SlideShare a Scribd company logo
A Seminar Presentation
on
3-D Secure Password
Jaiprakash
(113013000010)
Institute of Engineering and Technology
Bhagwant University
Ajmer
4/23/2015 13-D Secure Password
PRESENTATION OUTLINE
• Introduction
• Three Factors of Authentication
• Existing Authentication Techniques
• Drawbacks of Existing Authentication Schemes
• 3D Password Scheme
• 3D Password Selection
• Advantages of 3D Passwords
• Applications of 3D Passwords
• Attacks and Countermeasures
• Conclusion
4/23/2015 23-D Secure Password
INTRODUCTION
•Authentication is any protocol or process that permits
one entity to establish the identity of another entity.
•In other words, authentication is the process of
determining whether someone or something is, in fact,
who or what it is declared to be.
4/23/2015 33-D Secure Password
THREE FACTORS OF AUTHENTICATION
•Knowledge Based: Something you know like
PASSWORD, PIN
•Token Based: Something you possess like
•KEYS, PASSPORT, SMART CARD
•Biometrics: Something you are like
•FINGERPRINT, FACE, IRIS
4/23/2015 43-D Secure Password
EXISTING AUTHENTICATION TECHNIQUES
•Textual Password:
Recall Based
•Graphical Password:
Recall Based + Recognition Based (Biometrics)
4/23/2015 53-D Secure Password
DRAWBACKS OF EXISTING AUTHENTICATION
SCHEMES
Drawbacks of Textual Passwords
•Textual Passwords should be easy to remember, but at
the same time, difficult to guess.
•Full password space for 8 characters, consisting of both
numbers and characters, is 2*(10^14).
•A research showed that 25% of the passwords out of
15,000 users could be guessed correctly using brute
force dictionary.
Continue..4/23/2015 63-D Secure Password
DRAWBACKS OF GRAPHICAL
PASSWORDS
•Graphical Passwords can be easily recorded as these
schemes take a long time.
•The main drawback of using biometric is its
intrusiveness upon a user's personal characteristics
which are liable to change under certain situations.
For example, a bruised finger will lead to an
inconsistency in fingerprint pattern.
•They require special scanning device to authenticate the
user which is not acceptable for remote and internet
users.
4/23/2015 73-D Secure Password
3D PASSWORD SCHEME
•The 3D password can combine the existing
authentication schemes such as textual passwords,
graphical passwords, and various types of biometrics into
a 3D virtual environment. The design of the 3D virtual
environment and the type of objects selected determine
the 3D password key space.
4/23/2015 83-D Secure Password
3D PASSWORD SELECTION
•A fingerprint reader that requires the user’s fingerprint.
•A biometrical recognition device.
•A paper or white board that a user can write, sign, or
draw on.
•An automated teller machine (ATM) that requires a
token.
4/23/2015 93-D Secure Password
ADVANTAGES OF 3D PASSWORDS
• Flexibility: 3D Passwords allow Multifactor
Authentication.
• Strength: This scenario provides almost unlimited
possibilities of Passwords.
• Easy to memorize: Can be remembered in the form of
a short story.
• Respect of Privacy: Organizers can select
authentication schemes that respect the privacy of the
users.
4/23/2015 103-D Secure Password
APPLICATIONS OF 3D PASSWORDS
•Servers: Many large organizations have critical
servers that require very high security but are usually
protected by a textual password. A 3D password
authentication proposes a sound replacement for a
textual password. so, it can be used to protect the
entrance to such locations as well as protect the usage of
such servers.
•Nuclear and military facilities: Such facilities should
be protected by the most powerful authentication 3D
password systems.
•ATMs, Desktop and Laptop Logins, Web Authentication etc.
4/23/2015 113-D Secure Password
ATTACKS AND COUNTERMEASURES
•Brute Force Attack: This attack is very difficult because:
It is very time consuming. Attack is highly expensive
•Well Studied Attack: This attack is difficult because the
attacker has to perform customized attack for different
virtual environments.
•Shoulder Surfing Attack: This attack is comparatively
more successful because the attacker uses camera to
record the 3D Passwords of the users.
4/23/2015 123-D Secure Password
CONCLUSION
•3D Password improves authentication.
•It is difficult to crack as there are no fixed number of
steps or particular procedure.
•Added with biometrics and token verification, this
schema becomes almost unbreakable.
4/23/2015 133-D Secure Password
Please ask Queries
4/23/2015 143-D Secure Password

