21
3D Graphical Password BY DEVI GOMATHI. A & ABINAYA. S PRE-FINAL YEAR DEPT. OF COMPUTER SCIENCE & ENGINEERING KARPAGAM COLLEGE OF ENGINEERING

3d password

Embed Size (px)

Citation preview

Page 1: 3d password

3D Graphical Password

BY DEVI GOMATHI. A

& ABINAYA. S

PRE-FINAL YEAR

DEPT. OF COMPUTER SCIENCE &

ENGINEERING

KARPAGAM COLLEGE OF ENGINEERING

Page 2: 3d password

Authentication

Authentication is a process of validating who you are to whom you claimed to be.

General authentication techniques are as follows:

1.Knowledge Based (What you know)

2.Token Based(what you have)

3.Biometrics(what you are)

Page 3: 3d password

Three Basic Identification Methods of password

Possession(“something I have”)

•Keys •Passport •Smart Card

Knowledge(“Something I

know”)

•Password • Pin

Biometrics(“something I

am”)

•Face•Fingerprints•Iris

Page 4: 3d password

• Password is basically an encryption

algorithms.

It is 8-15 character or slightly more than that.

Mostly textual passwords nowadays are kept which are very simple, some taken from dictionary, pet’s name or their favorite actor actress etc..

PASSWORD

Page 5: 3d password

Passphrase

It’s the enhance version of password.

It is a combination of words or simply collection of password in proper sequence.

It contains any well known thought also.

Length of passphrase is about 30-50 character or more than that also.

Page 6: 3d password

BIOMETRICS

Page 7: 3d password

Biometrics

•Refer to a broad range of

technologies.

•Automate the identification

or verification of an individual.

Page 8: 3d password

Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed

such tests and he could crack 10-15 passwords per day.

Guessable!

PASSWORD

DRAWBACKS

Page 9: 3d password

PASSPHRASE

•Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.

Page 10: 3d password

BIOMETRICS

Suppose you select your fingerprint as a biometrics..but what to do when you have crack or wound in your finger.And now a days some hackers even implement exact copy of your biometrics also…. Intrusiveness to privacy Biometrics cannot be revoked Resistance to exposure of

retinas to IR rays

Page 11: 3d password

The 3D passwords which are more customizable, and very interesting way of authentication.

•A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICs in one authentication system.

3D PASSWORD

Page 12: 3d password

Measures of security

This is achieved through interacting only with the objects that acquire

information that the user is comfortable in providing.

It becomes much more difficult for the attacker to guess the user’s 3-D

password.

Page 13: 3d password

Snapshot of a proof - of - concept virtual

art gallery , which contains 36 pictures and six computers

Page 14: 3d password

3D Virtual Environment

•3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system.

• 3-D environment reflects the administration needs and the security requirements.

3D Virtual Environment

Page 15: 3d password

PRINCIPLE IMPLIED

The action towards an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different

A similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ).

Therefore to perform the legitimate 3D password,user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence

Page 16: 3d password

Advantages

FlexibilityStrengthEase to

MemorizeRespect of

Privacy

Page 17: 3d password

Applications

The 3D password’s main application domains are protecting critical systems and resources.

Critical Servers

Nuclear Reactors & military Facilities

Airplanes and missile Guiding

Page 18: 3d password

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc.

A small virtual environment can be used in the following systems like-

Page 19: 3d password

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

Page 20: 3d password

•The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.

•It is difficult to crack ,because it has no fixed number of steps and a particular procedure.

•Added with biometrics and token verification this schema becomes almost unbreakable.

Conclusion

Page 21: 3d password

Thank you