440 likes | 914 Views
password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements.
E N D
3D PASSWORD FOR SECURE AUTHENTICATION ASHA KUMARI MONA THAKUR NEHA THAKUR POOJA KUMARI SHALINI KUMARI
CONTENTS • Password • Advantages and disadvantages • Introduction • 3d password • Functionalities Required • Mathematical concept • Working • Attacks and counter measure • Applications • 4d password differentiator • Future work
PASSWORD:- • A password is a secret word used for user authentication to prove identity or access approval to gain access to a resource. • In modern times, username and passwords are commonly used by people during a login process that controls access to protected computer operating systems, mobiles phones, cable TV decoders, automated teller machines (ATMs), etc.
TYPES OF PASSWORD:- • Random password • Common password
RANDOM PASSWORD • Random password:-An easy to remember password, which is based on a pass-phrase that is important to you, the user. • This phrase can be a set of words taken from a book, a song, a quotation, a statement, or anything else that you always easily remember. • No one else should ever think about attributing it to you. • E.G: pass-phrase: “four score and seven years ago our fathers” • Password: “Fs&7yA0F”.
COMMON PASSWORD • Easy to remember password, which is based on a combination of two unrelated words with a mixed case of letters, numbers and symbols. • E.G: pass-words: “funny bone” • Password: “phnyb0ne”.
ADVANTAGES AND DISADVANTAGES • Can only be accessed by the owner of the site. • A password protected website. • Password may protect files, folders and documents. • Disadvantages:- • If you don’t have strong server security, someone can break into the database and read the password.
INTRODUCTION • Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. • 3D password is a multifactor authentication scheme. • To be authenticated, were 3D virtual environment. • Combines recognition, recall, token, and biometrics-based systems. • Users choice to select the type of authentication technique.
3D PASSWORD • It is a multi factor authentication scheme. • It is not only based on recall and recognition. • It is the combination of recall, recognition, biometrics as well as token-based authentication schemes. • It is also known as 3 dimensional virtual environment. • It contain any virtual object.
VIRTUAL OBJECTS ARE: • A computer with which user can type. • A fingerprint reader that requires the user’s fingerprint. • An ATM machine that requires a smart card and PIN. • A light that can be switched ON/OFF. • A television or radio where channels can be selected. • A car that can be driven. • A paper or a whiteboard that a user can write, sign, or draw on.
AUTHENTICATION SCHEMES • KNOWLEDGE BASED • Recall based • Recognition based • TOKEN BASED e.g. : smart card
BIOMETRIC BASED • Fingerprint ,palm prints ,hand geometry ,face recognition • GRAPHICAL PASSWORDS • Picture based.
FUNCTIONALITIES REQUIRED • New scheme should combine the existing authentication schemes • Freedom to select the type of authentication technique. • Should provide secrets that are easy to remember ,difficult to guess.
MATHEMATICAL CONCEPT • Time complexity • Space complexity
WORKING OF 3D PASSWORD • Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing, “A”; (4,34,18) Action= Typing, “N”; (4,34,18) Action= Typing, “G”; (4,34,18) Action= Typing, “E”; (4,34,18) Action= Typing, “L”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
Virtual Computer where user typing a textual password as a part of user’s 3D Password
ATTACKS AND COUNTER MEASURE • Time attacks. • Brute force attacks. • Well studied attacks. • Key logger. • Shoulder suffering attacks.
APPLICATION • Nuclear and military areas. • Air plans and jetfighters. • Critical server. • Other areas.
4D PASSWORD DIFFERENTIATOR • Flexibility: allow multifactor authentication. • Biometrics and textual passwords can be embedded in 4d password. • Strength: provides unlimited password possibilities. • Easy to remember: can be remembered in the form of short story. • Privacy: organizer can select authentication schemes that respect the user’s privacy.
FUTURE WORK • Use different password for different accounts. • Use 3d password. • The 3d password will protect against many brute force attacks. • A brute password cracker will simply attempt to guess your password. • Use longer password, harder to crack. • Brute force attack known as a dictionary attack.
CONCLUSION • Commonly used authentication schemes are vulnerable to attacks. • 3D Password is a multifactor authentication scheme. • User’s choice and decision to construct the desired and preferred 3D password.