SlideShare a Scribd company logo
3D PASSWORD
By,
R.Preethi
M.Sc.,CS
Dept of IT
VHNSN College
Virudhunagar
Authentication
Authentication is the process of validating who are
you to whom you claimed to be or a process of
identifying an individual. It is generally based on the
following as,
1.What you Know 2.What you have 3.What you are
Need For 3D Password
• Textual Passwords
User name and Password easy to crack, subject to Brute Force
attack.
• Graphical Passwords
Recall and Recognize pictures, subject to shoulder surfing attack.
• Biometrics
Need special scanning devices to verify the users.
• Smart Cards
Can be lost or stolen, user want to carry everywhere.
3D Password
• 3D Password multi-factor Authentication scheme.
• 3D Password combines all the authentication
schemes
– What you know
– What you have
– What you recognise
– What you are
3D Password
• Presents a 3D virtual environment with various
virtual objects.
• It combines all existing scheme into one 3D
virtual environment.
• The 3D Password is constructed by the users
interaction with the virtual objects on the virtual
environment.
How it Works?
• Let us consider a 3D virtual environment space of size G ×G × G.
The 3D environment space is represented by the coordinates (x, y,
z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G].
• The objects are distributed in the 3D virtual environment with
unique (x, y, z) coordinates.
• The user can walk in the virtual environment and type something
on a computer that exist in (x1, y1, z1) position, then walk into a
room that has a white board that exist in a position (x2, y2, z2) and
draw something on the white board. The combination and the
sequence of the previous two actions towards the specific objects
construct the user’s 3D password.
3D Password
Security Analysis
• Brute Force Attack
Time Consuming
Cost of Attack is more
• Well Studied Attack
Hard to accomplish, attacker has to perform customized attacks
for different environment.
• Shoulder Surfing Attack
Attacker tries to record the user’s interaction with 3D virtual
environment using camera.
• Timing Attack
Attacker observes the total time taken by the legitimate user to log
in, it is possible if the virtual environment is poorly designed.
Application
• Critical Servers
• Online Banking
• Nuclear and Military Facilities
• Airplanes and Jetfighters
• Web Authentications,ATM,Desktop or Laptop logins
Advantage
• Provides strong security.
• As this system is based on human quality recognize and
recall, password cracking algorithms fail to crack these
passwords.
• The cost of forging information from 3D virtual environment
is very high, therefore cracking the 3D password is more
challenging.
• As the authentication system is complex the hacker will have
to study the new authentication schemes
Disadvantage
• Space required to store the password is more.
• Complexity is more in developing.
• Timing attacks can be very effective if the 3D virtual
environment is poorly designed.
• Shoulder surfing is more vulnerable. So entering these
passwords must be done in secured place.
Conclusion
• 3D Password Provides
– Flexibility: 3D Passwords allows Multifactor
authentication
– Strength: Provides almost unlimited passwords possibility.
– Easy to Remember: can be remembered in the form of
short story.
– Privacy: Organizers can select authentication schemes that
respect users privacy.
3D Password
3D Password

More Related Content

PPT
3D Password Presentation
PPTX
3D PASSWORD
PDF
3d password - Report
PPT
3D-Password: A More Secure Authentication
PPTX
3 d password
PPTX
3D PASSWORD SEMINAR
PPT
3D PASSWORD
PPTX
3d password 23 mar 14
3D Password Presentation
3D PASSWORD
3d password - Report
3D-Password: A More Secure Authentication
3 d password
3D PASSWORD SEMINAR
3D PASSWORD
3d password 23 mar 14

What's hot (20)

PPTX
3d password ppt
PPT
3 d password
PPT
3d password ppt
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3D Password and its importance
PPTX
3D Password
PPT
3D Password
PPTX
SRAVYA
PPT
graphical password authentication
PPT
3 d password
PPTX
3D Password M Sc BHU Sem 1
PPTX
3d passwords
PDF
3D Password PPT
PPTX
3d password by suresh
PPT
3D PASSWORD
PPTX
3D-Password
PPT
3D PASSWORD
PPTX
3D Password
PPTX
Graphical Password Authentication
PPTX
3D password
3d password ppt
3 d password
3d password ppt
SEMINAR REPORT ON 3D PASSWORD
3D Password and its importance
3D Password
3D Password
SRAVYA
graphical password authentication
3 d password
3D Password M Sc BHU Sem 1
3d passwords
3D Password PPT
3d password by suresh
3D PASSWORD
3D-Password
3D PASSWORD
3D Password
Graphical Password Authentication
3D password
Ad

