SlideShare a Scribd company logo
8
Most read
9
Most read
17
Most read
3-D Password SchemeFor more secure authentication
 AuthenticationAuthentication is a process of validating who are you to whom you claimed to beHuman authentication techniques are as follows:Knowledge Base (What you know)Token Based(what you have)Biometrics(what you are)Recognition Based(What you recognise)
       Common Authentication        Techniques used in computer        worldTextual Passwords(Recall Based)-:Recall what you have created before.Graphical Passwords:     (Recall Based+Recognition Based)Biometric schemes (fingerprints,voice recognition etc)
               DrawbacksTextual Password:Textual Passwords should be easy to remember at the same time hard to guessFull password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
               DrawbacksGraphical PasswordGraphical passwords can be easily recorded as these schemes take a long time.One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
3D PASSWORD SCHEMEThe 3D Password scheme is a new authentication scheme that combine RECOGNITION                   + RECALL                                  +TOKENS                                           +BIOMETRICIn one authentication system
The 3D password presents a virtual environment containing various virtual objects.The user walks through the environment and interacts with the objects  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
3D Password selectionVirtual objects can be any object we encounter in real life:A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password schemeFor EXAMPLE:   Let us assume the user enters a virtual office then performs the following action:(10,24,91) Action=Open office door
(10,24,91) Action=Close office door
(4,34,18) Action=Tpeine,”C”

More Related Content

PPT
3D-Password: A More Secure Authentication
PPTX
3d password 23 mar 14
PPTX
3d password by suresh
PPTX
3d password ppt
PPT
3d password ppt
PPT
3D Password Presentation
PPT
3D PASSWORD
PPT
3D Password
3D-Password: A More Secure Authentication
3d password 23 mar 14
3d password by suresh
3d password ppt
3d password ppt
3D Password Presentation
3D PASSWORD
3D Password

What's hot (20)

PPT
3 d password
PPTX
3D Password
PPTX
SRAVYA
PDF
SEMINAR REPORT ON 3D PASSWORD
PDF
3D Password PPT
PPT
3 d password
PPTX
3D Password and its importance
PPTX
3D Password M Sc BHU Sem 1
PPT
3D PASSWORD
PDF
3d password - Report
PPTX
3d password
PPTX
3D Password
PPTX
3 d password
PPTX
3D PASSWORD SEMINAR
PPTX
3D PASSWORD
PPTX
3D Password
PPT
3D PASSWORD
PPTX
3D-Password
PPTX
3D password
PPT
graphical password authentication
3 d password
3D Password
SRAVYA
SEMINAR REPORT ON 3D PASSWORD
3D Password PPT
3 d password
3D Password and its importance
3D Password M Sc BHU Sem 1
3D PASSWORD
3d password - Report
3d password
3D Password
3 d password
3D PASSWORD SEMINAR
3D PASSWORD
3D Password
3D PASSWORD
3D-Password
3D password
graphical password authentication
Ad

Viewers also liked (15)

PPT
Ppt on 3d password (2)
PPTX
Green cloud computing
PPTX
Green cloud computing
PDF
Green Cloud Computing
PPTX
Phishing
PPT
Інформаційна безпека
PDF
PIV Card based Identity Assurance in Sun Ray and IDM environment
PPTX
3D Password
PPTX
Competitive programming
PPTX
History Of Macintosh
PPTX
Algorithm paradigms
DOCX
3d pass words
PDF
3-D Secure Acquirer and Merchant Implementation Guide
PPT
3D secure password
PPTX
Intro to Smart Cards & Multi-Factor Authentication
Ppt on 3d password (2)
Green cloud computing
Green cloud computing
Green Cloud Computing
Phishing
Інформаційна безпека
PIV Card based Identity Assurance in Sun Ray and IDM environment
3D Password
Competitive programming
History Of Macintosh
Algorithm paradigms
3d pass words
3-D Secure Acquirer and Merchant Implementation Guide
3D secure password
Intro to Smart Cards & Multi-Factor Authentication
Ad

Similar to 3d passwords (20)

PPTX
3D PASSWORD
PPTX
PPTX
3dpassword by janapriya
PPTX
3D Passwrd
PPTX
3D Password by Kuldeep Dhakad
PPTX
3d pswdbysuresh-120112091037-phpapp02
PPTX
3dpassword11.pptx.......................
DOCX
New era of authentication
PPT
3dpassword
PPT
3D password
PPTX
3d authentication system
PPTX
3d authentication
DOCX
3dpassword.doc
PPTX
3D - password
PPTX
3 d password
PPT
3D Password ppt
PPTX
3d password ppt presentation innovative idea
3D PASSWORD
3dpassword by janapriya
3D Passwrd
3D Password by Kuldeep Dhakad
3d pswdbysuresh-120112091037-phpapp02
3dpassword11.pptx.......................
New era of authentication
3dpassword
3D password
3d authentication system
3d authentication
3dpassword.doc
3D - password
3 d password
3D Password ppt
3d password ppt presentation innovative idea

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
CIFDAQ's Market Insight: SEC Turns Pro Crypto

3d passwords

  • 1. 3-D Password SchemeFor more secure authentication
  • 2. AuthenticationAuthentication is a process of validating who are you to whom you claimed to beHuman authentication techniques are as follows:Knowledge Base (What you know)Token Based(what you have)Biometrics(what you are)Recognition Based(What you recognise)
  • 3. Common Authentication Techniques used in computer worldTextual Passwords(Recall Based)-:Recall what you have created before.Graphical Passwords: (Recall Based+Recognition Based)Biometric schemes (fingerprints,voice recognition etc)
  • 4. DrawbacksTextual Password:Textual Passwords should be easy to remember at the same time hard to guessFull password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
  • 5. DrawbacksGraphical PasswordGraphical passwords can be easily recorded as these schemes take a long time.One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 6. 3D PASSWORD SCHEMEThe 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRICIn one authentication system
  • 7. The 3D password presents a virtual environment containing various virtual objects.The user walks through the environment and interacts with the objects The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 8. 3D Password selectionVirtual objects can be any object we encounter in real life:A computer on which the user can type
  • 9. A fingerprint reader that requires users fingerprint
  • 10. A paper or white board on which user can type
  • 11. A Automated teller(ATM) machine that requires a token
  • 12. A light that can be switched on/off
  • 14. A car that can be driven
  • 15. A graphical password schemeFor EXAMPLE: Let us assume the user enters a virtual office then performs the following action:(10,24,91) Action=Open office door
  • 24. 3D Passwords DifferentiatorsFlexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.
  • 25. Strength: This scenario provides almost unlimited passwords possibility.
  • 26. Ease to Memorize: can be remembered in the form of short story.
  • 27. Respect of Privacy: Organizers can select authentication schemes that respect users privacy.3D Password Application AreasCritical ServersNuclear and military FacilitiesAirplanes and JetFightersATMs,Desktop and Laptop Logins, Web Authentication
  • 28. Attacks and CountermeasuresBrute Force Attack: The attack is very difficult becauseTime required to login may vary form 20s to 2 min therefore it is very time consuming.Cost of Attack: A 3D Virtual environment may contain biometric object ,the attacker has to forge all biometric information.Well Studied Attack: Attacker tries to get the most probable distribution of 3D Password. This is difficult because attacker has to perform customized attack fo different virtual environment .
  • 29. Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesfulTiming Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D Password.which gives an indication of 3-D Passwords length.This attack cannot be succesful since it gives the attacker mere hints.
  • 30. QUERIES ??...