You are on page 1of 156

Scribd Upload a Document

Top of Form

3d passw o

Search Documents
Bottom of Form

Explore

Documents

Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up |

People

Log In

1
First Page Previous Page Next Page
1

/ 31
Sections not available Zoom Out Zoom In Fullscreen Exit Fullscreen Select View Mode

View Mode SlideshowScroll


Top of Form

Search w it
Bottom of Form

Readcast Add a Comment Embed & Share

Reading should be social! Post a message on your social networks to let others know what you're reading. Select the sites below and start sharing. Readcast this Document
Top of Form

Login to Add a Comment

Submit

4gen
Bottom of Form

Share & Embed


Add to Collections

Download this Document for Free


Auto-hide: on

SEMIN AR

REPOR T
Submitt ed by

DERRICK INF ORMATION SCIENCE1EW 07IS021

Departme nt Of Informatio

n Technolog y
EAST WEST INSTITUTE OF

TECHNOLO GY BANGALOR E

3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage


2

CONTENT S
1. INTRODUCTION 32.

WHA T IS A UT HE NTIC A TION 43.

A UT HE NTIC A TION ME T H ODS

4 4. B RI EF D E SCRIPTION O

F T HE SYST EM

5
5. INNOV A

TIV E CO M PON E NT 66. WHA T

IS 3 D P A SS W ORD 77.

ST A T E DI AG R AM 88.

SYST EM I M PL EME NT A TION 99.

D E SI G N O F3 D VIRTU

A L E NVIRON ME NTS 1410. A PPLIC A TION 1511.

S E CURITY A N A LYSIS 1712. A TT A CKS

1813. CONCLUSION 2214. F UTUR EW ORKS 2315. R EFE R E

NC E S 24

3D Password Seminar Report10

EAST WEST INSTITUTE OF

TECHNOLOGY DERRICKPage
3

INTRODUC TION
Users nowadays are

provided with major password stereotypes suchas textual passwords, biometric

scanning, tokens or cards (such as an ATM) etc.Current authenticatio n systems suffer from

many weaknesses.T extual passwords are commonly used; however,

users do not followtheir requirements. Users tend to choose meaningful words from dictionary

or their pet names, girlfriends etc. Ten years back Klein performed such tests andhe could

crack 10-15 passwords per day. On the other hand, if a password ishard to guess, then it

is often hard to remember. Users have difficultyreme mbering a password that is long and random

appearing. So, they createshort, simple, and insecure passwords that are susceptible

to attack. Whichmake textual passwords easy to break and vulnerable to dictionary or

bruteforce attacks. Graphical passwords schemes have been proposed.

The strengthof graphical passwords comes from the fact that users can recall and

recognize pict ures more than words. Most graphical passwords are vulnerable

for shoulder surfi ng attacks, where an attacker can observe or record the legitimate

usersgraphic al password by camera. Token based systems such as ATMs are widelyapplied in banking

systems and in laboratories entrances as a mean of authenticat ion. However, Smart cards

or tokens are vulnerable to loss or theft.Moreove r, the user has to carry the token whenever

access required. Biometricsca nning is your "natural" signature and Cards or Tokens prove

your validity.But some people hate the fact to carry around their cards, some refuse

toundergo strong IR exposure to their retinas (Biometric scanning).In this paper, we present

and evaluate our contribution, i.e., the 3D password. The 3-D password is a multifactor

authenticatio n scheme. To beauthentica ted, we present a 3-D virtual environment where the

user navigatesand interacts with various objects. The sequence of actions and interactionsto

ward the objects inside the 3-D environment constructs the users 3D password. The 3-D

password can combine most existing authenticatio n schemessuch as textual passwords,

graphical passwords, and various types of biometricsint o a 3-D virtual environment.

The design of the 3-D virtual environment andthe type of objects selected determine

the 3Dpassword key space.

3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage


4

WHA

T IS

UT
H

ENTIC
A

TION?

Authenticatio n is the act of establishing or confirmingso mething as authentic, that is, that

claims made by or about the subject aretrue. This might involve confirming the identity of a person,

tracing the originsof an artifact, ensuring that a product is what its packaging and labeling

claimsto be, or assuring that a computer program is a trusted one.

For example, when you show proper identification credentials toa bank teller, you are asking to be

authenticated to act on behalf of the accountholde r. If your authenticatio n request is approved,

you become authorized toaccess the accounts of that account holder, but no others.

