3D-PASSWORD
BY
BHAVYARANI.K
ABSTRACT
.
The melodramatic increase of computer usage has given
rise to many security concerns. ne ma!or security concern
is Authentication" process of validating #ho you are to #ho
you claimed to $e.Authentication provides more security to
the system. %any e&isting authentication schemes such as
te&tual pass#ord' graphical pass#ord etc. are availa$le'
each one having its o#n dra#$ac(s and limitations. This
paper introduced a ne# authentication techni)ue' called *+
,ass#ord that overcomes the dra#$ac( of previously
e&isting authentication schemes. The *+ ,ass#ord is multi-
factor and multi-pass#ord authentication techni)ues that
consist of *+ virtual environment containing real time
o$!ect cenarios. *+ virtual environment is the user interface
that loo(s li(e same as real time environment $ut is not
actual real time environment. .ompared to other
authentication techni)ues *+ ,ass#ord is more advanced
and secure' as it is easy to use and difficult to $rea(. This
paper also focuses on e&plaining #hat is *+ ,ass#ord/'
ho# to create *+ pass#ord' #or(ing of *+ ,ass#ord and
some design principles for designing in *+-virtual
environment
INTRODUCTION
0enerally' the authentication scheme that user e&periences
are mostly very (ind or very firm. Authentication has
$een a very remar(a$le approach' throughout the years.
The tremendous rise and use of internet and related
technologies has made easy for the 1intruders1 to formulate
or to steal identity or to hac( someone2s pass#ord.
Authentication is the utmost significant security service
that can $e provided to the system $y different
authentication schemes. Authentication protects any system
from unauthori3ed access' so that only authori3ed
persons can have right to use or handle that system 4 data
related to that system securely. %any effective and
secure authentication schemes are availa$le' having some
dra#$ac(. 5arlier' many authentication procedures
#ere presented such as graphical pass#ord' te&t pass#ord'
Biometric authentication' to(en-$ased etc.
.ommonly' four types of authentication techni)ues are
availa$le such as6
7. Kno#ledge $ased6 means #hat you (no#. The $est
e&le of this authentication scheme is te&tual
pass#ord.
8. Recognition Based6 means #hat you recogni3e. 5&le
includes graphical pass#ord' iris recognition' face
recognition' etc.
*. Biometrics6 means #hat you are. Includes Thum$
impression' voice recognition' etc.
9. To(en $ased6 means #hat you have. This includes .redit
cards' AT% cards' etc. as an e&le