Upload
neeraj-kumar-tiwari
View
68
Download
12
Embed Size (px)
Citation preview
1
3D PASSWORD
PRESENTATION BY:NEERAJ KUMAR TIWARIDEPT- IT ROLL NO- 34SUPERVISOR NAME:-Dr. AMITAVA NAG
WHY 3D PASSWORD ?? Current Authentication suffer from many weakness .Textual passwords
are commonly used, users do not follow their requirements .Users tends to choose meaningful words from dictionaries, which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper, we present and evaluate our contribution i.e. the 3D password
INTRODUCTION:-
A 3D password is a multifactor authentication scheme that combine in one authentication system
.
The 3D password presents a 3D virtual environment containing various virtual objects.
AUTHENTICATION SCHEME
KNOWLEDGE BASE(WHAT YOU KNOW)
TOKEN BASE(WHAT YOU HAVE)
BIOMETRIC BASE(WHAT YOU ARE)
TEXTUAL PASSWORD
GRAPHICAL PASSWORD
ATMKEY
ID CARD
FINGER PRINTHAND GEOMETRYFACE,IRIS,VOICE,RETINA
• ACCESS GRANTED
FILLING USER NAME AND PASSWORD
MOVING INSIDE VIRTUAL 3D ENVIRONMENT
TYPING TEXTUAL password Performing a
graphical password
Performing biometrics
Changing object statusverifying
LOGIN PRESSED
ACCESS DENIED
A biometric item is clicked
Clicked on a textual item
Press a specific key after finish
Click on a graphical password item
Press a specific key
Moving object,turn switch on/off…etc
Type a letter or a number
click
STATE DIAGRAM
Entering inside the 3d environment
USERNAME3D USER LOGIN
NEERAJ KUMAR
PASSWORD
TEXTUAL PASSWORD AUTHENTICATION(knowledge base)
LOGIN REMEMBER ME Forget your password ?
Biometric based authentication(what you have)
Moving object in 3d environment
More than one authorization
USE OF 3D PASSWORD Critical Servers
Banking
Nuclear and military Facilities
Airplanes and JetFighters
ADVANTAGES OF 3D PASSWORD Provides security. 3D graphical password has no limit. Password can change easily. Password can be remember easily.
DISADVANTAGES OF 3D PASSWORD
Difficult for blind people to use this technology.
Expensive scheme.
A lot of program coding is required.
Attacks & countermeasures :
Well-studied attacks
Brute force Attacks
Timing Attacks
Shoulder Surfing attacks
Conclusion:It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
Added with biometrics and token verification this schema becomes almost unbreakable.
Thank You!!.
??Question