Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Name: Rahul Bangha Semester:8th Branch: Computer Science Enrollment No: SGVU091083096 Suresh Gyan Vihar University For more secure authentication
Authentication
Authentication is a process of validating who are you to whom you claimed to be Human authentication techniques are as follows:
1. Knowledge Base (What you know) 2. Token Based(what you have) 3. Biometrics(what you are)
4. Recognition Based(What you recognise)
2.
Graphical Passwords:
Biometric schemes
(fingerprints,voice recognition etc)
Drawbacks
Textual Password:
Textual Passwords should be easy to remember at the same time easy to guess Full password space for 8 characters consisting of both numbers and characters is 2 X 10 From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
Drawbacks
recorded as these schemes take a long time. One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics. They require special scanning device to authenticate the user which is not acceptable for remote and internet users normally.
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
3D Password selection
For EXAMPLE: Let us assume the user enters a virtual office then performs the following action:
(10,24,91) Action=Open office door (10,24,91) Action=Close office door (4,34,18) Action=Tpeine,C (4,34,18) Action=Typing,O (4,34,18)Action=Typing,N (10,24,80)Action=Pick up the pen (1,18,80)Action=Draw point=(330,130)
3D Passwords Differentiators
Flexibility:3D
Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology. Strength: This scenario provides almost unlimited passwords possibility. Ease to Memorize: can be remembered in the form of short story. Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
Well Studied Attack: Attacker tries to get the most probable distribution of 3D Password. This is difficult because attacker has to perform customized attack for different virtual environment .
long it takes the legitimate user to perform correct log in using 3D Password. Which gives an indication of 3-D Passwords length. This attack cannot be successful since it gives the attacker mere hints.
QUERIES ??...