Sei sulla pagina 1di 18

CONTENTS :

3 BASIC AUTHENTICATION METHODS INTRODUCTION TO 3D PASSWORD EXISTING SYSTEM PROPOSED SYSTEM SYSTEM IMPLEMENTATION STATE DIAGRAM VIRTUAL OBJECTS CAN BE 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINE APPLICATION SECURITY ANALYSIS ATTACK AND COUNTER MEASURES CONCLUSION

Possession (something I have)


Passport Keys Smart cards

Biometrics (something I am)


Face Fingerprint

Knowledge (something I know)


Password PIN

INTRODUCTION TO 3D PASSWORD
A Multifactor authentication scheme that combines

RECOGNITION + TOKEN + RECALL + BIOMETRIC in single system


Presents a virtual environment containing various virtual

objects
User walks through the environment and interact with it

which creates 3D password

Existing System
Current authentication system suffers from many weaknesses
Textual passwords are common
Smart cards or token can be stolen Biometric can not be revoked

Proposed System
Users have freedom to select whether the password

be recall, token, recognition, biometric or combination of two or more


Provides secrets that are easy to remember and very

difficult for intruders to guess


Can be easily revoked or changed Are not easy to write down on paper hense difficult to

share

Brief description of the system


Various authentication schemes are combined into

one 3D virtual environment

Choice of what authentication scheme will be part of users 3D password reflects users preference and requirement

Virtual 3D Environment

Virtual object can be

1) computer with which the user can type 2) fingerprint reader that requires the users fingerprint 3) biometric recognition device 4) paper or a white board that a user can write, sign, or draw on 5) automated teller machine (ATM) that requests a token 6) light that can be switched on/off 7) television or radio where channels can be selected 8) car that can be driven In short any real life object

3D Virtual Environment Design Guidelines


Real life similarity
Object uniqueness and distinction 3 Dimensional Virtual Environment

Size
Number of objects and their types
System Importance

APPLICATION
Critical servers Nuclear and military facilities Airplanes and jet fighters ATM Web Authentication

SECURITY ANALYSIS
3D PASSWORD SPACE

SIZE

PASSWORD DISTRIBUTION

KNOWLEDGE

Attacks and Countermeasures


Brute Force Attack

Time required to login Cost of attack


Well Studied Attack Shoulder Surfing Attack

CONCLUSION
Users can decide their own authentication scheme
3D environment can change according to users request It would be difficult to crack the password using regular

techniques
Added with card verification and biometrics, scheme

becomes almost unbreakable


Can be used in critical areas such as nuclear reactors and

missile guiding systems.

http://www.google.com
http://en.wikipedia.org
http://www.technospot.net http://www.ijcaonline.org