3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage


5

UT
H

ENTIC
A

TION MET

ODS
There are two types of techniques for doing this.The first

is comparing the attributes of the object itself towhat is known about objects of that origin. For example,

an art expert mightlook for similarities in the style of painting, check the location and form of

asignature, or compare the object to an old photograph. An archaeologist mightuse

carbon dating to verify the age of an artifact, do a chemical analysis of thematerials used, or

compare the style of construction or decoration to other artifact s of similar origin. The

physics of sound and light, and comparison witha known physical environment, can be used

to examine the authenticity of audiorecordin gs, photographs, or videos.The

second type relies on documentatio n or other externalaffir mations. For example, the rules of

evidence in criminal courts often requireestabli shing the chain of custody of evidence

presented. This can beaccomplish ed through a written evidence log, or by testimony

from the policedetectiv es and forensics staff that handled it. Some antiques are accompanied

bycertificates attesting to their authenticity. External records have their own problems

of forgery and perjury, and are also vulnerable to being separatedfro m the artifact and

lost.Currency and other financial instruments commonly use thefirst type of authenticatio

n method. Bills, coins, and cheques incorporate hard-toduplicate physical features,

such as fine printing or engraving, distinctivefee l, watermarks, and holographic

imagery, which are easy for receivers toverify.Cons umer goods such as pharmaceutic

als, perfume, fashionclothin g can use either type of authenticatio n method to prevent counterfeitgo

ods from taking advantage of a popular brand's reputation (damaging the brand

owner's sales and reputation). A trademark is a legally protected markingor other

identifying feature which aids consumers in the identification of genuine

brand-name goods.

3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage


6

RIEF DESCRIPTI ON OF T
H

E SYSTEM
The proposed system is a

multi factor authenticatio n scheme. Itcan combine all existing authenticatio n schemes into a single

3Dvirtualenvi ronment. This 3D virtual environment contains several objects or itemswith

which the user can interact. The user is presented with this 3D virtualenviron ment where

the user navigates and interacts with various objects. Thesequence of actions and interactions

toward the objects inside the 3Denvironme nt constructs the users 3Dpassword.T he 3D

password can combinemost existing authenticatio n schemes such as textual passwords,

graphical pas swords, and various types of biometrics into a 3D virtual environment. The choice of

what authenticatio n schemes will be part of theuser's 3D password reflects the user's

preferences and requirements. A user who prefers to remember and recall a password

might choose textual and graphical pas sword as part of their 3D password. On the other hand users

who have moredifficulty with memory or recall might prefer to choose smart cards or biometrics

as part of their 3D password. Moreover user who prefers to keep anykind of biometric

data private might not interact with object that requires biom etric information. Therefore it is

the user's choice and decision to constructthe desired and preferred 3D password.

3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage

INNOV
A

TIVE COMPONE NT

The proposed system is a multi factor authenticatio n schemethat combines the benefits of various

authenticatio n schemes. Users have thefreedom to select whether the 3D password will be solely

recall, recognition, or token based, or combination of two schemes or more. This

freedom of selectionis necessary because users are different and they have different

requirements .Therefore, to ensure high user acceptability, the users freedom of selection

isimportant.T he following requirements are satisfied in the proposed scheme 1

The new scheme provide secrets that are easy to remember and very

difficultfor intruders to guess. 2


.

The new scheme provides

secrets that are not easy to write down on paper.Moreov er, the scheme secrets

should be difficult to share with others.


3.

The new scheme provides

secrets that can be easily revoked or changed.


COMPARISON WITH CURRENT AUTHENTICATIO N SYSTEMS

Suffer from many weaknesses. Textual passwords arecommonly used. Users tend to

choose meaningful words from dictionaries,w hich make textual passwords easy to break

and vulnerable to dictionary or brute force attacks. Many available graphical

passwords have a password spacethat is less than or equal to the textual password

space. Smart cards or tokenscan be stolen. Many biometric authenticatio ns have been proposed.

