You are on page 1of 22

MAHARANA PRATAP COLLEGE OF TECHNOLOGY

seminar on: 3D PASSWORD CS 507 Submitted by:


Submitted to: Prof. Pragya jain

Lovely Bansal 0903CS111029 CS (3rd yr)

CONTENTS

Introduction History Three Basic Identification What is Biometrics Based on Human Characteristics or body organs 3D Password
3D Virtual Environment Design Guidelines State Diagram of 3D Password Advantages Disadvantages Application Attacks and Counter Measures Conclusion

INTRODUCTION
WHAT IS A PASSWORD ? It is a set of characters that is used for privacy reason

to authenticate a user. WHAT IS AUTHENTICATION ? Authentication is a process of validating who you are to whom you claim to be. WHAT IS 3D PASSWORD ? More customizable, very interesting way of authentication.

HISTORY
Years back Klein performed many tests on password

and he could crack 10-15 password per day. Now with the technology change fast processor and many tools on the internet this has become a child play. Then comes the graphical password schema of Blonder is considered to be recall based since the user must remember location. Further evolution for authentication with upcoming technology Jermyn et all had come up with drawings, making the password more complicated.

Recently used technology is biometrics which comprises of human reorganization like iris, DNA etc. Now the latest and the most complex way to authenticate the user is 3D Password.

Three Basic Identification Methods of password


Possession (something I have) Knowledge (Something I know)

Keys Passport Smart Card

Password Pin

Biometrics (something I am)

Face Fingerprints Iris

WHAT IS BIOMETRICS?
Automate the identification or verification of individual based on human characteristics or body organs. Physiological : face, fingerprint, iris. Behavioral : Hand written signature, voice

Based on human characteristics or body organs

3D PASSWORD

The 3D passwords which are more customizable, and very interesting way of authentication. A 3D password is a multifactor authentication scheme that combine

RECOGNITION +RECALL +TOKENS +BIOMETRICS


in one authentication system.

The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.

This is achieved through interacting only with the objects that

acquire information that the user is comfortable in providing.

AA57218752 It becomes much more difficult for the attacker to guess the users 3-D password.

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES


Real life similarity
Object uniqueness and distinction

Three Dimensional Virtual Environment Size


Number of objects and their types

System Importance

State diagram of a possible 3-D password application

ADVANTAGE
Highly flexible Strength Ease to memorize

Respect to privacy
Difficult to share Difficult to crack

Extremely strong
Designed accordingly to protected system

DISADVANTAGES
Difficult for blind people to use this technology.
Requires sophisticated computer technology.

Expensive.
A lot of program coding is required.

Applications
The 3D passwords main application domains are protecting critical systems and resources.
Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding

ATTACKS AND COUNTER MEASURES


Brute Force Attack
a) Time required to login b) Cost of attacks

Well Studied Attack Shoulder Surfing Attack Timing attack

Conclusion
The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.

It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
Added with biometrics and token verification this schema becomes almost unbreakable.

You might also like