Sei sulla pagina 1di 14

3D-password

A more secured authentication

Meenakshi Vemula
17R21A1280
Contents

• What is Authentication
• Existing system
• Drawbacks in existing system
• Proposed system
• Advantages with proposed system
• Applications
• Attacks
• Conclusion
Authentication

Authentication is a process of actually confirming that


identity.

• Human authentication techniques are as follows:

1.Knowledge Base (What you know)


2.Token Based(what you have)

3.Biometrics(what you are)


Three Basic Identification Methods of password

Possession
(“something I have”)

Knowledge
•Keys
•Passport (“something I know”)
•Smart Card

•Password
•PIN

Biometrics
(“something I am”)

•Face
•Fingerprint
•Iris
Drawbacks
Textual Password:
– Textual Passwords should be easy to remember at the same time hard to
guess
– Full password space for 8 characters consisting of both numbers and
letters
– From an research 25% of the passwords out of 15,000 users can be
guessed correctly by using brute force dictionary
Graphical Password

 They require special scanning device to authenticate the user which is


not acceptable for remote and internet users.
3d password
The 3D Password is a multifactor authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
 The 3D password presents a virtual environment containing various
virtual objects.

 The user walks through the environment and interacts with the objects
3D environment

Snapshot of a virtual environment , which contains 36


pictures and six computers as virtual objects
Virtual objects

• Virtual objects can be any object we encounter in real life:


 A computer on which the user can type
 A fingerprint reader that requires users fingerprint
 A paper or white board on which user can type
 A Automated teller(ATM) machine that requires a token
example

 Let us consider a 3D virtual environment space of size G ×G × G. The 3D


environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G]
×[1, . . . , G] ×[1, . . . , G].

The objects are distributed in the 3D virtual environment with unique (x, y,
z) coordinates. We assume that the user can navigate into the 3D virtual
environment and interact with the objects using any input device such as a
mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and
microphone.
 For example, consider a user who navigates through the 3D virtual
environment that consists of an office and a meeting room. Let us assume that
the user is in the virtual office and the user turns around to the door located in
(10, 24, 91) and opens it. Then, the user closes the door. The user then finds a
computer to the left, which exists in the position (4, 34, 18), and the user types
“CAT.”
Advantages

 Flexibility
 Strength
 Ease to Memorize
 Respect of Privacy
DISADANTAGES
•Difficult for blind people to use this technology.
• Requires sophisticated computer technology.
• Expensive.
• A lot of program coding is required.
Applications

In addition,3D password can also be used in less critical systems

A small virtual environment can be used in the following systems like

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc..,


Conclusion

The authentication can be improved with 3d password ,because the un-


authorized person may not interact with same object at a particular
location as the legitimate user.

It is difficult to crack ,because it has no fixed no of steps and a particular


procedure

Added with biometrics and token verification this scheme becomes almost
unbreakable

Potrebbero piacerti anche