31

3dpassword ppt-120815070434-phpapp02

Embed Size (px)

Citation preview

Page 1: 3dpassword ppt-120815070434-phpapp02
Page 2: 3dpassword ppt-120815070434-phpapp02

Authentication

Authentication is a process of validating who you are to

whom you claimed to be.

Human authentication techniques are as follows:

1.Knowledge Based (What you know)

2.Token Based(what you have)

3.Biometrics(what you are)

Page 3: 3dpassword ppt-120815070434-phpapp02

Three Basic Identification

Methods of password

Possession(“something I have”)

•Keys •Passport •Smart Card

Knowledge(“Something I know”)

•Password • Pin

Biometrics(“something I am”)

•Face•Fingerprints•Iris

Page 4: 3dpassword ppt-120815070434-phpapp02
Page 5: 3dpassword ppt-120815070434-phpapp02

• Password is basically an encryption

algorithms.

It is 8-15 character or slightly more than that.

Mostly textual passwords nowadays are kept which are

very simple.

Page 6: 3dpassword ppt-120815070434-phpapp02

Passphrase

It’s the enhance version of password.

It is a combination of words or simply collection of

password in proper sequence.

It contains any well known thought also.

Length of passphrase is about 30-50 character or more

than that also.

Page 7: 3dpassword ppt-120815070434-phpapp02

B

I

O

M

E

T

R

I

C

S

Page 8: 3dpassword ppt-120815070434-phpapp02

Biometrics

•Refer to a broad range of

technologies.

•Automate the identification

or verification of an individual.

Page 9: 3dpassword ppt-120815070434-phpapp02

Based on human characteristics or body organs

Page 10: 3dpassword ppt-120815070434-phpapp02

Process

Page 11: 3dpassword ppt-120815070434-phpapp02

% market share by type of biometric technology in 2003

Page 12: 3dpassword ppt-120815070434-phpapp02
Page 13: 3dpassword ppt-120815070434-phpapp02

•How secure is your password?

Now with the technology change,

fast processors and many tools on

the Internet, cracking password has

become a Child's Play.

Ten years back Klein performed

such tests and he could crack 10-15

passwords per day.

PASSWORD

Page 14: 3dpassword ppt-120815070434-phpapp02

PASSPHRASE

•Passphrase length is about 30-50 characters or

more than that so it creates ambiguity to remember

if there is no any proper sequence.

Page 15: 3dpassword ppt-120815070434-phpapp02

BIOMETRICS

•Biometrics has also some

drawbacks.

Suppose you select your fingerprint

as a biometrics..

But what to do when you have crack

or wound in your finger.

And now a days some hackers even

implement exact copy of your

biometrics also….

Page 16: 3dpassword ppt-120815070434-phpapp02

3D PASSWORD

Page 17: 3dpassword ppt-120815070434-phpapp02

•The 3D passwords which are more

customizable, and very interesting way of

authentication.

•A 3D password is a multifactor

authentication scheme that

combine

RECOGNITION

+RECALL

+TOKENS

+BIOMETRICS

in one authentication system.

Page 18: 3dpassword ppt-120815070434-phpapp02

The 3D password presents a virtual environment

containing various virtual objects.

The user walks through the environment and interacts

with the objects.

It is the combination and sequence of user interactions

that occur in the 3D environment.

Page 19: 3dpassword ppt-120815070434-phpapp02

This is achieved through interacting only with the objects that

acquire information that the user is comfortable in providing.

It becomes much more difficult for the attacker to guess the user’s

3-D password.

Page 20: 3dpassword ppt-120815070434-phpapp02

Virtual objects

Virtual objects can be any object we encounter in real life:

A computer on which the user can type in

A fingerprint reader that requires users fingerprint

A paper or white board on which user can type

An Automated teller(ATM) machine that requires a

token

A light that can be switched on/off

A television or radio

A car that can be driven

A graphical password scheme

Page 21: 3dpassword ppt-120815070434-phpapp02

Snapshot of a proof - of - concept virtual

art gallery , which contains 36

pictures and six computers

Page 22: 3dpassword ppt-120815070434-phpapp02

3D VIRTUAL

ENVIRONMENT

Page 23: 3dpassword ppt-120815070434-phpapp02

3D Virtual Environment

•3-D virtual environment affects the usability, effectiveness, and

acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security

requirements.

3D Virtual Environment

Page 24: 3dpassword ppt-120815070434-phpapp02

The design of 3D virtual

environments should follow

these guidelines:

Real Life Similarity

Object Uniqueness & Distinction

3D Virtual Environment Size

Number of objects & their types

System Importance

Page 25: 3dpassword ppt-120815070434-phpapp02

Advantages

Flexibility

Strength

Ease to Memorize

Respect of Privacy

Page 26: 3dpassword ppt-120815070434-phpapp02

Applications

The 3D password’s main application domains are protecting

critical systems and resources.

Critical Servers

Nuclear Reactors & military Facilities

Airplanes and missile Guiding

Page 27: 3dpassword ppt-120815070434-phpapp02

A small virtual environment can be used in the following

systems like-

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc.

Page 28: 3dpassword ppt-120815070434-phpapp02

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

Page 29: 3dpassword ppt-120815070434-phpapp02

•The authentication can be improved with 3d

password ,because the unauthorized person may not

interact with same object at a particular location as

the legitimate user.

•It is difficult to crack ,because it has no fixed

number of steps and a particular procedure.

•Added with biometrics and token verification this

schema becomes almost unbreakable.

Conclusion

Page 30: 3dpassword ppt-120815070434-phpapp02

QUERIES

Page 31: 3dpassword ppt-120815070434-phpapp02