SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
By:
Jaya Sinha (115415)
Oindrila Gupta (115416)
CONTENTS
 Introduction
 Three Factors of Authentication
 Existing Authentication Techniques
 Drawbacks of Existing Authentication Schemes
 3D Password Scheme
 3D Password Selection
 Designing of a 3D Virtual Environment
 Advantages of 3D Passwords
 Applications of 3D Passwords
 Attacks and Counter­Measures
 Conclusion
INTRODUCTION
Authentication  is  any  protocol  or 
process  that  permits  one  entity  to 
establish  the  identity  of  another 
entity.
➢

In  other  words,  authentication  is 
the  process  of  determining  whether 
someone or something is, in fact, who 
or what it is declared to be.
✔
Three Factors of Authentication
 1. Knowledge Based: Something you     
      know like PASSWORD, PIN

 2. Token Based: Something you possess  
      like KEYS, PASSPORT, SMART 
CARD

 3. Biometrics: Something you are like       
      FINGERPRINT, FACE, IRIS
Existing Authentication Techniques

➔

Textual Password: Recall 

Based
➔

Graphical Password: 

Recall Based + Recognition 
Based (Biometrics)
Drawbacks of Existing
Authentication Schemes
Drawbacks of Textual Passwords
Textual Passwords should be easy to 
remember, but at the same time, difficult to 
guess
●

Full password space for 8 characters, 
consisting of both numbers and characters, 
is 2*(10^14)
●

A research showed that 25% of the 
passwords out of 15,000 users could be 
guessed correctly using brute force 
dictionary
●
Drawbacks of Graphical Passwords
Graphical Passwords can be easily recorded as 
these schemes take a long time
●

The main drawback of using biometric is its 
intrusiveness upon a user's personal 
characteristics which are liable to change under 
certain situations. For example, a bruised finger 
will lead to an inconsistency in fingerprint 
pattern
●

They require special scanning device to 
authenticate the user which is not acceptable 
for remote and internet users
●
3D PASSWORD to the rescue...
3D PASSWORD SCHEME
The 3D Password scheme is a new     
  authentication scheme that 
combines
  RECOGNITION
         + RECALL
                 + TOKENS
                         + BIOMETRIC
in one authentication system
➢
The 3D password presents a virtual 
environment containing various virtual 
objects
➢

The user walks through the 
environment and interacts with 
the objects
➢

The 3D Password is simply the 
combination and sequence of 
user interactions that occur in the 
3D environment
➢
The 3D password can combine the existing authentication 
schemes such as textual passwords, graphical passwords, 
and various types of biometrics into a 3D virtual 
environment. The design of the 3D virtual environment 
and the type of objects selected determine the 3D 
password key space.
➢
3D PASSWORD SELECTION
Virtual objects can be any object       
that we encounter in real life:
a computer on which the user can type

✔

a fingerprint reader that requires the   
 user’s fingerprint
✔

a biometrical recognition device

✔

a paper or white board that a user can 
 write, sign, or draw on
✔

an automated teller machine (ATM)     
 that requires a token
✔
✔

a light that can be switched on/off

a television or radio where channels    
 can be selected
✔

✔

a stapler that can be punched

✔

a car that can be driven

a book that can be moved from one      
  place to another
✔

✔

any graphical password scheme

✔

any real­life object

✔

any upcoming authentication scheme
3D VIRTUAL ENVIRONMENT
Designing of a 3D Virtual Environment
Designing a well­studied 3­D virtual 
environment affects the usability, effectiveness, 
and acceptability of a 3­D password system. 
Therefore, the first step in building a 3­D 
password system is to design a 3­D environment 
that reflects the administration needs and the 
security requirements. The design of 3­D virtual 
environments should follow the following 
guidelines:
●

Real­life similarity: The prospective 3­D 

virtual environment should reflect what 
people are used to seeing in real life.
●

Object uniqueness and distinction: The 

design of the 3­D virtual environment 
should consider that every object should be 
distinguishable from other objects.

