You are on page 1of 16

GUIDE: Ms.Sumithra V. Dept.

of ISE JVIT

3D-PASSWORD ABSTRACT • Current systems suffers from many weakness  Textual : easy to hack  Tokens : theft  Graphical : less password space  Biometric systems : users resist • 3D password system overcomes all the above weakness. .

that claims made by or about the subject are true.3D-PASSWORD INTRODUCTION 3D PASSWORD : WHAT IS IT ? It is a multifactor authentication scheme. that is. . Authentication: It is the act of establishing or confirming something as authentic. where user navigates and interacts with various objects.

.   First is comparing the attributes of the object itself to know its origin. Second type relies on documentation or other external affirmations.3D-PASSWORD INTRODUCTION(contd.) Types of authentication:  Knowledge based (what you know)  Token based (what you have)  Biometrics (what you are ) Authentication Methods: The are two types of techniques for doing this..

. • Difficult to share. recognition based etc.3D-PASSWORD 3D PASSWORD SCHEME REQUIREMENTS: • Should be combination of recall based. • Freedom to select combination of the above schemes. • Easy to remember & change.

Fig: 3.1: State diagram of the 3D Password .

2: Snapshot of a proof-of-concept 3-D virtual environment.3D-PASSWORD Fig: 3. .

y.” Then. the user closes the door. • For example.. 24.. the user walks to the meeting room and picks up a pen located at (10. Let us assume that the user is in the virtual office and the user turns around to the door located in (10. 18. The user then presses the login button. 24. 80) and draws only one dot in a paper located in (1. which exists in the position (4. 130).. 91) and opens it. 34... and the user types “FALCON. y) coordinate relative to the paper space is (330. (x. The user then finds a computer to the left. 18).3D-PASSWORD SELECTION AND INPUTS: • Space of size G*G*G. which is the dot (x.z) all in [1. .G]. consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Then. 30).

18) Action = Typing.. “A”. · (10.) · (10. point = (330. 18. · (10. 34. 91) Action = Open the office door.3D-PASSWORD SELECTION AND INPUTS (contd. 18) Action = Typing. “F”. · (4. 34. · (4. . · (4. 18) Action = Typing. · (1. 34. “N”. “O”. · (4. 24. 80) Action = Pick up the pen. · (4. 34. 130). 91) Action = Close the office door. 18) Action = Typing. 18) Action = Typing. · (4. 18) Action = Typing. “L”. 80) Action = Drawing. 24. 34. 34. “C”. 24.

3D-PASSWORD Fig: 3.3: Snapshot of an experimental 3-D virtual environment .

3D-PASSWORD APPLICATIONS • Critical servers • Nuclear and military services • Airplanes and jet fighters • ATM • Internet .

.3D-PASSWORD ADVANTAGES Easiness to memorize  Flexibility Strength Secrets those are not easy to write down on paper. Provide secrets that can be easily revoked or changed. The scheme secrets should be difficult to share with others.

3D-PASSWORD ATTACKS AND COUNTER MEASURES Brute Force Attack Well Studied Attack Shoulder Surfing Attack Timing Attack .

the selection of objects inside the environment and the object’s type reflect the resulted password space.3D-PASSWORD CONCLUSION • Combines various authentication schemes. • The design of the 3D virtual environment. . • Environment – easy and secure. • User's preference and requirements are valued. • Uses existing scheme or upcoming scheme.

Fawaz A Alsulaiman and Abdulmotaleb El Saddik. • Denial V Klien Foiling the cracker – A survey of and improvement to pasword security. . • Greg E Blonder Graphical password United States Patent 5559961.3D-PASSWORD REFERENCES • A novel 3D graphical password schema.