3dpassword ppt-120815070434-phpapp02
TRANSCRIPT
![Page 1: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/1.jpg)
![Page 2: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/2.jpg)
Authentication
Authentication is a process of validating who you are to
whom you claimed to be.
Human authentication techniques are as follows:
1.Knowledge Based (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
![Page 3: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/3.jpg)
Three Basic Identification
Methods of password
Possession(“something I have”)
•Keys •Passport •Smart Card
Knowledge(“Something I know”)
•Password • Pin
Biometrics(“something I am”)
•Face•Fingerprints•Iris
![Page 4: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/4.jpg)
![Page 5: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/5.jpg)
• Password is basically an encryption
algorithms.
It is 8-15 character or slightly more than that.
Mostly textual passwords nowadays are kept which are
very simple.
![Page 6: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/6.jpg)
Passphrase
It’s the enhance version of password.
It is a combination of words or simply collection of
password in proper sequence.
It contains any well known thought also.
Length of passphrase is about 30-50 character or more
than that also.
![Page 7: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/7.jpg)
B
I
O
M
E
T
R
I
C
S
![Page 8: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/8.jpg)
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
![Page 9: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/9.jpg)
Based on human characteristics or body organs
![Page 10: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/10.jpg)
Process
![Page 11: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/11.jpg)
% market share by type of biometric technology in 2003
![Page 12: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/12.jpg)
![Page 13: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/13.jpg)
•How secure is your password?
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Ten years back Klein performed
such tests and he could crack 10-15
passwords per day.
PASSWORD
![Page 14: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/14.jpg)
PASSPHRASE
•Passphrase length is about 30-50 characters or
more than that so it creates ambiguity to remember
if there is no any proper sequence.
![Page 15: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/15.jpg)
BIOMETRICS
•Biometrics has also some
drawbacks.
Suppose you select your fingerprint
as a biometrics..
But what to do when you have crack
or wound in your finger.
And now a days some hackers even
implement exact copy of your
biometrics also….
![Page 16: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/16.jpg)
3D PASSWORD
![Page 17: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/17.jpg)
•The 3D passwords which are more
customizable, and very interesting way of
authentication.
•A 3D password is a multifactor
authentication scheme that
combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICS
in one authentication system.
![Page 18: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/18.jpg)
The 3D password presents a virtual environment
containing various virtual objects.
The user walks through the environment and interacts
with the objects.
It is the combination and sequence of user interactions
that occur in the 3D environment.
![Page 19: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/19.jpg)
This is achieved through interacting only with the objects that
acquire information that the user is comfortable in providing.
It becomes much more difficult for the attacker to guess the user’s
3-D password.
![Page 20: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/20.jpg)
Virtual objects
Virtual objects can be any object we encounter in real life:
A computer on which the user can type in
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
An Automated teller(ATM) machine that requires a
token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
![Page 21: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/21.jpg)
Snapshot of a proof - of - concept virtual
art gallery , which contains 36
pictures and six computers
![Page 22: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/22.jpg)
3D VIRTUAL
ENVIRONMENT
![Page 23: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/23.jpg)
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
![Page 24: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/24.jpg)
The design of 3D virtual
environments should follow
these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
![Page 25: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/25.jpg)
Advantages
Flexibility
Strength
Ease to Memorize
Respect of Privacy
![Page 26: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/26.jpg)
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
![Page 27: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/27.jpg)
A small virtual environment can be used in the following
systems like-
Atm
Personal digital assistance
Desktop computers & laptops
Web authentication etc.
![Page 28: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/28.jpg)
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
Shoulder-surfing Attack
![Page 29: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/29.jpg)
•The authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
•It is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
•Added with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion
![Page 30: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/30.jpg)
QUERIES
![Page 31: 3dpassword ppt-120815070434-phpapp02](https://reader034.vdocuments.mx/reader034/viewer/2022052602/55addbfa1a28abfa338b47b9/html5/thumbnails/31.jpg)