SlideShare a Scribd company logo
3D-Password
ABSTRACT
 Normally the authentication scheme the user undergoes is
particularly very lenient or very strict. Throughout the years
authentication has been a very interesting approach.
 With all the means of technology developing, it can be very easy for
'others' to fabricate or to steal identity or to hack someone’s
password.
 So from here the concept of 3
EXISTING SYSTEM
 Current authentication systems suffer from many weaknesses.
Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or brute
force attacks.
 Many available graphical passwords have a password space that
is less than or equal to the textual password space. Smart cards
or tokens can be stolen. Many biometric authentications have
been proposed.
 However, users tend to resist using biometrics because of their
intrusiveness and the effect on their privacy. Moreover,
biometrics cannot be revoked. The 3Dpassword is a multi factor
authentication scheme.
PROPOSED SYSTEM
 The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes.
 Users have the freedom to select whether the 3D password will be
solely recall, biometrics, recognition, or token based, or a
combination of two schemes or more.
 This freedom of selection is necessary because users are different
and they have different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
BRIEF DESCRIPTION
OF SYSTEM
 The 3D password is a multi factor authentication scheme. The 3D
password presents a 3D virtual environment containing various virtual
objects.
 The user navigates through this environment and interacts with the
objects. The 3D password is simply the combination and the sequence of
user interactions that occur in the 3D virtual environment.
 The 3D password can combine recognition, recall, token, and biometrics
based systems into one authentication scheme. This can be done by
designing a 3D virtual environment that contains objects that request
information to be recalled, information to be recognized, tokens to be
presented, and biometric data to be verified.
3D PASSWORD
AUTHENTICATION
3D PASSWORD
APPLICATION
 Critical server many large organizations have critical servers that are
usually protected by a textual password. A 3D password authentication
proposes a sound replacement for a textual password.
 Nuclear and military facilities such facilities should be protected by the
most
 Powerful authentication systems. The 3D password has a very large
probable password space, and since it can contain token, biometrics,
recognition and knowledge based
 Authentications in a single authentication system, it is a sound choice for
high level security locations.
ADVANTAGES
 Flexibility:3D Passwords allows Multifactor authentication biometric ,
textual passwords can be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited passwords possibility.
 Ease to Memorize: can be remembered in the form of short story.
 Respect of Privacy: Organizers can select authentication schemes that
respect users privacy.
DISADVANTAGES……
 Shoulder Surfing Attacks: Attacker uses camera to record the users
3D passwords.This attack is more succesful.
 Timing Attack: The Attacker observes how long it takes the
legitimate user to perform correct log in using 3D Password.which
gives an indication of 3-D Passwords length.This attack cannot be
succesful since it gives the attacker mere hints.
CONCLUSION
 The 3D password is a multi factor authentication scheme that combines
the various authentication schemes into a single 3D virtual environment.
The virtual environment can contain any existing authentication scheme
or even any upcoming authentication scheme or even any upcoming
authentication schemes by adding it as a response to actions performed
on an object.
 Therefore the resulting password space becomes very large compared to
any existing authentication schemes. The design of the 3D virtual
environment the selection of objects inside the environment and the
object's type reflect the resulted password space. It is the task of the
system administrator to design the environment and to select the
appropriate object that reflects the protected system requirements.
Thanks…!!!!

More Related Content

PPT
3 d password
PDF
3d password - Report
PPT
3D-Password: A More Secure Authentication
PPTX
3d password ppt
PPTX
3D PASSWORD SEMINAR
PPT
3D PASSWORD
PPTX
3d password 23 mar 14
PPT
3D Password Presentation
3 d password
3d password - Report
3D-Password: A More Secure Authentication
3d password ppt
3D PASSWORD SEMINAR
3D PASSWORD
3d password 23 mar 14
3D Password Presentation

What's hot (20)

PPTX
3D Password M Sc BHU Sem 1
PPTX
3D Password
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
3D PASSWORD
PPTX
SRAVYA
PPTX
Graphical password authentication
PPTX
3 d password
PPTX
3d passwords
PPTX
3D Password
PPTX
3d password
PPTX
3D Password and its importance
PPT
3d password ppt
PPT
3D Password
PPTX
3D Password
PDF
Iris scanning
PPT
graphical password authentication
PPTX
Digital watermarking
PPT
Biometric encryption
PDF
3D Password PPT
PPTX
Authentication scheme for session password using Images and color
3D Password M Sc BHU Sem 1
3D Password
SEMINAR REPORT ON 3D PASSWORD
3D PASSWORD
SRAVYA
Graphical password authentication
3 d password
3d passwords
3D Password
3d password
3D Password and its importance
3d password ppt
3D Password
3D Password
Iris scanning
graphical password authentication
Digital watermarking
Biometric encryption
3D Password PPT
Authentication scheme for session password using Images and color
Ad

