SlideShare a Scribd company logo
3-D PASSWORD
A more secured
authentication
ANKIT
NAGAR
INTRODUCTION
• Commonly used authentication schemes are textual
passwords, graphical passwords and biometrics.
• 3D password is a multifactor authentication scheme.
• To be authenticated, we require a 3D virtual environment.
•Combines recognition, recall, token, and biometrics
based systems.
•Users choice to select the type of authentication
technique.
Authentication
• Authentication is a process of validating who are you to
whom you claimed to be.
Common Authentication Techniques used in computer
world
1. Textual Passwords(Recall Based)-:Recall what you have created
before.
2. Graphical Passwords: (Recall Based + Recognition Based).
3. Token Based : ATM Cards, Keys , ID Cards
4. Biometric Passwords : fingerprints, palm prints, hand geometry,
face recognition, voice recognition, iris recognition, and retina
recognition
Human Authentication
Techniques
Knowledge Base
( What you know )
Token Based
( What you have )
Biometrics
( What you are)
Textual Password
Graphical Password
ATM Card
Keys
ID Cards
Fingerprints,Palmprint
Hand Geometry
Face,iris,voice,retina
Drawbacks of Common Authentication
Techniques & Existing system
Textual Password:
• Textual passwords are commonly used. Users tend to choose meaningful
words from dictionaries, which make textual passwords easy to break and
vulnerable to dictionary or brute force attacks.
• Full password space for 8 characters consisting of both numbers and
characters is at most 2 X 10¹⁴.
• From an research 25% of the passwords out of 15,000 users can guessed
correctly by using brute force dictionary.
Graphical Password :
• Graphical passwords can be easily recorded but some schemes take a long time
to perform.
Token Password:
• Most unsecured one, if stolen can breech through any
security levels. Smart cards or tokens can be stolen.
Biometric Password:
• One main drawback of applying biometric is its
intrusiveness upon a user’s personal characteristic and the
effect on their privacy.
• Retina biometrical recognition schemes require
the user to willingly subject their eyes to a low-
intensity infrared light so specified environment
is required.
• In addition, most biometric systems require a
special scanning device to authenticate users,
which is not applicable for remote and Internet
users.
PROPOSED SYSTEM
• The proposed system is a multi factor authentication
scheme that combines the benefits of various
authentication schemes.
• Users have the freedom to select whether the 3D
password will be solely recall, biometrics,
recognition, or token based, or a combination of two
schemes or more.
• This freedom of selection is necessary
because users are different and they have
different requirements. Therefore, to
ensure high user acceptability, the user’s
freedom of selection is important.
3D PASSWORD SCHEME
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL
+ TOKENS
+ BIOMETRIC
In one authentication system
 The 3D password presents a virtual environment containing various virtual objects.
 The user walks through the environment and interacts with the objects .
 The 3d Password is simply the combination and sequence of user interactions that
occur in the 3D environment.
FUNCTIONALITIES REQUIRED
• New scheme should combine the existing authentication schemes
• Freedom to select the type of authentication technique.
• Should provide secrets that are easy to remember, difficult to guess.
3D PASSWORD SELECTION AND INPUT
• 3D environment space represented by the co-ordinates
• User navigate into the 3D virtual environment using any input device.
• The sequence of actions and interactions forms the users 3D
password.
3D Password selection and Inputs
Virtual objects can be any object we encounter in real life:
• A computer with which the user can type;
• A fingerprint reader that requires the user’s fingerprint;
• A biometrical recognition device;
• A paper or a white board that a user can write, sign, or Draw on;
• An automated teller machine (ATM) that requests a token;
• A light that can be switched on/off;
• A television or radio where channels can be selected;
• A staple that can be punched;
• A car that can be driven;
• A book that can be moved from one place to another;
• Any graphical password scheme;
• Any real-life object;
• Any upcoming authentication scheme
System Implementation
• For example, the user can enter the virtual environment and type
something on a computer that exists in (x1 , y1 , z1 ) position, then
enter a room that has a fingerprint recognition device that exists in a
position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user
can go to the virtual garage, open the car door, and turn on the radio to
a specific channel. The combination and the sequence of the previous
actions toward the specific objects construct the user’s 3D password
Example of 3D-Password
3D Password selection and Inputs
( Formal View )
 Let us consider a 3-D virtual environment space of size G x G x
G.
 The 3-D environment space is represented by the coordinates (x,
y, z) Є [1, . . . , G] x [1, . . . , G] x [1, . . . , G].
 The objects are distributed in the 3-D virtual environment with
unique (x, y, z) coordinates.
 We assume that the user can navigate into the 3-D virtual
environment and interact with the objects using any input device
such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus,
card reader, and microphone.
For Example :
Let us assume the user enters a virtual office then v
performs the following action:
(10,24,91) Action=Open office door
(10,24,91) Action=Close office door
(4,34,18) Action=Typing,”C”
(4,34,18) Action=Typing,”O”
(4,34,18)Action=Typing,”N”
(10,24,80)Action=Pick up the pen
(1,18,80)Action=Draw point=(330,130)
3D Password
Snapshot of a proof-of-concept 3-D virtual environment,
where the user is typing a textual password on a virtual
computer as a part of the user’s 3-D password.
Snapshot of the concept of 3d-Virtual Environment
Snapshot of a proof-of-concept virtual art gallery, which
contains 36 pictures and six computers
State diagram of a 3D Password application
3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES
• Real-life similarity
• Object uniqueness and distinction
• Three-dimensional virtual environment
• System importance
APPLICATIONS
• Critical servers.
• Nuclear and military facilities.
• Airplanes and jet fighters.
• ATM, desktop computers and laptops.
Attacks and Countermeasures
•Brute Force Attack.
•Well Studied Attack
•Shoulder Surfing Attacks
•Timing Attack
Advantages
Flexibility:3D Passwords allows Multifactor
authentication biometric , textual passwords can be
embedded in 3D password technology.
Strength: This scenario provides almost unlimited
passwords possibility.
Ease to Memorize: can be remembered in the form
of short story.
Respect of Privacy: Organizers can select
authentication schemes that respect users privacy.
Advantages
 Several authentication schemes
 Designed according to protected system
 Extremely strong
 Provides secrets
 3D environment can be changed
 Password can change easily.
 Difficult to crack
 Freedom to select
 Difficult to share
 3D graphical password has no limit
Disadvantages……
 Shoulder Surfing Attacks: Attacker uses camera to
record the users 3D passwords.This attack is more
succesful.
 Timing Attack: The Attacker observes how long it
takes the legitimate user to perform correct log in
using 3D Password.which gives an indication of 3-D
Passwords length.This attack cannot be succesful
since it gives the attacker mere hints.
Difficult for blind people to use this
technology.
Requires sophisticated computers technology
expensive.
A lot of program coding is required.
Disadvantages……
CONCLUSION
• Commonly used authentication schemes are vulnerable to
attacks.
• 3D password is a multi factor authentication scheme that
combines the various authentication schemes into a single
3D virtual environment.
• Design of 3D virtual environment, selection of objects inside
the environment, and the object type reflects the resulted
password space.
• User’s choice and decision to construct the desired and
preferred 3D password
Thank you

