SlideShare ist ein Scribd-Unternehmen logo
1 von 14
A Seminar Presentation
on
3-D Secure Password
Jaiprakash
(113013000010)
Institute of Engineering and Technology
Bhagwant University
Ajmer
4/23/2015 13-D Secure Password
PRESENTATION OUTLINE
• Introduction
• Three Factors of Authentication
• Existing Authentication Techniques
• Drawbacks of Existing Authentication Schemes
• 3D Password Scheme
• 3D Password Selection
• Advantages of 3D Passwords
• Applications of 3D Passwords
• Attacks and Countermeasures
• Conclusion
4/23/2015 23-D Secure Password
INTRODUCTION
•Authentication is any protocol or process that permits
one entity to establish the identity of another entity.
•In other words, authentication is the process of
determining whether someone or something is, in fact,
who or what it is declared to be.
4/23/2015 33-D Secure Password
THREE FACTORS OF AUTHENTICATION
•Knowledge Based: Something you know like
PASSWORD, PIN
•Token Based: Something you possess like
•KEYS, PASSPORT, SMART CARD
•Biometrics: Something you are like
•FINGERPRINT, FACE, IRIS
4/23/2015 43-D Secure Password
EXISTING AUTHENTICATION TECHNIQUES
•Textual Password:
Recall Based
•Graphical Password:
Recall Based + Recognition Based (Biometrics)
4/23/2015 53-D Secure Password
DRAWBACKS OF EXISTING AUTHENTICATION
SCHEMES
Drawbacks of Textual Passwords
•Textual Passwords should be easy to remember, but at
the same time, difficult to guess.
•Full password space for 8 characters, consisting of both
numbers and characters, is 2*(10^14).
•A research showed that 25% of the passwords out of
15,000 users could be guessed correctly using brute
force dictionary.
Continue..4/23/2015 63-D Secure Password
DRAWBACKS OF GRAPHICAL
PASSWORDS
•Graphical Passwords can be easily recorded as these
schemes take a long time.
•The main drawback of using biometric is its
intrusiveness upon a user's personal characteristics
which are liable to change under certain situations.
For example, a bruised finger will lead to an
inconsistency in fingerprint pattern.
•They require special scanning device to authenticate the
user which is not acceptable for remote and internet
users.
4/23/2015 73-D Secure Password
3D PASSWORD SCHEME
•The 3D password can combine the existing
authentication schemes such as textual passwords,
graphical passwords, and various types of biometrics into
a 3D virtual environment. The design of the 3D virtual
environment and the type of objects selected determine
the 3D password key space.
4/23/2015 83-D Secure Password
3D PASSWORD SELECTION
•A fingerprint reader that requires the user’s fingerprint.
•A biometrical recognition device.
•A paper or white board that a user can write, sign, or
draw on.
•An automated teller machine (ATM) that requires a
token.
4/23/2015 93-D Secure Password
ADVANTAGES OF 3D PASSWORDS
• Flexibility: 3D Passwords allow Multifactor
Authentication.
• Strength: This scenario provides almost unlimited
possibilities of Passwords.
• Easy to memorize: Can be remembered in the form of
a short story.
• Respect of Privacy: Organizers can select
authentication schemes that respect the privacy of the
users.
4/23/2015 103-D Secure Password
APPLICATIONS OF 3D PASSWORDS
•Servers: Many large organizations have critical
servers that require very high security but are usually
protected by a textual password. A 3D password
authentication proposes a sound replacement for a
textual password. so, it can be used to protect the
entrance to such locations as well as protect the usage of
such servers.
•Nuclear and military facilities: Such facilities should
be protected by the most powerful authentication 3D
password systems.
•ATMs, Desktop and Laptop Logins, Web Authentication etc.
4/23/2015 113-D Secure Password
ATTACKS AND COUNTERMEASURES
•Brute Force Attack: This attack is very difficult because:
It is very time consuming. Attack is highly expensive
•Well Studied Attack: This attack is difficult because the
attacker has to perform customized attack for different
virtual environments.
•Shoulder Surfing Attack: This attack is comparatively
more successful because the attacker uses camera to
record the 3D Passwords of the users.
4/23/2015 123-D Secure Password
CONCLUSION
•3D Password improves authentication.
•It is difficult to crack as there are no fixed number of
steps or particular procedure.
•Added with biometrics and token verification, this
schema becomes almost unbreakable.
4/23/2015 133-D Secure Password
Please ask Queries
4/23/2015 143-D Secure Password

Weitere ähnliche Inhalte

Was ist angesagt?

3d password ppt
3d password ppt3d password ppt
3d password ppt
Gowsalyasri
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
Sunanda Bansal
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 

Was ist angesagt? (20)

3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3 d password
3 d password3 d password
3 d password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password
3D Password3D Password
3D Password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpassword
3dpassword3dpassword
3dpassword
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3 d password
3 d password 3 d password
3 d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D password
3D password3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D password
3D password3D password
3D password
 

Ă„hnlich wie 3 d secure password

GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
gadisagemechu1
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
HARIKRISHNANU13
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 

Ă„hnlich wie 3 d secure password (20)

Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 
3D Password
3D Password3D Password
3D Password
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3d password
3d password3d password
3d password
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
3d authentication
3d authentication3d authentication
3d authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3 d password
3 d password3 d password
3 d password
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 

KĂĽrzlich hochgeladen

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

KĂĽrzlich hochgeladen (20)

Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

3 d secure password

  • 1. A Seminar Presentation on 3-D Secure Password Jaiprakash (113013000010) Institute of Engineering and Technology Bhagwant University Ajmer 4/23/2015 13-D Secure Password
  • 2. PRESENTATION OUTLINE • Introduction • Three Factors of Authentication • Existing Authentication Techniques • Drawbacks of Existing Authentication Schemes • 3D Password Scheme • 3D Password Selection • Advantages of 3D Passwords • Applications of 3D Passwords • Attacks and Countermeasures • Conclusion 4/23/2015 23-D Secure Password
  • 3. INTRODUCTION •Authentication is any protocol or process that permits one entity to establish the identity of another entity. •In other words, authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. 4/23/2015 33-D Secure Password
  • 4. THREE FACTORS OF AUTHENTICATION •Knowledge Based: Something you know like PASSWORD, PIN •Token Based: Something you possess like •KEYS, PASSPORT, SMART CARD •Biometrics: Something you are like •FINGERPRINT, FACE, IRIS 4/23/2015 43-D Secure Password
  • 5. EXISTING AUTHENTICATION TECHNIQUES •Textual Password: Recall Based •Graphical Password: Recall Based + Recognition Based (Biometrics) 4/23/2015 53-D Secure Password
  • 6. DRAWBACKS OF EXISTING AUTHENTICATION SCHEMES Drawbacks of Textual Passwords •Textual Passwords should be easy to remember, but at the same time, difficult to guess. •Full password space for 8 characters, consisting of both numbers and characters, is 2*(10^14). •A research showed that 25% of the passwords out of 15,000 users could be guessed correctly using brute force dictionary. Continue..4/23/2015 63-D Secure Password
  • 7. DRAWBACKS OF GRAPHICAL PASSWORDS •Graphical Passwords can be easily recorded as these schemes take a long time. •The main drawback of using biometric is its intrusiveness upon a user's personal characteristics which are liable to change under certain situations. For example, a bruised finger will lead to an inconsistency in fingerprint pattern. •They require special scanning device to authenticate the user which is not acceptable for remote and internet users. 4/23/2015 73-D Secure Password
  • 8. 3D PASSWORD SCHEME •The 3D password can combine the existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. 4/23/2015 83-D Secure Password
  • 9. 3D PASSWORD SELECTION •A fingerprint reader that requires the user’s fingerprint. •A biometrical recognition device. •A paper or white board that a user can write, sign, or draw on. •An automated teller machine (ATM) that requires a token. 4/23/2015 93-D Secure Password
  • 10. ADVANTAGES OF 3D PASSWORDS • Flexibility: 3D Passwords allow Multifactor Authentication. • Strength: This scenario provides almost unlimited possibilities of Passwords. • Easy to memorize: Can be remembered in the form of a short story. • Respect of Privacy: Organizers can select authentication schemes that respect the privacy of the users. 4/23/2015 103-D Secure Password
  • 11. APPLICATIONS OF 3D PASSWORDS •Servers: Many large organizations have critical servers that require very high security but are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password. so, it can be used to protect the entrance to such locations as well as protect the usage of such servers. •Nuclear and military facilities: Such facilities should be protected by the most powerful authentication 3D password systems. •ATMs, Desktop and Laptop Logins, Web Authentication etc. 4/23/2015 113-D Secure Password
  • 12. ATTACKS AND COUNTERMEASURES •Brute Force Attack: This attack is very difficult because: It is very time consuming. Attack is highly expensive •Well Studied Attack: This attack is difficult because the attacker has to perform customized attack for different virtual environments. •Shoulder Surfing Attack: This attack is comparatively more successful because the attacker uses camera to record the 3D Passwords of the users. 4/23/2015 123-D Secure Password
  • 13. CONCLUSION •3D Password improves authentication. •It is difficult to crack as there are no fixed number of steps or particular procedure. •Added with biometrics and token verification, this schema becomes almost unbreakable. 4/23/2015 133-D Secure Password
  • 14. Please ask Queries 4/23/2015 143-D Secure Password