15
PAGE 1 Company Proprietary and Confidential Company Proprietary and Confidential 3D - Password Scheme For more secure authentication Sk. Saddam Ahmed M.TECH in Computer Science & Engineering Class Roll No : 02 Session : 2014-15 Semester : 2 BY

3d password 23 mar 14

Embed Size (px)

DESCRIPTION

3D Password Scheme

Citation preview

Page 1: 3d password 23 mar 14

PAGE 1

Company Proprietary and Confidential

Company Proprietary and Confidential

3D - PasswordScheme

For more secure authentication

Sk. Saddam AhmedM.TECH in Computer Science & EngineeringClass Roll No : 02Session : 2014-15Semester : 2

BY

Page 2: 3d password 23 mar 14

PAGE 2

Company Proprietary and Confidential

Company Proprietary and Confidential

INDEX

• Authentication Slide 3• Common Authentication Techniques Slide 4• Drawbacks of Common Authentication Techniques Slide 5• 3D Password Scheme with Example Slide

6-7• 3D Password Scheme Selection and Inputs Slide 8• Formal View of 3D Password Scheme Slide 9• Snapshot of the concept of 3d-Virtual Environment Slide

10• 3D Virtual Environment Design Guidelines Slide

11• 3D Password Advantages and Disadvantages Slide 12• Attacks on 3D Password Slide

13• 3D Password Application Areas Slide 14

Slide NoPresentation Topics

Page 3: 3d password 23 mar 14

PAGE 3

Company Proprietary and Confidential

Company Proprietary and Confidential

Authentication• Authentication is a process of validating who are you to whom you claimed

to be.• Human authentication techniques are as follows:

1. Knowledge Base (What you know)

2. Token Based(what you have)

3. Biometrics(what you are)

Human Authentication

Techniques

Knowledge Base( What you know )

Token Based( What you have )

Biometrics( What you are)

Textual Password

Graphical Password

ATM Card

Keys

ID Cards

Fingerprints,Palmprint

Hand Geometry

Face,iris,voice,retina

Human Authentication Techniques

Page 4: 3d password 23 mar 14

PAGE 4

Company Proprietary and Confidential

Company Proprietary and Confidential

Common Authentication Techniques used in computer world

1. Textual Passwords(Recall Based)-:Recall what you have created before.

2. Graphical Passwords: (Recall Based + Recognition Based).

3. Token Based : ATM Cards, Keys , ID Cards

4. Biometric Passwords : fingerprints, palm prints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition

Page 5: 3d password 23 mar 14

PAGE 5

Company Proprietary and Confidential

Company Proprietary and Confidential

Drawbacks of Common Authentication Techniques

Textual Password:• Textual Passwords should be easy to remember at the same time hard to guess.• Full password space for 8 characters consisting of both numbers and characters is at most

2 X 10¹⁴.• From an research 25% of the passwords out of 15,000 users can guessed correctly by

using brute force dictionary.

Graphical Password :• Graphical passwords can be easily recorded but some schemes take a long time to perform.

Token Password: Most unsecured one, if stolen can breech through any security levels.

Biometric Password:• One main drawback of applying biometric is its intrusiveness upon a user’s personal

characteristic .• Retina biometrical recognition schemes require the user to willingly subject their eyes to a low-

intensity infrared light so specified environment is required.• In addition, most biometric systems require a special scanning device to authenticate users,

which is not applicable for remote and Internet users.

Page 6: 3d password 23 mar 14

PAGE 6

Company Proprietary and Confidential

Company Proprietary and Confidential

3D PASSWORD SCHEME The 3D Password scheme is a new authentication scheme that combine

RECOGNITION

+ RECALL

+ TOKENS

+ BIOMETRIC

In one authentication system

The 3D password presents a virtual environment containing various virtual objects.

The user walks through the environment and interacts with the objects .

The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment.

Page 7: 3d password 23 mar 14

PAGE 7

Company Proprietary and Confidential

Company Proprietary and Confidential

Example of 3D-Password

Page 8: 3d password 23 mar 14

PAGE 8

Company Proprietary and Confidential

Company Proprietary and Confidential

3D Password selection and Inputs

Virtual objects can be any object we encounter in real life:

• A computer with which the user can type; • A fingerprint reader that requires the user’s fingerprint; • A biometrical recognition device; • A paper or a white board that a user can write, sign, or Draw on; • An automated teller machine (ATM) that requests a token; • A light that can be switched on/off; • A television or radio where channels can be selected; • A staple that can be punched; • A car that can be driven; • A book that can be moved from one place to another; • Any graphical password scheme; • Any real-life object; • Any upcoming authentication scheme

Page 9: 3d password 23 mar 14

PAGE 9

Company Proprietary and Confidential

Company Proprietary and Confidential

For Example :

Let us assume the user enters a virtual office then performs the following action: (10,24,91) Action=Open office door (10,24,91) Action=Close office door (4,34,18) Action=Typing,”C” (4,34,18) Action=Typing,”O” (4,34,18)Action=Typing,”N” (10,24,80)Action=Pick up the pen (1,18,80)Action=Draw point=(330,130)

3D Password selection and Inputs ( Formal View )

Let us consider a 3-D virtual environment space of size G x G x G. The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . ,

G] x [1, . . . , G] x [1, . . . , G]. The objects are distributed in the 3-D virtual environment with unique (x, y, z)

coordinates. We assume that the user can navigate into the 3-D virtual environment and interact

with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone.

Page 10: 3d password 23 mar 14

PAGE 10

Company Proprietary and Confidential

Company Proprietary and Confidential

(a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the user’s 3-D password. (b) Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers

(a) (b)

Snapshot of the concept of 3d-Virtual Environment

Page 11: 3d password 23 mar 14

PAGE 11

Company Proprietary and Confidential

Company Proprietary and Confidential

3-D Virtual Environment Design Guidelines

State diagram of a possible 3-D password application

Design Guidelines 1. Real-life similarity.2. Object uniqueness and distinction.3. Three-dimensional virtual

environment.4. Number of objects (items) and their

types .5. System importance.

Page 12: 3d password 23 mar 14

PAGE 12

Company Proprietary and Confidential

Company Proprietary and Confidential

3D Passwords Advantages & Disadvantages

Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.

Strength: This scenario provides almost unlimited passwords possibility. Ease to Memorize: can be remembered in the form of short story. Respect of Privacy: Organizers can select authentication schemes that

respect users privacy.

Difficult for blind people to use this technology. Requires sophisticated computers technology expensive. A lot of program coding is required.

Advantages

Disadvantages

Page 13: 3d password 23 mar 14

PAGE 13

Company Proprietary and Confidential

Company Proprietary and Confidential

Attacks and Countermeasures

• Brute Force Attack.• Well Studied Attack• Shoulder Surfing Attacks• Timing Attack

Page 14: 3d password 23 mar 14

PAGE 14

Company Proprietary and Confidential

Company Proprietary and Confidential

3D Password Application Areas

• Critical Servers• Nuclear and military Stations • Airplanes and Jet Fighters• ATMs, Desktop and Laptop Logins, Web

Authentication

Page 15: 3d password 23 mar 14

PAGE 15

Company Proprietary and Confidential

Company Proprietary and Confidential

Thank You