Viewers also liked (8)

PPT
3 d password
PPTX
3D PASSWORD
PPTX
3d password
PPTX
3D PASSWORD
DOCX
Lifi technology documentation
DOCX
Lifi Seminar Report Full
DOCX
seminar report on Li-Fi Technology
PDF
3D PRINTER Seminar fair report (pdf)
3 d password
3D PASSWORD
3d password
3D PASSWORD
Lifi technology documentation
Lifi Seminar Report Full
seminar report on Li-Fi Technology
3D PRINTER Seminar fair report (pdf)
Ad

Similar to 3D Password (20)

PPTX
3DPassword_AakashTakale
PPTX
3d authentication system
DOCX
3d pass words
PPTX
3d authentication
PPTX
3D Password by Kuldeep Dhakad
PPTX
PPTX
3D password.pptx 3D passwordks which are
PPTX
3dpassword by janapriya
PPTX
3D Passwrd
PPTX
3 d secure password
PPT
3 d password by M Sangam Subudhi
PPTX
3d password ppt presentation innovative idea
PDF
C0361419
PPTX
Multi Factor Authentication using 3D password
PPTX
3d pswdbysuresh-120112091037-phpapp02
PPTX
PPTX
3d password
PPT
3D Password ppt
3DPassword_AakashTakale
3d authentication system
3d pass words
3d authentication
3D Password by Kuldeep Dhakad
3D password.pptx 3D passwordks which are
3dpassword by janapriya
3D Passwrd
3 d secure password
3 d password by M Sangam Subudhi
3d password ppt presentation innovative idea
C0361419
Multi Factor Authentication using 3D password
3d pswdbysuresh-120112091037-phpapp02
3d password
3D Password ppt

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

3D Password

  • 1. 3D PASSWORD By, R.Preethi M.Sc.,CS Dept of IT VHNSN College Virudhunagar
  • 2. Authentication Authentication is the process of validating who are you to whom you claimed to be or a process of identifying an individual. It is generally based on the following as, 1.What you Know 2.What you have 3.What you are
  • 3. Need For 3D Password • Textual Passwords User name and Password easy to crack, subject to Brute Force attack. • Graphical Passwords Recall and Recognize pictures, subject to shoulder surfing attack. • Biometrics Need special scanning devices to verify the users. • Smart Cards Can be lost or stolen, user want to carry everywhere.
  • 4. 3D Password • 3D Password multi-factor Authentication scheme. • 3D Password combines all the authentication schemes – What you know – What you have – What you recognise – What you are
  • 5. 3D Password • Presents a 3D virtual environment with various virtual objects. • It combines all existing scheme into one 3D virtual environment. • The 3D Password is constructed by the users interaction with the virtual objects on the virtual environment.
  • 6. How it Works? • Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. • The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. • The user can walk in the virtual environment and type something on a computer that exist in (x1, y1, z1) position, then walk into a room that has a white board that exist in a position (x2, y2, z2) and draw something on the white board. The combination and the sequence of the previous two actions towards the specific objects construct the user’s 3D password.
  • 8. Security Analysis • Brute Force Attack Time Consuming Cost of Attack is more • Well Studied Attack Hard to accomplish, attacker has to perform customized attacks for different environment. • Shoulder Surfing Attack Attacker tries to record the user’s interaction with 3D virtual environment using camera. • Timing Attack Attacker observes the total time taken by the legitimate user to log in, it is possible if the virtual environment is poorly designed.
  • 9. Application • Critical Servers • Online Banking • Nuclear and Military Facilities • Airplanes and Jetfighters • Web Authentications,ATM,Desktop or Laptop logins
  • 10. Advantage • Provides strong security. • As this system is based on human quality recognize and recall, password cracking algorithms fail to crack these passwords. • The cost of forging information from 3D virtual environment is very high, therefore cracking the 3D password is more challenging. • As the authentication system is complex the hacker will have to study the new authentication schemes
  • 11. Disadvantage • Space required to store the password is more. • Complexity is more in developing. • Timing attacks can be very effective if the 3D virtual environment is poorly designed. • Shoulder surfing is more vulnerable. So entering these passwords must be done in secured place.
  • 12. Conclusion • 3D Password Provides – Flexibility: 3D Passwords allows Multifactor authentication – Strength: Provides almost unlimited passwords possibility. – Easy to Remember: can be remembered in the form of short story. – Privacy: Organizers can select authentication schemes that respect users privacy.