SlideShare ist ein Scribd-Unternehmen logo
1 von 21
BY
DEVI GOMATHI. A
&
ABINAYA. S
PRE-FINAL YEAR
DEPT. OF COMPUTER SCIENCE
&
ENGINEERING
KARPAGAM COLLEGE OF
ENGINEERING
Authentication
Authentication is a process of validating who you are to whom you
claimed to be.
 General authentication techniques are as follows:
1.Knowledge Based (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
Three Basic Identification
Methods of password
Possession
(“something I
have”)
•Keys
•Passport
•Smart Card
Knowledge
(“Something I
know”)
•Password
• Pin
Biometrics
(“something I
am”)
•Face
•Fingerprints
•Iris
• Passwordis basically an encryption
algorithms.
 It is 8-15 character or slightly more than that.
 Mostly textual passwords nowadays are kept which are very simple, some taken from
dictionary, pet’s name or their favorite actor actress etc..
PASSWORD
Passphrase
 It’s the enhance version of password.
 It is a combination of words or simply collection of password
in proper sequence.
 It contains any well known thought also.
 Length of passphrase is about 30-50 character or more than
that also.
B
I
O
M
E
T
R
I
C
S
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
 Ten years back Klein performed
such tests and he could crack 10-
15 passwords per day.
 Guessable!
PASSWORD
DRAWBACKS
PASSPHRASE
•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
BIOMETRICS
Suppose you select your
fingerprint as a
biometrics..but what to do
when you have crack or
wound in your finger.
And now a days some
hackers even implement exact
copy of your biometrics
also….
 Intrusiveness to privacy
Biometrics cannot be
The 3D passwords which are more customizable, and
very interesting way of authentication.
•A 3D password is a multifactor authentication scheme
that combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICs in one authentication system.
3D PASSWORD
Measures of security
This is achieved through interacting only
with the objects that acquire information
that the user is comfortable in providing.
It becomes much more difficult for the
attacker to guess the user’s 3-D
password.
Snapshot of a proof - of -
concept virtual
art gallery , which contains 36
pictures and six computers
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
PRINCIPLE IMPLIED
The action towards an object (assume a fingerprint recognition device) that
exists in location (x1, y1 , z1 ) is different
A similar object (another fingerprint recognition device) that exists in location
(x2 , y2 , z2 ).
Therefore to perform the legitimate 3D password,user must follow the same
scenario performed by the legitimate user. This means interacting with the
same objects that reside at the exact locations and perform the exact
actions in the proper sequence
Advantages
Flexibility
Strength
Ease to
Memorize
Respect of
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & military Facilities
 Airplanes and missile Guiding
 Atm
 Personal digital assistance
 Desktop computers & laptops
 Web authentication etc.
A small virtual environment can be used in the
following systems like-
Attacks and Countermeasures
 Brute Force Attack
 Well studied Attack
 Shoulder-surfing Attack
•The authentication can be improved with 3d password ,because
the unauthorized person may not interact with same object at a
particular location as the legitimate user.
•It is difficult to crack ,because it has no fixed number of steps
and a particular procedure.
•Added with biometrics and token verification this schema
becomes almost unbreakable.
Conclusion
Thank
you

Weitere ähnliche Inhalte

Was ist angesagt?

SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 

Was ist angesagt? (20)

3D Password
3D Password3D Password
3D Password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password
3D Password3D Password
3D Password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3 d password
3 d password3 d password
3 d password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D password
3D password3D password
3D password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
3d password
3d password3d password
3d password
 

Ähnlich wie 3d password

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 

Ähnlich wie 3d password (20)

3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 dpswd
3 dpswd3 dpswd
3 dpswd
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3 d password
3 d password 3 d password
3 d password
 
C0361419
C0361419C0361419
C0361419
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
Vivek
VivekVivek
Vivek
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3d
3d3d
3d
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 

3d password

  • 1. BY DEVI GOMATHI. A & ABINAYA. S PRE-FINAL YEAR DEPT. OF COMPUTER SCIENCE & ENGINEERING KARPAGAM COLLEGE OF ENGINEERING
  • 2. Authentication Authentication is a process of validating who you are to whom you claimed to be.  General authentication techniques are as follows: 1.Knowledge Based (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 3. Three Basic Identification Methods of password Possession (“something I have”) •Keys •Passport •Smart Card Knowledge (“Something I know”) •Password • Pin Biometrics (“something I am”) •Face •Fingerprints •Iris
  • 4. • Passwordis basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple, some taken from dictionary, pet’s name or their favorite actor actress etc.. PASSWORD
  • 5. Passphrase  It’s the enhance version of password.  It is a combination of words or simply collection of password in proper sequence.  It contains any well known thought also.  Length of passphrase is about 30-50 character or more than that also.
  • 7. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 8. Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play.  Ten years back Klein performed such tests and he could crack 10- 15 passwords per day.  Guessable! PASSWORD DRAWBACKS
  • 9. PASSPHRASE •Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
  • 10. BIOMETRICS Suppose you select your fingerprint as a biometrics..but what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….  Intrusiveness to privacy Biometrics cannot be
  • 11. The 3D passwords which are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICs in one authentication system. 3D PASSWORD
  • 12. Measures of security This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing. It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 13. Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
  • 14. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 15. PRINCIPLE IMPLIED The action towards an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different A similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ). Therefore to perform the legitimate 3D password,user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence
  • 17. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 18.  Atm  Personal digital assistance  Desktop computers & laptops  Web authentication etc. A small virtual environment can be used in the following systems like-
  • 19. Attacks and Countermeasures  Brute Force Attack  Well studied Attack  Shoulder-surfing Attack
  • 20. •The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. •It is difficult to crack ,because it has no fixed number of steps and a particular procedure. •Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion