3D PASSWORD

May 27, 2018 | Author: Neha Vinod Holamoge | Category: Password, Authentication, Security Engineering, Secure Communication, Cybercrime
Share Embed Donate


Short Description

Download 3D PASSWORD...

Description

GUIDE: Ms.Sumithra V. Dept.of ISE JVIT

3D-PASSWORD

ABSTRACT •



Current systems suffers from many weakness 

Textual : easy to hack



Tokens : theft



Graphical : less password space



Biometric systems : users resist

3D password system overcomes all the above weakness.

3D-PASSWORD

INTRODUCTION 3D PASSWORD : WHAT IS IT ?

It is a multifactor authentication scheme, where user navigates and interacts with various objects. Authentication:

It is the act of establishing or confirming something as authentic, that is, that claims made by or about the subject are true.

3D-PASSWORD

INTRODUCTION Types of authentication:  Knowledge  Token

based (what you know)

based (what you have)

 Biometrics

(what you are )

Authentication Methods:

The are two types of techniques for doing this.  First is comparing the attributes of the object itself to know its srcin.

 Second type relies on documentation or other external affirmations.

3D-PASSWORD

REQUIREMENTS: •

Should be combination of recall based, recognition based



etc. Freedom to select combination of the above schemes.



Easy to remember & change.



Difficult to share.

Fig: 3.1: State diagram of the 3D Password

3D-PASSWORD

Fig: 3.2: Snapshot of a proof-of-concept 3-D virtual environment,

3D-PASSWORD

: •

Space of size G*G*G, (x,y,z) all in [1,....,G].



For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button.

3D-PASSWORD

·

(10, 24, 91) Action = Open the office door;

·

(10, 24, 91) Action = Close the office door;

·

(4, 34, 18) Action = Typing, “F”;

·





·

(4, 34, 18) Action = Typing, A ; (4, 34, 18) Action = Typing, “L”;

·

(4, 34, 18) Action = Typing, “C”;

·

(4, 34, 18) Action = Typing, “O”;

·

(4, 34, 18) Action = Typing, “N”;

·

(10, 24, 80) Action = Pick up the pen;

·

(1, 18, 80) Action = Drawing, point = (330, 130).

3D-PASSWORD

Fig: 3.3: Snapshot of an experimental 3-D virtual environment

3D-PASSWORD



Critical servers



Nuclear and military services



Airplanes and jet fighters



ATM



Internet

3D-PASSWORD

Easiness 

to memorize

Flexibility

Strength Secrets Provide The

those are not easy to write down on paper. secrets that can be easily revoked or changed .

scheme secrets should be difficult to share with others.

3D-PASSWORD

ATTACKS AND COUNTER MEASURES

Brute Force Attack

Well

Studied Attack

Shoulder Surfing Attack

Timing

Attack

3D-PASSWORD

CONCLUSION •

Combines various authentication schemes.



Uses existing scheme or upcoming scheme.

• •

Environment – easy and secure. User's preference and requirements are valued.



The design of the 3D virtual environment, the selection of objects inside the environment and the object’s type reflect the resulted password space.

3D-PASSWORD

REFERENCES •

A novel 3D graphical password schema- Fawaz A Alsulaiman and Abdulmotaleb El Saddik.



Denial V Klien Foiling the cracker – A survey of and improvement to pasword security.



Greg E Blonder Graphical password United States Patent 5559961.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF