Вы находитесь на странице: 1из 20

3-D password

For more secure authentication..

Presented by: Preetha M P Roll No : 21 S5 MCA ETAKMCA022

Basic Identification Methods of password


Possession (something I have)
Keys Passport Smart Card

Knowledge (something I know)


Password PIN

Biometrics (something I am)


Face Fingerprint Iris

Recognition (something I recognise)


Graphical Password

PASSWORD
It is basically a encryption algorithm Usually 8-15 characters or slightly more than that Can be meaningful words from dictionary, pet names, name of friends etc Easy to break and vulnerable to Brute force attack

PASSPHRASE
Enhanced version of password Combination of words or simply a collection of passwords in proper sequence

Length is about 30 50 characters or more than that also


Creates ambiguity to remember if there is no proper sequence

GRAPHICAL PASSWORDS
Based

on the idea that users can recall and recognize pictures better than words. Require a long time to be performed

Have a password space that is less than or equal to the textual password space
Vulnerable to shoulder surfing attacks

BIOMETRICS
Automate

the identification or verification of an individual based on human characteristics or body organs.


Physiological: Face, fingerprint, iris Behavioral: Hand-written signature, voice

Characteristics

Templates

011001010010101 011010100100110 001100010010010...

3-D PASSWORD
Customizable and very interesting way of authentication Multi factor authentication scheme. Contains a 3-D virtual environment where the user navigates & interacts with various objects. Sequence of actions and interactions toward the objects constructs users 3-D password. Combination of textual passwords, graphical passwords & various types of biometrics into a 3-D virtual environment. Design of 3-D virtual environment and type of objects selected determine 3-D password key space

3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS:


a computer with which the user can type; a fingerprint reader that requires the users fingerprint; a biometrical recognition device; a paper or a white board that a user can write, sign, or draw on; an automated teller machine (ATM) that requests a token; a light that can be switched on/off; a television or radio where channels can be selected; a staple that can be punched; a car that can be driven; a book that can be moved from one place to another; any graphical password scheme; any real-life object; any upcoming authentication scheme.

State diagram of a possible 3-D password application

Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers

Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the users 3-D password

An example of user actions in the 3D virtual environment can be recorded as follows:


(10, 24, 91) Action = Open the office door; (10, 24, 91) Action = Close the office door; (4, 34, 18) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 18) Action = Typing, L; (4, 34, 18) Action = Typing, C; (4, 34, 18) Action = Typing, O; (4, 34, 18) Action = Typing, N; (10, 24, 80) Action = Pick up the pen; (1, 18, 80) Action = Drawing, point = (330, 130).

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES


Real life similarity
Object uniqueness and distinction

Three Dimensional Virtual Environment Size


Number of objects and their types

System Importance

3-D PASSWORD APPLICATIONS


In Critical Systems: Critical servers Nuclear and military facilities Airplanes and jet fighters In small virtual environments: ATM Personal Digital Assistance Desktop Computers & laptop logins Web Authentication

ADVANTAGES OF 3-D PASSWORD


Several authentication schemes
Easy to memorize Designed according to protected system Highly flexible Extremely strong Provides secrets 3D environment can be changed Password can change easily. Difficult to crack Freedom to select Difficult to share 3D graphical password has no limit

DISADVANTAGES
Difficult for blind people to use this technology.
Requires sophisticated computer technology.

Expensive.
A lot of program coding is required.

ATTACKS AND COUNTER MEASURES


Brute Force Attack
a) Time required to login b) Cost of attacks

Well Studied Attack Shoulder Surfing Attack Timing attack

CONCLUSION
3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. Design of the 3D virtual environment is the selection of objects inside the environment and the object's type reflect the resulted password space Password space is very large compared to any existing authentication schemes It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements Designing a simple and easy to use 3D virtual environment is a factor that leads to a higher user acceptability of a 3D password system.

Questions??

Thank u

Вам также может понравиться