3D PASSWORD
Short Description
Download 3D PASSWORD...
Description
GUIDE: Ms.Sumithra V. Dept.of ISE JVIT
3D-PASSWORD
ABSTRACT •
•
Current systems suffers from many weakness
Textual : easy to hack
Tokens : theft
Graphical : less password space
Biometric systems : users resist
3D password system overcomes all the above weakness.
3D-PASSWORD
INTRODUCTION 3D PASSWORD : WHAT IS IT ?
It is a multifactor authentication scheme, where user navigates and interacts with various objects. Authentication:
It is the act of establishing or confirming something as authentic, that is, that claims made by or about the subject are true.
3D-PASSWORD
INTRODUCTION Types of authentication: Knowledge Token
based (what you know)
based (what you have)
Biometrics
(what you are )
Authentication Methods:
The are two types of techniques for doing this. First is comparing the attributes of the object itself to know its srcin.
Second type relies on documentation or other external affirmations.
3D-PASSWORD
REQUIREMENTS: •
Should be combination of recall based, recognition based
•
etc. Freedom to select combination of the above schemes.
•
Easy to remember & change.
•
Difficult to share.
Fig: 3.1: State diagram of the 3D Password
3D-PASSWORD
Fig: 3.2: Snapshot of a proof-of-concept 3-D virtual environment,
3D-PASSWORD
: •
Space of size G*G*G, (x,y,z) all in [1,....,G].
•
For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button.
3D-PASSWORD
·
(10, 24, 91) Action = Open the office door;
·
(10, 24, 91) Action = Close the office door;
·
(4, 34, 18) Action = Typing, “F”;
·
“
”
·
(4, 34, 18) Action = Typing, A ; (4, 34, 18) Action = Typing, “L”;
·
(4, 34, 18) Action = Typing, “C”;
·
(4, 34, 18) Action = Typing, “O”;
·
(4, 34, 18) Action = Typing, “N”;
·
(10, 24, 80) Action = Pick up the pen;
·
(1, 18, 80) Action = Drawing, point = (330, 130).
3D-PASSWORD
Fig: 3.3: Snapshot of an experimental 3-D virtual environment
3D-PASSWORD
•
Critical servers
•
Nuclear and military services
•
Airplanes and jet fighters
•
ATM
•
Internet
3D-PASSWORD
Easiness
to memorize
Flexibility
Strength Secrets Provide The
those are not easy to write down on paper. secrets that can be easily revoked or changed .
scheme secrets should be difficult to share with others.
3D-PASSWORD
ATTACKS AND COUNTER MEASURES
Brute Force Attack
Well
Studied Attack
Shoulder Surfing Attack
Timing
Attack
3D-PASSWORD
CONCLUSION •
Combines various authentication schemes.
•
Uses existing scheme or upcoming scheme.
• •
Environment – easy and secure. User's preference and requirements are valued.
•
The design of the 3D virtual environment, the selection of objects inside the environment and the object’s type reflect the resulted password space.
3D-PASSWORD
REFERENCES •
A novel 3D graphical password schema- Fawaz A Alsulaiman and Abdulmotaleb El Saddik.
•
Denial V Klien Foiling the cracker – A survey of and improvement to pasword security.
•
Greg E Blonder Graphical password United States Patent 5559961.
View more...
Comments