However,user s tend to resist using biometrics because of their intrusiveness and the

effecton their privacy. Moreover, biometrics cannot be revoked. The 3D password isa multi

factor authenticatio n scheme. The design of the 3D virtual environmenta nd the type of objects

selected determine the 3D password key space. User have freedom to select

whether the 3D password will be solely recall,recogni tion, or token based, or combination of two

schemes or more.
3D Password Seminar Report10

EAST WEST INSTITUTE OF

TECHNOLOGY DERRICKPage
8

WHA

T IS
A

3D P

SS
W

ORD?
The 3-D password is a multifactor

authenticatio n scheme. Itcan combine all existing authenticatio n schemes into a single

3-D virtualenviron ment. This 3D virtual environment contains several objects or

itemswith which the user can interact. The type of interaction varies from one item

toanother. The 3-D password is constructed by observing the actions andinteractio ns of the user

and by observing the sequences of such actions. It is theusers choice to select which

type of authenticatio n techniques will be part of their 3-D password. This is achieved

through interacting only with the objectsthat acquire information that the user is

comfortable in providing and ignoringthe objects that request information that the user

prefers not to provide.For example, if an item requests an iris scan and the user is notcomfortabl

e in providing such information, the user simply avoids interactingwit h that item. Moreover,

giving the user the freedom of choice as to what typeof authenticatio n schemes will be part of

their 3-D password and given the largenumber of objects and items in the environment, the number

of possible 3D passwords will increase. Thus, it becomes much more difficult for the

attacker to guess the users 3-D password.


3D Password Seminar Report10

EAST WEST INSTITUTE OF TECHNOLOGY DERRICKPage


9

STATE DIAGRAM OF A
3

D PASSWORD APPLICATION
3D Password Seminar Report10

EAST WEST INSTITUTE OF

TECHNOLOGY DERRICKPage
10

3D PASSWORD
Download this Document for FreePrintMobileCollectionsReport Document Report this document? Please tell us reason(s) for reporting this document
Top of Form

doc

Spam or junk Porn adult content Hateful or offensive If you are the copyright owner of this document and want to report it, please follow these directions to submit a copyright infringement notice. Report Cancel
Bottom of Form

This is a private document.

Info and Rating


Reads: 3,786 Uploaded: 02/26/2011 Category: Uncategorized. Rated:
0 5 false false 0

Copyright: Attribution Non-commercial Follow

Neha Vinod Holamoge

Share & Embed Related Documents


PreviousNext 1.

28 p.

19 p.

14 p. 2.

18 p.

18 p.

18 p. 3.

18 p.

18 p.

18 p. 4.

18 p.

18 p.

18 p. 5.

18 p.

18 p.

18 p. 6.

18 p.

18 p.

18 p. 7.

18 p.

18 p.

More from this user


PreviousNext 1.

31 p.

8 p.

Recent Readcasters

Add a Comment
Top of Form

c107cf88539439

Submit Characters: 400


document_comme 4gen
Bottom of Form

Rafeetha Fidhuleft a comment up loading the details of 3d password 07 / 03 / 2011 Reply Print This Document

High Quality
Open the downloaded document, and select print from the file menu (PDF reader required). Download and Print You Must be Logged in to Download a Document Use your Facebook login and see what your friends are reading and sharing. Other login options

Login with Facebook


Top of Form

http://w w w .scrib 49579162

http://w w w .scrib dow nload Scribd.logged_in 49579162 dow nload Scribd.logged_in

Bottom of Form

Signup
I don't have a Facebook account
Top of Form

c107cf88539439 49579162 dow nload Scribd.logged_in

email address (required) create username (required) password (required) Send me the Scribd Newsletter, and occasional account related communications. Sign Up Privacy policy You will receive email notifications regarding your account activity. You can manage these notifications in your account settings. We promise to respect your privacy.
Bottom of Form

Why Sign up?


1. 1. Discover and Connect With people of similar interests 2. 2. Publish Your Documents Quickly and easily 3. 3. Share Your Reading Interest On Scribd and social sites like Facebook and Twitter Already have a Scribd account?
Top of Form

c107cf88539439 49579162 dow nload Scribd.logged_in

email address or username

password Log In Trouble logging in?


Bottom of Form

Login Successful
Now bringing you back...

Reset Your Password Back to Login Please enter your email address below to reset your password. We will send you an email with instructions on how to continue.
Top of Form

c107cf88539439

Email Address: You need to provide a login for this account as well. Login Submit
Bottom of Form

Upload a Document
3d passw o

Top of Form

Search Documents
Bottom of Form

Follow Us! scribd.com/scribd twitter.com/scribd facebook.com/scribd About Press Blog Partners Scribd 101 Web Stuff

Support FAQ Developers / API Jobs Terms Copyright Privacy

Copyright 2012 Scribd Inc. Language: English Choose the language in which you want to experience Scribd: English Espaol Portugus (Brasil)

You might also like