SlideShare una empresa de Scribd logo
1 de 18
3D-password
                            A more secured authentication


G.Suresh babu
Roll no:08H71A05C2
Computer science & engineering
Mic college of technology
Guide:Mrs A.Jaya Lakshmi
Contents
• What is Authentication
• Existing system
• Drawbacks in existing system
• Proposed system
• Advantages with proposed system
• Applications
• Attacks
• Conclusion
Authentication


 Authentication is a process of validating who are
 you to whom you claimed to be.

• Human authentication techniques are as follows:

     1.Knowledge Base (What you know)
     2.Token Based(what you have)

     3.Biometrics(what you are)
Three Basic Identification Methods of password


Possession
(“something I have”)

                          Knowledge
•Keys
•Passport                 (“something I know”)
•Smart Card

                            •Password
                            •PIN

Biometrics
(“something I am”)

•Face
•Fingerprint
•Iris
Drawbacks
Textual Password:
  –   Textual Passwords should be easy to remember at the same time hard
      to guess
  –   Full password space for 8 characters consisting of both numbers and
      characters is 2 X 10¹⁴
  –   From an research 25% of the passwords out of 15,000 users can be
      guessed correctly by using brute force dictionary
Graphical Password

         One main drawback of applying biometric is its intrusiveness upon
          a users personnel characteristics.

         They require special scanning device to authenticate the user
          which is not acceptable for remote and internet users.
3d password
The 3D Password is a multifactor authentication scheme that combine
 RECOGNITION
            + RECALL
                     +TOKENS
                           +BIOMETRIC
                                     In one authentication system
 The 3D password presents a virtual environment containing various
virtual objects.

 The user walks through the environment and interacts with the
objects

 The 3d Password is simply the combination and sequence of user
interactions that occur in the 3D environment
3D environment




Snapshot of a virtual environment , which contains 36
pictures and six computers as virtual objects
Virtual objects

• Virtual objects can be any object we encounter in real life:
             A computer on which the user can type
             A fingerprint reader that requires users fingerprint
             A paper or white board on which user can type
             A Automated teller(ATM) machine that requires a token
             A light that can be switched on/off
             A television or radio
             A car that can be driven
             A graphical password scheme
System implementation


• The action towards an object that exists in location (x1,y1,z1)
   is different from action towards an another object at (x2,y2,z2).


• Therefore ,to perform the legitimate 3d password the user must
  follow the same scenario performed by the legitimate user.


• This means interacting with the same objects that reside at exact
  location and perform the exact actions in the proper sequence
example

 Let us consider a 3D virtual environment space of size G ×G × G.
The 3D environment space is represented by the coordinates (x, y, z) ∈
[1, . . . , G] ×[1, . . . , G] ×[1, . . . , G].

The objects are distributed in the 3D virtual environment with unique (x,
y, z) coordinates. We assume that the user can navigate into the 3D
virtual environment and interact with the objects using any input device
such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card
reader, and microphone.
 For example, consider a user who navigates through the 3D virtual
environment that consists of an office and a meeting room. Let us assume that
the user is in the virtual office and the user turns around to the door located in
(10, 24, 91) and opens it. Then, the user closes the door. The user then finds a
computer to the left, which exists in the position (4, 34, 18), and the user types
“CAT.” The initial representation of user actions in the 3Dvirtual environment
can be recorded as follows::


  *(10, 24, 91) Action = Open the office door;
  *(10, 24, 91) Action = Close the office door;
  *(4, 34, 18) Action = Typing, “C”;
  *(4, 34, 18) Action = Typing, “A”;
  *(4, 34, 18) Action = Typing, “T”;
Advantages


 Flexibility: 3D Passwords allows Multifactor
  authentication biometric , textual passwords can be
  embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
  passwords possibility.
 Ease to Memorize: can be remembered in the form
  of short story.
 Respect of Privacy: Organizers can select
  authentication schemes that respect users privacy.
Applications
    The 3D password can have a password space that is very large
compared to other authentication schemes, so the 3D password’s main
application domains are protecting critical systems and resources.



  Critical Servers:


  Nuclear Reactors & military Facilities:


 Airplanes and missile Guiding:
Applications

In addition,3D password can also be used in less critical systems

A small virtual environment can be used in the following systems like

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc..,
Attacks and counter measures



   Brute Force Attack


   Well studied Attack


   Shoulder--surfing Attack
Conclusion


The authentication can be improved with 3d password ,because the
un- authorized person may not interact with same object at a particular
location as the legitimate user.


It is difficult to crack ,because it has no fixed no of steps and a
particular procedure



Added with biometrics and token verification this schema becomes
almost unbreakable
3d password by suresh
3d password by suresh

Más contenido relacionado

La actualidad más candente (20)

3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3 d password
3 d password3 d password
3 d password
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Destacado

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation pptParth Godhani
 
presentation on 3D Technology
presentation on 3D Technologypresentation on 3D Technology
presentation on 3D TechnologyMatti Ur Rehman
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW Neha Tyagi
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 

Destacado (16)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3d internet
3d internet3d internet
3d internet
 
Rain technology
Rain technologyRain technology
Rain technology
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
presentation on 3D Technology
presentation on 3D Technologypresentation on 3D Technology
presentation on 3D Technology
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 

Similar a 3d password by suresh (20)

3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d pass words
3d pass words3d pass words
3d pass words
 
Vivek
VivekVivek
Vivek
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d authentication
3d authentication3d authentication
3d authentication
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
C0361419
C0361419C0361419
C0361419
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 

Último

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

3d password by suresh

  • 1. 3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi
  • 2. Contents • What is Authentication • Existing system • Drawbacks in existing system • Proposed system • Advantages with proposed system • Applications • Attacks • Conclusion
  • 3. Authentication Authentication is a process of validating who are you to whom you claimed to be. • Human authentication techniques are as follows: 1.Knowledge Base (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 4. Three Basic Identification Methods of password Possession (“something I have”) Knowledge •Keys •Passport (“something I know”) •Smart Card •Password •PIN Biometrics (“something I am”) •Face •Fingerprint •Iris
  • 5. Drawbacks Textual Password: – Textual Passwords should be easy to remember at the same time hard to guess – Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ – From an research 25% of the passwords out of 15,000 users can be guessed correctly by using brute force dictionary Graphical Password  One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.  They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 6. 3d password The 3D Password is a multifactor authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 7. 3D environment Snapshot of a virtual environment , which contains 36 pictures and six computers as virtual objects
  • 8. Virtual objects • Virtual objects can be any object we encounter in real life:  A computer on which the user can type  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  A Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  • 9. System implementation • The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2). • Therefore ,to perform the legitimate 3d password the user must follow the same scenario performed by the legitimate user. • This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence
  • 10. example  Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone.
  • 11.  For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “CAT.” The initial representation of user actions in the 3Dvirtual environment can be recorded as follows:: *(10, 24, 91) Action = Open the office door; *(10, 24, 91) Action = Close the office door; *(4, 34, 18) Action = Typing, “C”; *(4, 34, 18) Action = Typing, “A”; *(4, 34, 18) Action = Typing, “T”;
  • 12. Advantages  Flexibility: 3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 13. Applications The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources.  Critical Servers:  Nuclear Reactors & military Facilities: Airplanes and missile Guiding:
  • 14. Applications In addition,3D password can also be used in less critical systems A small virtual environment can be used in the following systems like Atm Personal digital assistance Desktop computers & laptops Web authentication etc..,
  • 15. Attacks and counter measures  Brute Force Attack  Well studied Attack  Shoulder--surfing Attack
  • 16. Conclusion The authentication can be improved with 3d password ,because the un- authorized person may not interact with same object at a particular location as the legitimate user. It is difficult to crack ,because it has no fixed no of steps and a particular procedure Added with biometrics and token verification this schema becomes almost unbreakable