SlideShare a Scribd company logo
BY
DEVI GOMATHI. A
&
ABINAYA. S
PRE-FINAL YEAR
DEPT. OF COMPUTER SCIENCE
&
ENGINEERING
KARPAGAM COLLEGE OF
ENGINEERING
Authentication
Authentication is a process of validating who you are to whom you
claimed to be.
 General authentication techniques are as follows:
1.Knowledge Based (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
Three Basic Identification
Methods of password
Possession
(“something I
have”)
•Keys
•Passport
•Smart Card
Knowledge
(“Something I
know”)
•Password
• Pin
Biometrics
(“something I
am”)
•Face
•Fingerprints
•Iris
• Passwordis basically an encryption
algorithms.
 It is 8-15 character or slightly more than that.
 Mostly textual passwords nowadays are kept which are very simple, some taken from
dictionary, pet’s name or their favorite actor actress etc..
PASSWORD
Passphrase
 It’s the enhance version of password.
 It is a combination of words or simply collection of password
in proper sequence.
 It contains any well known thought also.
 Length of passphrase is about 30-50 character or more than
that also.
B
I
O
M
E
T
R
I
C
S
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
 Ten years back Klein performed
such tests and he could crack 10-
15 passwords per day.
 Guessable!
PASSWORD
DRAWBACKS
PASSPHRASE
•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
BIOMETRICS
Suppose you select your
fingerprint as a
biometrics..but what to do
when you have crack or
wound in your finger.
And now a days some
hackers even implement exact
copy of your biometrics
also….
 Intrusiveness to privacy
Biometrics cannot be
The 3D passwords which are more customizable, and
very interesting way of authentication.
•A 3D password is a multifactor authentication scheme
that combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICs in one authentication system.
3D PASSWORD
Measures of security
This is achieved through interacting only
with the objects that acquire information
that the user is comfortable in providing.
It becomes much more difficult for the
attacker to guess the user’s 3-D
password.
Snapshot of a proof - of -
concept virtual
art gallery , which contains 36
pictures and six computers
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
PRINCIPLE IMPLIED
The action towards an object (assume a fingerprint recognition device) that
exists in location (x1, y1 , z1 ) is different
A similar object (another fingerprint recognition device) that exists in location
(x2 , y2 , z2 ).
Therefore to perform the legitimate 3D password,user must follow the same
scenario performed by the legitimate user. This means interacting with the
same objects that reside at the exact locations and perform the exact
actions in the proper sequence
Advantages
Flexibility
Strength
Ease to
Memorize
Respect of
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
 Atm
 Personal digital assistance
 Desktop computers & laptops
 Web authentication etc.
A small virtual environment can be used in the
following systems like-
Attacks and Countermeasures
 Brute Force Attack
 Well studied Attack
 Shoulder-surfing Attack
•The authentication can be improved with 3d password ,because
the unauthorized person may not interact with same object at a
particular location as the legitimate user.
•It is difficult to crack ,because it has no fixed number of steps
and a particular procedure.
•Added with biometrics and token verification this schema
becomes almost unbreakable.
Conclusion
Thank
you

More Related Content

PPT
3D PASSWORD
PPT
3D PASSWORD
PPT
3 d password
PPTX
3d password
PPT
3D Password Presentation
PPT
3D-Password: A More Secure Authentication
PPTX
3D Password and its importance
PPTX
3d passwords
3D PASSWORD
3D PASSWORD
3 d password
3d password
3D Password Presentation
3D-Password: A More Secure Authentication
3D Password and its importance
3d passwords

What's hot (20)

PPT
3d password ppt
PPTX
SRAVYA
PDF
3d password - Report
PPTX
3d password 23 mar 14
PPT
3D Password
PPTX
3d password ppt
PPTX
3D Password M Sc BHU Sem 1
PPTX
3D Password
PPTX
3d password by suresh
PDF
3D Password PPT
PPTX
3D-Password
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3D Password
PPT
3 d password
PPTX
3D Password
PPT
3D PASSWORD
PDF
3D password
PPT
graphical password authentication
PPTX
Graphical Password Authentication
PPTX
3 d password
3d password ppt
SRAVYA
3d password - Report
3d password 23 mar 14
3D Password
3d password ppt
3D Password M Sc BHU Sem 1
3D Password
3d password by suresh
3D Password PPT
3D-Password
SEMINAR REPORT ON 3D PASSWORD
3D Password
3 d password
3D Password
3D PASSWORD
3D password
graphical password authentication
Graphical Password Authentication
3 d password
Ad

Similar to 3d password (20)

PPTX
3D password
PPTX
3dpassword ppt-120815070434-phpapp02
PPTX
3d authentication
PPT
3 dpswd
PDF
C0361419
PPTX
3dpassword by janapriya
PPT
3D Password ppt
PPTX
PPTX
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
PPTX
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
PPTX
3D Password by Kuldeep Dhakad
PDF
A Novel Revolutionary highly secured Object authentication schema
PPTX
3d pswdbysuresh-120112091037-phpapp02
DOCX
New era of authentication
PPTX
3DPassword_AakashTakale
DOC
Deepak 3 dpassword (2)
DOCX
Graphical authintication
3D password
3dpassword ppt-120815070434-phpapp02
3d authentication
3 dpswd
C0361419
3dpassword by janapriya
3D Password ppt
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
3D Password by Kuldeep Dhakad
A Novel Revolutionary highly secured Object authentication schema
3d pswdbysuresh-120112091037-phpapp02
New era of authentication
3DPassword_AakashTakale
Deepak 3 dpassword (2)
Graphical authintication
Ad

3d password

  • 1. BY DEVI GOMATHI. A & ABINAYA. S PRE-FINAL YEAR DEPT. OF COMPUTER SCIENCE & ENGINEERING KARPAGAM COLLEGE OF ENGINEERING
  • 2. Authentication Authentication is a process of validating who you are to whom you claimed to be.  General authentication techniques are as follows: 1.Knowledge Based (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 3. Three Basic Identification Methods of password Possession (“something I have”) •Keys •Passport •Smart Card Knowledge (“Something I know”) •Password • Pin Biometrics (“something I am”) •Face •Fingerprints •Iris
  • 4. • Passwordis basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple, some taken from dictionary, pet’s name or their favorite actor actress etc.. PASSWORD
  • 5. Passphrase  It’s the enhance version of password.  It is a combination of words or simply collection of password in proper sequence.  It contains any well known thought also.  Length of passphrase is about 30-50 character or more than that also.
  • 7. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 8. Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play.  Ten years back Klein performed such tests and he could crack 10- 15 passwords per day.  Guessable! PASSWORD DRAWBACKS
  • 9. PASSPHRASE •Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
  • 10. BIOMETRICS Suppose you select your fingerprint as a biometrics..but what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….  Intrusiveness to privacy Biometrics cannot be
  • 11. The 3D passwords which are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICs in one authentication system. 3D PASSWORD
  • 12. Measures of security This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing. It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 13. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  • 14. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 15. PRINCIPLE IMPLIED The action towards an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different A similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ). Therefore to perform the legitimate 3D password,user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence
  • 17. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 18.  Atm  Personal digital assistance  Desktop computers & laptops  Web authentication etc. A small virtual environment can be used in the following systems like-
  • 19. Attacks and Countermeasures  Brute Force Attack  Well studied Attack  Shoulder-surfing Attack
  • 20. •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion