0% found this document useful (0 votes)
18 views

Keywords:: Authentication, Biometrics, 3D Password

The document discusses authentication systems and proposes a new 3D password approach. Current authentication methods are either too lax or too strict. New technologies have made it easy to hack passwords, so algorithms have been developed to randomly generate secret keys with a low probability of duplication. However, existing authentication types like text passwords and biometric scanning can still be compromised, so a 3D password is introduced as a more secure alternative.

Uploaded by

AmmuKutty
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Keywords:: Authentication, Biometrics, 3D Password

The document discusses authentication systems and proposes a new 3D password approach. Current authentication methods are either too lax or too strict. New technologies have made it easy to hack passwords, so algorithms have been developed to randomly generate secret keys with a low probability of duplication. However, existing authentication types like text passwords and biometric scanning can still be compromised, so a 3D password is introduced as a more secure alternative.

Uploaded by

AmmuKutty
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

KEYWORDS: Authentication, Biometrics, 3D password,

INTRODUCTION
The authentication system which we are using is mainly very
light or very strict. Since many years it has become an
interesting approach. With the development in means of
technology, it has become very easy for 'others' to hack
someones password. Therefore many algorithms have come
up each with an interesting approach toward calculation of a
secret key. The algorithms are such based to pick a random
number in the range of 10^6 and therefore the possibilities of
the sane number coming is rare. We are provided with many
password types such as textual passwords, biometric scanning, tokens or
cards (such as an ATM) etc. But there a

You might also like