1. BY
DEVI GOMATHI. A
&
ABINAYA. S
PRE-FINAL YEAR
DEPT. OF COMPUTER SCIENCE
&
ENGINEERING
KARPAGAM COLLEGE OF
ENGINEERING
2. Authentication
Authentication is a process of validating who you are to whom you
claimed to be.
General authentication techniques are as follows:
1.Knowledge Based (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
3. Three Basic Identification
Methods of password
Possession
(“something I
have”)
•Keys
•Passport
•Smart Card
Knowledge
(“Something I
know”)
•Password
• Pin
Biometrics
(“something I
am”)
•Face
•Fingerprints
•Iris
4. • Passwordis basically an encryption
algorithms.
It is 8-15 character or slightly more than that.
Mostly textual passwords nowadays are kept which are very simple, some taken from
dictionary, pet’s name or their favorite actor actress etc..
PASSWORD
5. Passphrase
It’s the enhance version of password.
It is a combination of words or simply collection of password
in proper sequence.
It contains any well known thought also.
Length of passphrase is about 30-50 character or more than
that also.
7. Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
8. Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Ten years back Klein performed
such tests and he could crack 10-
15 passwords per day.
Guessable!
PASSWORD
DRAWBACKS
9. PASSPHRASE
•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
10. BIOMETRICS
Suppose you select your
fingerprint as a
biometrics..but what to do
when you have crack or
wound in your finger.
And now a days some
hackers even implement exact
copy of your biometrics
also….
Intrusiveness to privacy
Biometrics cannot be
11. The 3D passwords which are more customizable, and
very interesting way of authentication.
•A 3D password is a multifactor authentication scheme
that combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICs in one authentication system.
3D PASSWORD
12. Measures of security
This is achieved through interacting only
with the objects that acquire information
that the user is comfortable in providing.
It becomes much more difficult for the
attacker to guess the user’s 3-D
password.
13. Snapshot of a proof - of -
concept virtual
art gallery , which contains 36
pictures and six computers
14. 3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
15. PRINCIPLE IMPLIED
The action towards an object (assume a fingerprint recognition device) that
exists in location (x1, y1 , z1 ) is different
A similar object (another fingerprint recognition device) that exists in location
(x2 , y2 , z2 ).
Therefore to perform the legitimate 3D password,user must follow the same
scenario performed by the legitimate user. This means interacting with the
same objects that reside at the exact locations and perform the exact
actions in the proper sequence
17. Applications
The 3D password’s main application domains are protecting
critical systems and resources.
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
18. Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
A small virtual environment can be used in the
following systems like-
20. •The authentication can be improved with 3d password ,because
the unauthorized person may not interact with same object at a
particular location as the legitimate user.
•It is difficult to crack ,because it has no fixed number of steps
and a particular procedure.
•Added with biometrics and token verification this schema
becomes almost unbreakable.
Conclusion