More Related Content

PPT
3D Password Presentation
PPT
3D-Password: A More Secure Authentication
PPTX
3D Password M Sc BHU Sem 1
PPTX
3d password 23 mar 14
PPTX
3d password ppt
PPTX
SRAVYA
PPTX
3D PASSWORD SEMINAR
PPTX
3D Password and its importance
3D Password Presentation
3D-Password: A More Secure Authentication
3D Password M Sc BHU Sem 1
3d password 23 mar 14
3d password ppt
SRAVYA
3D PASSWORD SEMINAR
3D Password and its importance

What's hot (20)

PPT
3D PASSWORD
PPT
3d password ppt
PDF
3D Password PPT
PPTX
3d password by suresh
PPT
3 d password
PPTX
3d passwords
PPTX
3D PASSWORD
PPT
3D Password
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3D Password
PPT
3 d password
PPT
3D PASSWORD
PPTX
3D password
PPTX
3 d password
PPTX
3d password
PPTX
3D-Password
PDF
3d password - Report
PPTX
3d password
PPT
graphical password authentication
PPTX
Seminar-Two Factor Authentication
3D PASSWORD
3d password ppt
3D Password PPT
3d password by suresh
3 d password
3d passwords
3D PASSWORD
3D Password
SEMINAR REPORT ON 3D PASSWORD
3D Password
3 d password
3D PASSWORD
3D password
3 d password
3d password
3D-Password
3d password - Report
3d password
graphical password authentication
Seminar-Two Factor Authentication
Ad

Similar to 3D Password (20)

DOC
Deepak 3 dpassword (2)
PPTX
3D Passwrd
PPTX
DOCX
3d pass words
PPT
Ppt on 3d password (2)
PPTX
DOCX
New era of authentication
PPT
3dpassword
PPTX
3dpswd 130320115940-phpapp01-converted
PPTX
3DPassword_AakashTakale
PPTX
3d password
DOCX
3dpassword.doc
PPTX
3d password ppt presentation innovative idea
PPTX
3D Password by Kuldeep Dhakad
PPT
3 dpswd
PPTX
3d authentication
PPT
3D Password ppt
Deepak 3 dpassword (2)
3D Passwrd
3d pass words
Ppt on 3d password (2)
New era of authentication
3dpassword
3dpswd 130320115940-phpapp01-converted
3DPassword_AakashTakale
3d password
3dpassword.doc
3d password ppt presentation innovative idea
3D Password by Kuldeep Dhakad
3 dpswd
3d authentication
3D Password ppt
Ad

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Welding lecture in detail for understanding
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Construction Project Organization Group 2.pptx
PPT
Project quality management in manufacturing
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
PPT on Performance Review to get promotions
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Welding lecture in detail for understanding
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CH1 Production IntroductoryConcepts.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Construction Project Organization Group 2.pptx
Project quality management in manufacturing
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Model Code of Practice - Construction Work - 21102022 .pdf
PPT on Performance Review to get promotions
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

