CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion .

graphical passwords and biometrics. werequirea3Dvirtualenvironment.  3D password is a multifactor authentication scheme.INTRODUCTION  Commonly used authentication schemes are textual passwords. .  To be authenticated.

 Users choice to select the type of authentication technique. Combines recognition-.recall-.and biometrics- based systems. .token-.

face recognition  Intrusiveness upon a user’s personal characteristics.AUTHENTICATION SCHEMES  KNOWLEDGE BASED  Textual password  Recognition based  TOKEN BASED eg : smart card  BIOMETRIC BASED  Fingerprint .hand geometry .palm prints . .

 Should provide secrets that are easy to remember difficult to guess. .FUNCTIONALITIES REQUIRED  New scheme should combine the existing authentication schemes  Freedom to select the type of authentication technique.

3D PASSWORD SELECTION AND INPUT  3D environment space represented by the co-ordinates  User navigate into the 3D virtual environment using any input device.  The sequence of actions and interactions forms the users3D password. .

18) Action= Typing.”C”.34.24.91) Action=Open the office door.80) Action= Drawing. (10. (4.”O”. . point=(330. (4.24.34. (4.34.18) Action= Typing.”L”.“F”.34. (10.18) Action= Typing.34. (4.”N”. (4.91) Action=Close the office door.18) Action= Typing. (1.”A”.24.130).80) Action= Pick up the pen.34. (4.18) Action= Typing.18) Action= Typing. Representation of user actions in the 3D virtual environment (10.18.

Virtual Computer where user typing a textual password as a part of user’s 3D Password .

Snapshot of a proof-of-concept virtual art gallery .

State diagram of a 3D Password application .

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES  Real-life similarity  Object uniqueness and distinction  System importance  Three-dimensional virtual environment .

APPLICATIONS  Critical servers.  Nuclear and military facilities.  ATMs. desktop computers and laptops. PDA’s. .  Airplanes and jetfighters.

Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy .

ATTACKS AND COUNTERMEASURES  Brute Force Attack  Well-Studied Attack  Shoulder Surfing Attack  Timing Attack .

and the object type reflects the resulted password space.  3D Password is a multifactor authentication scheme.  User’s choice and decision to construct the desired and preferred 3D password .  Design of 3D virtual environment. selection of objects inside the environment.CONCLUSION  Commonly used authentication schemes are vulnerable to attacks.