3 dimension password

Upload: giridhar-singh

Post on 04-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 3 Dimension Password

    1/20

    3 D passwordPresented by:

    Preetha M P

    Roll No : 21S5 MCA

    ETAKMCA022

    For more secure authentication..

  • 8/13/2019 3 Dimension Password

    2/20

    Password

    PIN

    Keys

    Passport

    Smart Card

    Face

    Fingerprint

    Iris

    Possession(something I have)

    Biometrics

    (something I am)

    Knowledge(something I know)

    Basic Identification Methods of password

    Graphical

    Password

    Recognition

    (something I recognise)

  • 8/13/2019 3 Dimension Password

    3/20

    PASSWORD

    Itis basically a encryption algorithm

    Usually 8-15 characters or slightly more than that

    Can be meaningful words from dictionary, pet names,name of friends etc

    Easy to break and vulnerable to Brute force attack

  • 8/13/2019 3 Dimension Password

    4/20

    PASSPHRASE

    Enhanced version of password

    Combination of words or simply a collection of passwords

    in proper sequence

    Length is about 3050 characters or more than that also

    Creates ambiguity to remember if there is no proper

    sequence

  • 8/13/2019 3 Dimension Password

    5/20

    GRAPHICAL PASSWORDS

    Based on the idea that users can recall and recognize

    pictures better than words.

    Require a long time to be performed

    Have a password space that is less than or equal to the

    textual password space

    Vulnerable to shoulder surfing attacks

  • 8/13/2019 3 Dimension Password

    6/20

    BIOMETRICS

    Automate the identification or verification of an individualbased on human characteristics or body organs.

    Physiological: Face, fingerprint, irisBehavioral: Hand-written signature, voice

    Characteristics Templates

    011001010010101

    011010100100110

    001100010010010...

  • 8/13/2019 3 Dimension Password

    7/20

    3-D PASSWORD

    Customizable and very interesting way of authentication

    Multi factor authentication scheme.

    Contains a 3-D virtual environment where the user navigates & interacts

    with various objects.

    Sequence of actions and interactions toward the objects constructs

    users 3-D password.

    Combination of textual passwords, graphical passwords & varioustypes of biometrics into a 3-D virtual environment.

    Design of 3-D virtual environment and type of objects selected determine3-D password key space

  • 8/13/2019 3 Dimension Password

    8/20

    3-D ENVIRONMENT VIRTUAL OBJECTS CAN BE AS FOLLOWS:

    a computer with which the user can type;

    a fingerprint reader that requires the users fingerprint;

    a biometrical recognition device;

    a paper or a white board that a user can write, sign, or draw on;

    an automated teller machine (ATM) that requests a token;

    a light that can be switched on/off; a television or radio where channels can be selected;

    a staple that can be punched;

    a car that can be driven;

    a book that can be moved from one place to another;

    any graphical password scheme; any real-life object;

    any upcoming authentication scheme.

  • 8/13/2019 3 Dimension Password

    9/20

    State diagram of a possible 3-D password application

  • 8/13/2019 3 Dimension Password

    10/20

    Snapshot of a proof-of-concept virtual art gallery, which

    contains 36 pictures and six computers

  • 8/13/2019 3 Dimension Password

    11/20

    Snapshot of a proof-of-concept 3-D virtual environment, where the

    user is typing a textual password on a virtual computer as a part of

    the users 3-D password

  • 8/13/2019 3 Dimension Password

    12/20

    (10, 24, 91) Action = Open the office door;

    (10, 24, 91) Action = Close the office door;

    (4, 34, 18) Action = Typing, F;

    (4, 34, 18) Action = Typing, A;

    (4, 34, 18) Action = Typing, L;

    (4, 34, 18) Action = Typing, C;

    (4, 34, 18) Action = Typing, O;

    (4, 34, 18) Action = Typing, N;

    (10, 24, 80) Action = Pick up the pen;

    (1, 18, 80) Action = Drawing, point = (330, 130).

    An example of user actions in the 3D virtual environment can

    be recorded as follows:

  • 8/13/2019 3 Dimension Password

    13/20

    3D VIRTUAL ENVIRONMENT DESIGN GUI LIN S

    Real life similarity

    Object uniqueness and distinction

    Three Dimensional Virtual Environment Size

    Number of objects and their types

    System Importance

  • 8/13/2019 3 Dimension Password

    14/20

    3-D PASSWORD APPLICATIONS

    In Critical Systems:

    Critical servers

    Nuclear and military facilitiesAirplanes and jet fighters

    In small virtual environments:

    ATMPersonal Digital Assistance

    Desktop Computers & laptop loginsWeb Authentication

  • 8/13/2019 3 Dimension Password

    15/20

    ADVANTAGES OF 3-D PASSWORD

    Several authentication schemesEasy to memorize

    Designed according to protected system

    Highly flexible

    Extremely strongProvides secrets

    3D environment can be changed

    Password can change easily.

    Difficult to crack

    Freedom to selectDifficult to share

    3D graphical password has no limit

  • 8/13/2019 3 Dimension Password

    16/20

    DISADVANTAGES

    Difficult for blind people to use this technology.

    Requires sophisticated computer technology.

    Expensive.

    A lot of program coding is required.

  • 8/13/2019 3 Dimension Password

    17/20

    ATTACKS AND COUNTER MEASURES

    Brute Force Attack

    a) Time required to login

    b) Cost of attacks

    Well Studied Attack

    Shoulder Surfing Attack

    Timing attack

  • 8/13/2019 3 Dimension Password

    18/20

    CONCLUSION

    3D password is a multi factor authentication scheme that combines the

    various authentication schemes into a single 3D virtual environment.

    Design of the 3D virtual environment is the selection of objects inside

    the environment and the object's type reflect the resulted password

    space

    Password space is very large compared to any existing authentication

    schemes

    It is the task of the system administrator to design the environment and

    to select the appropriate object that reflects the protected systemrequirements

    Designing a simple and easy to use 3D virtual environment is a factor

    that leads to a higher user acceptability of a 3D password system.

  • 8/13/2019 3 Dimension Password

    19/20

    Questions??

  • 8/13/2019 3 Dimension Password

    20/20

    Thank u