3D Password

  • 1. 3-D PASSWORD A more secured authentication ANKIT NAGAR
  • 2. INTRODUCTION • Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. • 3D password is a multifactor authentication scheme. • To be authenticated, we require a 3D virtual environment.
  • 3. •Combines recognition, recall, token, and biometrics based systems. •Users choice to select the type of authentication technique.
  • 4. Authentication • Authentication is a process of validating who are you to whom you claimed to be.
  • 5. Common Authentication Techniques used in computer world 1. Textual Passwords(Recall Based)-:Recall what you have created before. 2. Graphical Passwords: (Recall Based + Recognition Based). 3. Token Based : ATM Cards, Keys , ID Cards 4. Biometric Passwords : fingerprints, palm prints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition
  • 6. Human Authentication Techniques Knowledge Base ( What you know ) Token Based ( What you have ) Biometrics ( What you are) Textual Password Graphical Password ATM Card Keys ID Cards Fingerprints,Palmprint Hand Geometry Face,iris,voice,retina
  • 7. Drawbacks of Common Authentication Techniques & Existing system Textual Password: • Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. • Full password space for 8 characters consisting of both numbers and characters is at most 2 X 10¹⁴. • From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary. Graphical Password : • Graphical passwords can be easily recorded but some schemes take a long time to perform.
  • 8. Token Password: • Most unsecured one, if stolen can breech through any security levels. Smart cards or tokens can be stolen. Biometric Password: • One main drawback of applying biometric is its intrusiveness upon a user’s personal characteristic and the effect on their privacy.
  • 9. • Retina biometrical recognition schemes require the user to willingly subject their eyes to a low- intensity infrared light so specified environment is required. • In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users.
  • 10. PROPOSED SYSTEM • The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. • Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.
  • 11. • This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
  • 12. 3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL + TOKENS + BIOMETRIC In one authentication system  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects .  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment.
  • 13. FUNCTIONALITIES REQUIRED • New scheme should combine the existing authentication schemes • Freedom to select the type of authentication technique. • Should provide secrets that are easy to remember, difficult to guess.
  • 14. 3D PASSWORD SELECTION AND INPUT • 3D environment space represented by the co-ordinates • User navigate into the 3D virtual environment using any input device. • The sequence of actions and interactions forms the users 3D password.
  • 15. 3D Password selection and Inputs Virtual objects can be any object we encounter in real life: • A computer with which the user can type; • A fingerprint reader that requires the user’s fingerprint; • A biometrical recognition device; • A paper or a white board that a user can write, sign, or Draw on; • An automated teller machine (ATM) that requests a token; • A light that can be switched on/off; • A television or radio where channels can be selected; • A staple that can be punched; • A car that can be driven; • A book that can be moved from one place to another; • Any graphical password scheme; • Any real-life object; • Any upcoming authentication scheme
  • 16. System Implementation • For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password
  • 18. 3D Password selection and Inputs ( Formal View )  Let us consider a 3-D virtual environment space of size G x G x G.  The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . , G] x [1, . . . , G] x [1, . . . , G].  The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates.  We assume that the user can navigate into the 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone.
  • 19. For Example : Let us assume the user enters a virtual office then v performs the following action: (10,24,91) Action=Open office door (10,24,91) Action=Close office door (4,34,18) Action=Typing,”C” (4,34,18) Action=Typing,”O” (4,34,18)Action=Typing,”N” (10,24,80)Action=Pick up the pen (1,18,80)Action=Draw point=(330,130)
  • 21. Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the user’s 3-D password. Snapshot of the concept of 3d-Virtual Environment
  • 22. Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers
  • 23. State diagram of a 3D Password application
  • 24. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES • Real-life similarity • Object uniqueness and distinction • Three-dimensional virtual environment • System importance
  • 25. APPLICATIONS • Critical servers. • Nuclear and military facilities. • Airplanes and jet fighters. • ATM, desktop computers and laptops.
  • 26. Attacks and Countermeasures •Brute Force Attack. •Well Studied Attack •Shoulder Surfing Attacks •Timing Attack
  • 27. Advantages Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology. Strength: This scenario provides almost unlimited passwords possibility. Ease to Memorize: can be remembered in the form of short story. Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 28. Advantages  Several authentication schemes  Designed according to protected system  Extremely strong  Provides secrets  3D environment can be changed  Password can change easily.  Difficult to crack  Freedom to select  Difficult to share  3D graphical password has no limit
  • 29. Disadvantages……  Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesful.  Timing Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D Password.which gives an indication of 3-D Passwords length.This attack cannot be succesful since it gives the attacker mere hints.
  • 30. Difficult for blind people to use this technology. Requires sophisticated computers technology expensive. A lot of program coding is required. Disadvantages……
  • 31. CONCLUSION • Commonly used authentication schemes are vulnerable to attacks. • 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. • Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. • User’s choice and decision to construct the desired and preferred 3D password