SlideShare a Scribd company logo
3D password
Authentication
Authentication is a process of validating who you are to
  whom you claimed to be.

 Human authentication techniques are as follows:
    1.Knowledge Based (What you know)
    2.Token Based(what you have)
    3.Biometrics(what you are)
Three Basic Identification
Methods of password
Possession                             Knowledge
(“something I have”)               (“Something I know”)


•Keys                             •Password
•Passport                         • Pin
•Smart Card




                       •Face
    Biometrics
                       •Fingerprints
(“something I am”)     •Iris
3D password
• Password is basically an encryption
 algorithms.

 It is 8-15 character or slightly more than that.


 Mostly textual passwords nowadays are kept which are
  very simple.
Passphrase
 It’s the enhance version of password.
 It is a combination of words or simply collection of
  password in proper sequence.
 It contains any well known thought also.
 Length of passphrase is about 30-50 character or more
  than that also.
B
I
O
M
E
T
R
I
C
S
Biometrics

•Refer to a broad range of
 technologies.


•Automate the identification
or verification of an individual.
Based on human characteristics or body organs
Process
% market share
by type of
biometric
technology in
2003
3D password
PASSWORD
           •How secure is your password?

             Now with the technology
             change, fast processors and many
             tools on the Internet, cracking
             password has become a Child's
             Play.
             Ten years back Klein performed
             such tests and he could crack 10-15
             passwords per day.
PASSPHRASE

•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
BIOMETRICS
•Biometrics has also some
drawbacks.

Suppose you select your fingerprint
as a biometrics..

But what to do when you have crack
or wound in your finger.

And now a days some hackers even
implement exact copy of your
biometrics also….
3D PASSWORD
•The 3D passwords which are more
customizable, and very interesting way of
authentication.

•A 3D password is a multifactor
authentication scheme that
combine

 RECOGNITION
    +RECALL
      +TOKENS
         +BIOMETRICS

 in one authentication system.
 The 3D password presents a virtual environment
  containing various virtual objects.

 The user walks through the environment and interacts
  with the objects.

 It is the combination and sequence of user interactions
  that occur in the 3D environment.
 This is achieved through interacting only with the objects that
  acquire information that the user is comfortable in providing.



It becomes much more difficult for the attacker to guess the user’s
   3-D password.
Virtual objects
 Virtual objects can be any object we encounter in real life:
           A computer on which the user can type in
           A fingerprint reader that requires users fingerprint
           A paper or white board on which user can type
           An Automated teller(ATM) machine that requires a
            token
           A light that can be switched on/off
           A television or radio
           A car that can be driven
           A graphical password scheme
Snapshot of a proof - of - concept virtual
    art gallery , which contains 36
      pictures and six computers
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security
requirements.




                       3D Virtual Environment
The design of 3D virtual
environments should follow
these guidelines:

Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
Advantages
              Flexibility
              Strength
              Ease to Memorize
              Respect of Privacy
Applications

 The 3D password’s main application domains are protecting
 critical systems and resources.

 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
A small virtual environment can be used in the following
 systems like-

Atm


Personal digital assistance


Desktop computers & laptops


Web authentication etc.
Attacks and Countermeasures

 Brute Force Attack


 Well studied Attack


 Shoulder-surfing Attack
Conclusion
 •The authentication can be improved with 3d
 password ,because the unauthorized person may not
 interact with same object at a particular location as
 the legitimate user.

 •It is difficult to crack ,because it has no fixed
 number of steps and a particular procedure.

 •Added with biometrics and token verification this
 schema becomes almost unbreakable.
QUERIES
3D password

More Related Content

PPT
3D PASSWORD
PPT
3D-Password: A More Secure Authentication
PPT
3D Password
PPTX
3D Password
PPTX
3D PASSWORD
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3D Password and its importance
PPTX
3d password 23 mar 14
3D PASSWORD
3D-Password: A More Secure Authentication
3D Password
3D Password
3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
3D Password and its importance
3d password 23 mar 14

What's hot (20)

PDF
3D Password PPT
PPT
3D PASSWORD
PPTX
3d password ppt
PPT
3 d password
PPT
3D Password Presentation
PPTX
3d password
PPT
3 d password
PDF
3d password - Report
PPTX
3d password by suresh
PPT
3d password ppt
PPTX
3d passwords
PPTX
3D Password
PDF
3D password
PPTX
3D PASSWORD SEMINAR
PPTX
3D Password M Sc BHU Sem 1
PPTX
3D Internet Seminar PPT - OECLIB
PPTX
3 d password
PPTX
Graphical password authentication
PPTX
Graphical password authentication
3D Password PPT
3D PASSWORD
3d password ppt
3 d password
3D Password Presentation
3d password
3 d password
3d password - Report
3d password by suresh
3d password ppt
3d passwords
3D Password
3D password
3D PASSWORD SEMINAR
3D Password M Sc BHU Sem 1
3D Internet Seminar PPT - OECLIB
3 d password
Graphical password authentication
Graphical password authentication
Ad

Viewers also liked (19)

PPTX
3D Internet
PPTX
Blue Brain
DOCX
Best topics for seminar
PPTX
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
PPTX
Ll1 exam structure
PPT
Warwick Uni Whats It All About Virtual Worlds Roo Reynolds
DOCX
B tech cs-iii-guidelined for technical seminar
PDF
The Password Is Dead: An Argument for Multifactor Biometric Authentication
PPTX
3D INTERNET
PPTX
Multifactor Authentication
PPTX
Photonic Computing Presentation V 2.1
PPTX
Presentation on photonics by prince kushwaha(RJIT)
PPTX
Photonics devices
PPTX
3D Internet
PPTX
Cybernetics
PPT
Cybernetics Tradition
PPT
Cybernetics - So much more than robots
PPTX
Nano Silver Technology
PPTX
GRAPHICS PROCESSING UNIT (GPU)
3D Internet
Blue Brain
Best topics for seminar
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
Ll1 exam structure
Warwick Uni Whats It All About Virtual Worlds Roo Reynolds
B tech cs-iii-guidelined for technical seminar
The Password Is Dead: An Argument for Multifactor Biometric Authentication
3D INTERNET
Multifactor Authentication
Photonic Computing Presentation V 2.1
Presentation on photonics by prince kushwaha(RJIT)
Photonics devices
3D Internet
Cybernetics
Cybernetics Tradition
Cybernetics - So much more than robots
Nano Silver Technology
GRAPHICS PROCESSING UNIT (GPU)
Ad

Similar to 3D password (20)

PPTX
3dpassword ppt-120815070434-phpapp02
PPTX
3d password
PPTX
3d authentication
PPTX
PPTX
3D Passwrd
PPTX
PPT
3D PASSWORD
PPTX
3d pswdbysuresh-120112091037-phpapp02
PPTX
3D - password
PPTX
3dpassword by janapriya
PPT
3 dpswd
PPTX
3D password.pptx 3D passwordks which are
PPTX
3dpswd 130320115940-phpapp01-converted
PPTX
SRAVYA
DOCX
3d pass words
PPT
3D password
PPTX
3D Password by Kuldeep Dhakad
PPT
Ppt on 3d password (2)
PPTX
3d password ppt presentation innovative idea
PPTX
3D Password
3dpassword ppt-120815070434-phpapp02
3d password
3d authentication
3D Passwrd
3D PASSWORD
3d pswdbysuresh-120112091037-phpapp02
3D - password
3dpassword by janapriya
3 dpswd
3D password.pptx 3D passwordks which are
3dpswd 130320115940-phpapp01-converted
SRAVYA
3d pass words
3D password
3D Password by Kuldeep Dhakad
Ppt on 3d password (2)
3d password ppt presentation innovative idea
3D Password

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
A Presentation on Artificial Intelligence
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
A Presentation on Artificial Intelligence
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx

3D password

  • 2. Authentication Authentication is a process of validating who you are to whom you claimed to be.  Human authentication techniques are as follows: 1.Knowledge Based (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 3. Three Basic Identification Methods of password Possession Knowledge (“something I have”) (“Something I know”) •Keys •Password •Passport • Pin •Smart Card •Face Biometrics •Fingerprints (“something I am”) •Iris
  • 5. • Password is basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple.
  • 6. Passphrase  It’s the enhance version of password.  It is a combination of words or simply collection of password in proper sequence.  It contains any well known thought also.  Length of passphrase is about 30-50 character or more than that also.
  • 8. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 9. Based on human characteristics or body organs
  • 11. % market share by type of biometric technology in 2003
  • 13. PASSWORD •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed such tests and he could crack 10-15 passwords per day.
  • 14. PASSPHRASE •Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
  • 15. BIOMETRICS •Biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics.. But what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….
  • 17. •The 3D passwords which are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 18.  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.
  • 19.  This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing. It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 20. Virtual objects  Virtual objects can be any object we encounter in real life: A computer on which the user can type in A fingerprint reader that requires users fingerprint A paper or white board on which user can type An Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
  • 21. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  • 23. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 24. The design of 3D virtual environments should follow these guidelines: Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 25. Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy
  • 26. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 27. A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
  • 28. Attacks and Countermeasures  Brute Force Attack  Well studied Attack  Shoulder-surfing Attack
  • 29. Conclusion •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable.