some graphical passwords require a long time
to be executed, and more importantly, they can easily be noted
ISSN No: 2250-3536
92
1.3 Biometrics
Biometrics or biometric authentication is used to identify
human beings on the basis of their characteristics or traits. It
is commonly used as a form of identification and access
control. Biometrics identifiers are the different characteristics
which can be measured that can be used to identify
individuals. There are two categories of biometric identifiers;
these include physiological and behavioral characteristics.
Biometric functionality encapsulates a variety of different
aspects. Selecting the use of a particular biometric for a
specified application must take several factors into
consideration.
1) Universality: Every person using the system should
posses the trait.
2) Uniqueness: The trait must be unique to each
individual who uses the system such that they can be
distinguished from one and another.
3) Permanent: The trait should be permanent and
invariant over time.
4) Measurability (Collectability): This refers to the ease
with which the trait can be acquired or measured.
5) Performance: This refers to the accuracy, speed and
robustness of the technology that is being used.
6) Acceptability: This encompasses how ready
individuals are to have their trait captured and
assessed.
7) Circumvention: This measures how easy it is for a
trait to be emulated by making use of an artifact or a
substitute.
It is unlikely that a single biometric system will meet the
needs of all applications. Figure 1 below shows the basic
block diagram of a biometric system.
93
94
Move Camera: The sub actions are Left, Right, Up, Down,
In, Out. When the user single clicks on these buttons then the
camera or reference point moves 45 co-ordinates with
respective to the button which is clicked. The maximum
number of times each button can be clicked is six. Clicking
the button for a seventh time will result in an error message
to the user indicating that the maximum limit has been
crossed.
Turn Camera: The sub actions specified by this button are
Left, Right, Up, Down, CW (Clockwise), CCW (Counter
clock -Wise) direction. A c l i c k o n e a c h o f t h e s e
b u t t o n s t r a n s l a t e s t h e c u b e by 45 co-ordinates
with respect to which button is clicked. The maximum
number of times each button can be clicked is six. Clicking
the button for a seventh time will result in an error message
to the user indicating that the maximum limit has been
crossed.
(Lmax, G) = (m + g (AC)) n
n=l
Here,
m All possible actions and interaction towards all existing
objects. In the case of our example, the value is 20.
g(AC) The count of the total number of actions and inputs
towards the environment. In our example, the action is only
one i.e. moving the object and the interactions are 3
(moving pawn forward, moving either knight in two
different ways). So the value of g(AC) is 3.
G (GGG) Number of actions, interactions and inputs,
for consideration action is only one i.e. move, interactions
are 3 and inputs are nil. So the value of G is 3.
Lmax The maximum length of password. Here Lmax =
17. Then the possible password space for our consideration is
[1]:
n=17
(17, 3) = (20+ 3) n
n=1
= 3.7714x1043
The above value gives the total amount of space in bytes that
is requires to store the password for environment1.
95
inputs.
Number of actions = 4 (moving cube, rotating cube, moving
camera, rotating camera)
Number of interactions = 6
Number of inputs = 6 (Placing an image on each side of cube)
(Lmax, G) = (m + g (AC))n
n=1
n=8
n=Lmax
(Lmax, G) = (m + g (AC))n
n=1
n=1
= 1.474461020
The above value gives the total amount of space in bytes that
would be required to store the 3D password for environment2
without an input.
n=111
G = GG = 46 = 24
96
No. of
Action/
Charact
er
23
18
21
354
28
50
39
19
22
370
30
55
55
22
23
391
32
60
71
23
24
402
33
66
87
24
25
418
34
71
103
26
26
428
35
76
119
10
28
8
27
439
36
82
28
468
38
60
29
476
39
67
30
487
40
74
31
522
42
80
32
530
43
87
33
546
44
94
34
572
46
100
35
604
47
71
36
612
49
79
37
620
50
87
38
628
52
95
39
652
53
103
40
660
54
111
135
12
31
151
13
34
10
167
14
36
11
188
15
39
12
202
16
42
13
218
18
44
14
236
19
39
15
247
20
43
16
263
22
47
17
283
23
51
18
300
24
55
19
319
26
59
20
340
27
63
97
5. Acknowledgments
6. References
Figure 4 shows that the blue line shows the password space
required for 3-D Env-1 and the yellow line password space
for Env-2 with images and the green line shows the
password space required for Env-2 with no images
whereas the pink line shows the password length for text
password[1].
4. Conclusion
98