More Related Content

PPTX
3D Password and its importance
PPTX
SRAVYA
PDF
3D Password PPT
PPTX
3d password 23 mar 14
PPT
3D-Password: A More Secure Authentication
PPTX
3D Password M Sc BHU Sem 1
PPT
3D password
PPT
3D Password Presentation
3D Password and its importance
SRAVYA
3D Password PPT
3d password 23 mar 14
3D-Password: A More Secure Authentication
3D Password M Sc BHU Sem 1
3D password
3D Password Presentation

What's hot (20)

PPTX
3D Password
PPTX
3D Password
PPT
3d password ppt
PPTX
3 d password
PPTX
3D PASSWORD
PDF
3d password - Report
PPT
3D Password
PPTX
3DPassword_AakashTakale
PPT
3D PASSWORD
PPT
3dpassword
PPT
3 d password by M Sangam Subudhi
PPT
3 d password
PPTX
3D PASSWORD
PPTX
3d password ppt
PPTX
3D-Password
PPTX
3d passwords
PPTX
3D password
PPTX
3D Password
PPTX
Kanishka_3D Passwords
PDF
3D password
3D Password
3D Password
3d password ppt
3 d password
3D PASSWORD
3d password - Report
3D Password
3DPassword_AakashTakale
3D PASSWORD
3dpassword
3 d password by M Sangam Subudhi
3 d password
3D PASSWORD
3d password ppt
3D-Password
3d passwords
3D password
3D Password
Kanishka_3D Passwords
3D password
Ad

Similar to 3 d secure password (20)

PPTX
3D password.pptx 3D passwordks which are
PPTX
Multi Factor Authentication using 3D password
PPTX
PPTX
GADISA GEMECHUGOOD POWERPOINT .pptx @here
PPTX
3D Password
PPTX
3-D PASSWORD IN HARDWARE PPT.pptx
PPTX
3d password ppt presentation innovative idea
PPTX
3d authentication system
PPTX
3d password
PPTX
3dpswd 130320115940-phpapp01-converted
PPTX
3d authentication
PPTX
Graphical password
PDF
IRJET- Password Management Kit for Secure Authentication
PPTX
3D Passwrd
PDF
Effectiveness of various user authentication techniques
PPTX
Whatscrypt Messenger for android project
PPT
You Can't Spell Enterprise Security without MFA
PPT
3D Password ppt
PDF
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
3D password.pptx 3D passwordks which are
Multi Factor Authentication using 3D password
GADISA GEMECHUGOOD POWERPOINT .pptx @here
3D Password
3-D PASSWORD IN HARDWARE PPT.pptx
3d password ppt presentation innovative idea
3d authentication system
3d password
3dpswd 130320115940-phpapp01-converted
3d authentication
Graphical password
IRJET- Password Management Kit for Secure Authentication
3D Passwrd
Effectiveness of various user authentication techniques
Whatscrypt Messenger for android project
You Can't Spell Enterprise Security without MFA
3D Password ppt
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
Ad

Recently uploaded (20)

PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPTX
communication and presentation skills 01
PDF
PPT on Performance Review to get promotions
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
introduction to datamining and warehousing
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Current and future trends in Computer Vision.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
737-MAX_SRG.pdf student reference guides
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
communication and presentation skills 01
PPT on Performance Review to get promotions
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
introduction to datamining and warehousing
Safety Seminar civil to be ensured for safe working.
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Current and future trends in Computer Vision.pptx
III.4.1.2_The_Space_Environment.p pdffdf
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Categorization of Factors Affecting Classification Algorithms Selection
737-MAX_SRG.pdf student reference guides
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Fundamentals of safety and accident prevention -final (1).pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...

3 d secure password

  • 1. A Seminar Presentation on 3-D Secure Password Jaiprakash (113013000010) Institute of Engineering and Technology Bhagwant University Ajmer 4/23/2015 13-D Secure Password
  • 2. PRESENTATION OUTLINE • Introduction • Three Factors of Authentication • Existing Authentication Techniques • Drawbacks of Existing Authentication Schemes • 3D Password Scheme • 3D Password Selection • Advantages of 3D Passwords • Applications of 3D Passwords • Attacks and Countermeasures • Conclusion 4/23/2015 23-D Secure Password
  • 3. INTRODUCTION •Authentication is any protocol or process that permits one entity to establish the identity of another entity. •In other words, authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. 4/23/2015 33-D Secure Password
  • 4. THREE FACTORS OF AUTHENTICATION •Knowledge Based: Something you know like PASSWORD, PIN •Token Based: Something you possess like •KEYS, PASSPORT, SMART CARD •Biometrics: Something you are like •FINGERPRINT, FACE, IRIS 4/23/2015 43-D Secure Password
  • 5. EXISTING AUTHENTICATION TECHNIQUES •Textual Password: Recall Based •Graphical Password: Recall Based + Recognition Based (Biometrics) 4/23/2015 53-D Secure Password
  • 6. DRAWBACKS OF EXISTING AUTHENTICATION SCHEMES Drawbacks of Textual Passwords •Textual Passwords should be easy to remember, but at the same time, difficult to guess. •Full password space for 8 characters, consisting of both numbers and characters, is 2*(10^14). •A research showed that 25% of the passwords out of 15,000 users could be guessed correctly using brute force dictionary. Continue..4/23/2015 63-D Secure Password
  • 7. DRAWBACKS OF GRAPHICAL PASSWORDS •Graphical Passwords can be easily recorded as these schemes take a long time. •The main drawback of using biometric is its intrusiveness upon a user's personal characteristics which are liable to change under certain situations. For example, a bruised finger will lead to an inconsistency in fingerprint pattern. •They require special scanning device to authenticate the user which is not acceptable for remote and internet users. 4/23/2015 73-D Secure Password
  • 8. 3D PASSWORD SCHEME •The 3D password can combine the existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. 4/23/2015 83-D Secure Password
  • 9. 3D PASSWORD SELECTION •A fingerprint reader that requires the user’s fingerprint. •A biometrical recognition device. •A paper or white board that a user can write, sign, or draw on. •An automated teller machine (ATM) that requires a token. 4/23/2015 93-D Secure Password
  • 10. ADVANTAGES OF 3D PASSWORDS • Flexibility: 3D Passwords allow Multifactor Authentication. • Strength: This scenario provides almost unlimited possibilities of Passwords. • Easy to memorize: Can be remembered in the form of a short story. • Respect of Privacy: Organizers can select authentication schemes that respect the privacy of the users. 4/23/2015 103-D Secure Password
  • 11. APPLICATIONS OF 3D PASSWORDS •Servers: Many large organizations have critical servers that require very high security but are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password. so, it can be used to protect the entrance to such locations as well as protect the usage of such servers. •Nuclear and military facilities: Such facilities should be protected by the most powerful authentication 3D password systems. •ATMs, Desktop and Laptop Logins, Web Authentication etc. 4/23/2015 113-D Secure Password
  • 12. ATTACKS AND COUNTERMEASURES •Brute Force Attack: This attack is very difficult because: It is very time consuming. Attack is highly expensive •Well Studied Attack: This attack is difficult because the attacker has to perform customized attack for different virtual environments. •Shoulder Surfing Attack: This attack is comparatively more successful because the attacker uses camera to record the 3D Passwords of the users. 4/23/2015 123-D Secure Password
  • 13. CONCLUSION •3D Password improves authentication. •It is difficult to crack as there are no fixed number of steps or particular procedure. •Added with biometrics and token verification, this schema becomes almost unbreakable. 4/23/2015 133-D Secure Password
  • 14. Please ask Queries 4/23/2015 143-D Secure Password