Three­dimensional virtual 
environment size: The size of a 3­D 
●

environment should be carefully studied as 
it can depict a space as focused as a single 
room (or office) or as vast as a city (or even 
the world).
Number of objects (items) and their 
types: Part of designing a 3­D virtual 
●

environment is determining the types of 
objects and how many objects should be 
placed in the environment. The types of 
objects reflect what kind of responses the 
object will have.
●

System importance: The 3­D virtual 

environment should consider what systems 
will be protected by a 3­D password.
ADVANTAGES OF 3D PASSWORDS
✔

Flexibility: 3D Passwords allow 

Multifactor Authentication
✔

Strength: This scenario provides 

almost unlimited possibilities of 
passwords
✔

Easy to memorize: Can be 

remembered in the form of a short story
✔

Respect of Privacy: Organizers can 

select authentication schemes that 
respect the privacy of the users
APPLICATIONS OF 3D 
PASSWORDS
Critical servers: Many large 

➢

organizations have critical servers that 
require very high security but are usually 
protected by a textual password. A 3­D 
password authentication proposes a 
sound replacement for a textual 
password. Moreover, entrances to such 
locations are usually protected by access 
cards and sometimes PIN numbers. 
Therefore, a 3­D password can be used to 
protect the entrance to such locations as well 
as protect the usage of such servers.
Airplanes and jetfighters: Because of 

➢

the possible threat of misusing airplanes 
and jetfighters for religious/political 
agendas, usage of such airplanes should be 
protected by a powerful authentication 
system.

Nuclear and military facilities: Such 

➢

facilities should be protected by the most 
powerful authentication systems. The 3­D 
password has a very large probable 
password space, and since it can contain 
token, biometrics, recognition, and 
knowledge based authentications in a 
single authentication system, it is a sound 
choice for high level security locations.
A small 3­D virtual 
environment can be used in 
many systems, including the 
following:
1) ATMs
2) personal digital assistants
3) desktop computers and       
         laptop logins
4) web authentication
ATTACKS AND COUNTER­MEASURES
Brute Force Attack: This attack is 

➢

very difficult because:
   1. It is very time consuming
   2. Attack is highly expensive

Well Studied Attack: This attack is 

➢

difficult because the attacker has to 
perform customized attack for different 
virtual environments.

Shoulder Surfing Attack: This 

➢

attack is comparatively more successful 
because the attacker uses camera to 
record the 3D Passwords of the users.
CONCLUSION
3D Password improves 
authentication.
✔

It is difficult to crack as there are 
no fixed number of steps or 
particular procedure.
✔

Added with biometrics and 
token verification, this schema 
becomes almost unbreakable.
✔
BIBLIOGRAPHY

http://en.wikipedia.org/wiki/3­D_Secure
http://www.slideshare.net
http://www.giac.org/cissp­papers/2.pdf
http://share.pdfonline.com/01906f50bd334cc688daf1
0648bb5d68/3d seminar report.htm
3D Password Scheme: A New Authentication Technique

Más contenido relacionado

La actualidad más candente (20)

3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password
3d password3d password
3d password
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D password
3D password3D password
3D password
 
3 d password
3 d password 3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 

Destacado

3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakadkuldeepdhakad
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant1996kuldeep
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...Marios Pitikakis
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer scienceRamya SK
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiationAyushi Gupta
 
Virtual stores the future of retail
Virtual stores the future of retailVirtual stores the future of retail
Virtual stores the future of retailBharat Bharadwaj
 
Blue brain by MAYANK SAHU
Blue brain by MAYANK SAHUBlue brain by MAYANK SAHU
Blue brain by MAYANK SAHUmayank843
 

Destacado (20)

3d password
3d password3d password
3d password
 
Competitive programming
Competitive  programmingCompetitive  programming
Competitive programming
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer science
 
3D printing
3D printing 3D printing
3D printing
 
Iptv
IptvIptv
Iptv
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiation
 
Virtual stores the future of retail
Virtual stores the future of retailVirtual stores the future of retail
Virtual stores the future of retail
 
3D Password
3D Password3D Password
3D Password
 
Blue brain by MAYANK SAHU
Blue brain by MAYANK SAHUBlue brain by MAYANK SAHU
Blue brain by MAYANK SAHU
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 

Similar a 3D Password Scheme: A New Authentication Technique

Similar a 3D Password Scheme: A New Authentication Technique (20)

NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3 d
3 d3 d
3 d
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3 d password
3 d password3 d password
3 d password
 
C0361419
C0361419C0361419
C0361419
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
3D password
3D password 3D password
3D password
 
3d password
3d  password3d  password
3d password
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 

Último

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Último (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

3D Password Scheme: A New Authentication Technique