Professional Documents
Culture Documents
2. TOKEN BASED
(A) Keys
(B) Passport
(C) Smart Card
(D) ID Proofs
3. BIOMETRICS
(A) Face Recognition
(B) Fingerprints
(C) Iris
(D) DNA
(E) Voice
(F) Hand Geometry
DRAWBACKS OF HUMAN AUTHENTICATION TECHNIQUES
1. KNOWLEDGE BASED
(A) Easy to Remember -> Easy to Break
Hard to Guess -> Hard to Remember
(B) Vulnerable to attacks like dictionary attacks, brute force attacks, etc.
2. TOKEN BASED
(A) Duplicate Keys, Smart Cards, ID Proofs, are easily available.
3. BIOMETRICS
(A) Instructiveness to privacy.
(B) Resistance to exposure of retinas to IR rays.
(C) Hackers implement exact copy of your biometrics.
3D PASSWORD
The 3D password is a multifactor authentication scheme
that combine KNOWLEDGE BASED + TOKEN BASED
+ BIOMETRICS in one authentication system.
It presents a virtual environment containing various virtual
objects.
It is simply the combination and sequence of user
interactions that occur in the 3D environment.
The user walks through the environment and interacts with
the objects.
More customizable and very interesting way of
authentication.
VIRTUAL ENVIRONMENT
A virtual environment is a computer – based simulated
environment.
The 3D virtual environment consists of many items and objects.
It is created inside a 2D screen and is a real time scenario.
Each item has different responses to action.
The use actions, interactions and inputs towards the objects or
toward the 3D virtual environment creates the user’s 3D
password.
Communication between users can range from text, graphical
icons, visual gesture, sound, and rarely forms using touch, voice
command, and balance senses.
3D virtual environment affects the usability, effectiveness and
acceptability of a 3D password system.
3D environment reflects the administration needs and security
requirements.
virtual object can be any object
we encounter in real life such as
A computer on which user type.
An ATM machine that requires a token (ATM card).
A fingerprint can be switched on/off.
A paper or white board on which user can write.
A light that can be switched on/off.
A television.
A radio.
A car that can driven.
A graphical password scheme.
The action towards an object that exists in location (x1,y1,z1) is different from
action toward an another object at (x2,y2,z2).
To perform the legitimate user 3D password the user must follow the same
scenario object by the legitimate user .
This means interacting with the same object that reside at exact location and
perform the exact actions in the proper sequence.
1. TIME COMPLEXITY :
Let us assume A is the virtual 3D environment plotting
and B is algorithmic programming. Then, Time complexity=
Am + Bn where `m` is time required to communicate with
system, and `n` is time required to process each algorithm in
3D environment
2. SPACE COMPLEXITY :
System include 3D virtual environment, so that each point in
environment will having 3 co-ordinate value.
Any point from 3D virtual environment id represented in the
form of (x , y, z). X , Y & Z are the coordinate
value stored for particular point
(a) P class : A decision problem is in P there is a
known polynomial-time algorithm to get that andanswer.
(b) NP-hard class : Decision problem is in NP if there is a
known polynomial-time algorithm for a non-deterministic machine to
get the answer.
(c) NP complete class : NP-complete if you can prove that (1)
it`s in NP and (2) show that it`s poly-time reducible to a problem
already known to be NP-complete.
Let us consider a 3D virtual environment space of size G x G x G.
the 3D environment space is represented by yhe coordinates (x , y ,
z) E [1,…,G] x [1,…,G] x [1,…,G]
The object are distributed in the 3D virtual environment with
unique (x , y , z) coordinates. We assume that the user can navigate
into the 3D virtual environment and interact with the object using
any input device such as a mouse , keyboard , fingerprint scanner ,
iris scanner , card reader , microphones , stylus , etc.
Let us consider a user who navigates through the 3D virtual
environment consist and the user turns around the door location in
(1,2,3,) and open it. Then, the position (4,5,6,) , and the user types
“ABC”. The initial representation of user actions in the 3D virtual
environment can be recorded as follows: (1,2,3) action = open the
office door (4,5,6) action = typing “A” (4,5,6) action=typing “c”
Typical textual password enter users name performing graphical password
moving inside virtual 3D environment performing biometrics changing item
status verifying typing a letter or a number click access not granted logical
password access granted specific key password click on a graphical
password item specific key pressed biometric item is checked moved
object , turn ON/OFF.
C++.
Java and java3D .
Net languages such as C# or visual basics.
Parrot virtual machine.
OPENGL LIBRARY :
(i) Uses both graphics and CAD programs.
(ii) Supported on windows, Macintosh, UNIX workstation, PCs, X-Box,
Linux, etc.
GLUT:
(i) Library for using C++ and OpenGL
Direct 3D:
(i) Support only on Microsoft windows platforms X-box