Viewers also liked (11)

PPTX
3D- Doctor
PPT
т.г. шевченко
PDF
Hololens-pechakucha
PDF
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
PPT
هدف إدارة السلامة والصحة المهنية
PPTX
Iskira starFlash
DOC
Thiết kế hệ thống treo cho xe tải 4 tấn
PPTX
Присоединение Астраханского ханства к Российскому государству. 9-й класс
PDF
Percussion syllabus 2017 2019
DOC
Aparato digestivo2
PPT
Power tool-safety
3D- Doctor
т.г. шевченко
Hololens-pechakucha
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
هدف إدارة السلامة والصحة المهنية
Iskira starFlash
Thiết kế hệ thống treo cho xe tải 4 tấn
Присоединение Астраханского ханства к Российскому государству. 9-й класс
Percussion syllabus 2017 2019
Aparato digestivo2
Power tool-safety
Ad

Similar to 3D-Password (20)

PPTX
3D PASSWORD
PDF
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
PPTX
3d password
PPTX
3d password ppt presentation innovative idea
PPTX
PPTX
3d authentication system
PPTX
3d authentication
PPTX
3d password
PDF
C0361419
PPTX
3D PASSWORD
PPT
3D password
PPTX
3 d password
DOCX
New era of authentication
DOC
Deepak 3 dpassword (2)
PPT
3D Password ppt
PDF
Effectiveness of various user authentication techniques
DOCX
3d pass words
3D PASSWORD
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
3d password
3d password ppt presentation innovative idea
3d authentication system
3d authentication
3d password
C0361419
3D PASSWORD
3D password
3 d password
New era of authentication
Deepak 3 dpassword (2)
3D Password ppt
Effectiveness of various user authentication techniques
3d pass words

More from Devyani Vaidya (20)

PPT
PPT
Fundamental file structure concepts & managing files of records
PPT
Cosequential processing and the sorting of large files
PPT
Introduction to the design and specification of file structures
PPTX
Mobile Phone Cloning
PPTX
Data warehousing
PPTX
secued cloud
PPTX
Cloud Cmputing Security
PPTX
Cloud Security
PPTX
Wireless network
PPT
Environmental law
PPTX
Wireless mobile charging using microwaves
PPTX
Secure Cloud Issues
PPTX
Energy Harvesing Through Reverse Electrowetting
PPT
Wireless Charging Of Mobile
PPTX
Applet programming
PPTX
Seminar on telephone directory
PPTX
History of Laptop
PPTX
Ppt on open and close door using Applet
PPTX
Resource management
Fundamental file structure concepts & managing files of records
Cosequential processing and the sorting of large files
Introduction to the design and specification of file structures
Mobile Phone Cloning
Data warehousing
secued cloud
Cloud Cmputing Security
Cloud Security
Wireless network
Environmental law
Wireless mobile charging using microwaves
Secure Cloud Issues
Energy Harvesing Through Reverse Electrowetting
Wireless Charging Of Mobile
Applet programming
Seminar on telephone directory
History of Laptop
Ppt on open and close door using Applet
Resource management

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
TR - Agricultural Crops Production NC III.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
PPH.pptx obstetrics and gynecology in nursing
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Insiders guide to clinical Medicine.pdf
Pharma ospi slides which help in ospi learning
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Week 4 Term 3 Study Techniques revisited.pptx
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
TR - Agricultural Crops Production NC III.pdf

3D-Password

  • 2. ABSTRACT  Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach.  With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password.  So from here the concept of 3
  • 3. EXISTING SYSTEM  Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.  Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed.  However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme.
  • 4. PROPOSED SYSTEM  The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.  This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
  • 5. BRIEF DESCRIPTION OF SYSTEM  The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects.  The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment.  The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
  • 7. 3D PASSWORD APPLICATION  Critical server many large organizations have critical servers that are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password.  Nuclear and military facilities such facilities should be protected by the most  Powerful authentication systems. The 3D password has a very large probable password space, and since it can contain token, biometrics, recognition and knowledge based  Authentications in a single authentication system, it is a sound choice for high level security locations.
  • 8. ADVANTAGES  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 9. DISADVANTAGES……  Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesful.  Timing Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D Password.which gives an indication of 3-D Passwords length.This attack cannot be succesful since it gives the attacker mere hints.
  • 10. CONCLUSION  The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.  Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements.