0% found this document useful (0 votes)
62 views

Secured Authentication Using 3D Password by Applying Ultimate Planar Algorithm

Uploaded by

neha
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Secured Authentication Using 3D Password by Applying Ultimate Planar Algorithm

Uploaded by

neha
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 445

ISSN 2229-5518

Secured Authentication using 3D Password by


Applying Ultimate Planar Algorithm
P.K.Dhanya, M.Keerthiga, S.Dinakar

Abstract— Providing Authentication to any system leads to provide more security to that system. There are many authentication
techniques are available, Such as textual password, Graphical password, etc. but each of this individually having some limitations &
drawbacks. To overcome the drawbacks of previously existing authentication technique, A new improved authentication technique is used,
This authentication Scheme is called as 3D password. The 3D password is multi-password & multi-factor authentication system as it uses a
various authentication techniques such As textual password, Graphical password etc.In this paper we have introduced our contribution
towards 3D Password to become more secure & more user friendly to users of all categories. This paper also explaining about what is 3D
password?, working of 3D password scheme, some mathematical concept related to 3D password, applications of scheme etc. all these
concepts are briefly introduced & explained in this paper as per sectionwise.Indexterms–Authentication, Multipassword ,Ultimate Planar
algorithm, Textual Passwords,3-D Password, 3-D Virtual Environment.

Index Terms— Secure Password Authentication, Simple Mail Transfer Protocol, Post Office Protocol, Authentication, Multi-password,
Textual Passwords, Ultimate planar algorithm, 3-D Password, 3-D Virtual Environment.

——————————  ——————————

1 INTRODUCTION

S ecure Password Authentication (SPA) is a proprietary Ideally there are two types of Authentication schemes are

IJSER
Microsoft protocol used to authenticate Microsoft email available according to nature of scheme & techniques used,
clients with an electronic mail server when using the those types are
Simple Mail Transfer Protocol (SMTP), Post Office Protocol 1) Recall Based:
(POP), or Internet Message Access Protocol (IMAP). The pro-
In this authentication tech. user need to recall or re-
tocol was based on the Integrated Windows Authentication
(NTLM) authentication scheme. Authentication is one of the member his/her password which is created before. Knowledge
most important security service provided to system by the based authentication is a part of this technique, E.g. Textual
different authentication schemes or algorithms. To protect any password, graphical password etc. this technique is commonly
system authentication must be provided, so that only author- used all over the world where security needed.
ized persons can have right to use or handle that system & 2) Recognition Based:
data related to that system securely. There are many authenti- In this user need to identify, recognize password created be-
cation algorithms are available some are effective & secure but fore. Recognition based authentication can be used in graph-
having some drawback. Previously there are many authentica-
ical password. Generally this technique is not use much more
tion techniques were introduced such as graphical password,
as Recall based is used. Still both recall based & recognition
text password, Biometric authentication, etc.
Generally there are four types of authentication techniques are based authentication techniques having some drawbacks &
available such as: limitations when they are used separately or used single au-
Knowledge based: means what you know. Textual password thentication scheme at a time. To overcome these drawbacks &
is the best example of this authentication scheme. limitations of previously existing authentication schemes. We
Token based: means what you have. This includes Credit have introduced a new authentication scheme which is based
cards, ATM cards, etc as an example. on previously existing schemes. This authentication scheme is
Biometrics: means what you are. Includes Thumb impression, based on combination of passwords called as “3D Password”.
etc. Which is a multifactor scheme uses combination of above dis-
Recognition Based: means what you recognize. Includes cussed scheme as well as biometric & many other schemes. All
graphical password, iris recognition, face recognition, etc. these schemes are implemented in virtual 3D environment
while creating 3d Password. Where this environment contain
• P.K.Dhanya is pursing CSE,SNS College of Technolo- various virtual objects through which user interacts with. The
gy,India,[email protected]. interaction with 3D environment changes as per user changes.
• M.Keerthiga is pursing CSE,SNS College of Technolo- The 3-D password is constructed by observing the actions and
gy,India,[email protected],9994412215. interactions of the user and by observing the sequences of
• S.Dinagar is working as Assistant Professor ,SNS College
such actions
of Technology,India.

IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 446
ISSN 2229-5518

biometric scheme because biometric having some major


1.1 Authentication drawbacks (like h/w cost is more) So that we have not inclued
Authentication is a process of validating who are you to biometric authentication in our 3D password scheme. Be-
whom you claimed to be or a process of identifying an cause biometric authentication is efficient over shoulder surf-
individual, usually based on a username and password. ing attacks. But other attacks are venerable & easy on bio-
metric authentication. Also inclusion of biometric may leads to
Human Authentication Techniques are as follows: increasing the cost of scheme & more hardware parts needed.
1. Knowledge Base (What you know)
2. Token Based(what you have)
3. Biometrics(what you are)
4. Recognition Based(What you recognise)

Computer Authentication Techniques are as follows:


1. Textual Passwords (Recall Based)-Recall what you Fig 3.2 (a) snapshot of Art Gallery
have created before.
2. Graphical Passwords (Recall Based + Recognition
Based)
3. Biometric schemes (fingerprints, voice recognition
etc)
Fig 3.2 (b) snapshot of weather forecasting office.

IJSER
2 EXISTING SYSTEM
This shows some snapshots of 3D Virtual Environment[1] of
In our existing system textual passwords or recognisation are
different real time scenarios created in virtual environment
used.They can be easily hacked by the hacker with permuta-
like art gallery, office, and study room, etc. These virtual envi-
tions and combinatation.Still both recall based & recognition
ronments are interactive virtual environment. Because user
based authentication techniques having some drawbacks &
can interact with these environment & creates his/her own 3D
limitations when they are used separately.
password easily[4].

3 PROPOSED SYSTEM 3.1 Objective of Proposed System


Proposed authentication scheme is combination of many other 1. To provide more secure authentication technique than
authentication schemes together. 3D password is combination existing one.
of both recall-based (i.e. textual password, etc) & recognition 2. To design & develop more user friendly & easier au-
based (i.e. graphical password, biometrics, etc). so that 3D thentication scheme and giving user to freedom of se-
password is multifactor & multi password authentication lecting more than one password scheme as single
scheme. Refer fig.3.1 system.
3. To overcome the drawbacks & limitations of previ-
ously existing systems (textual password, graphical
password.etc).
4. New scheme should be combination of recall, recogni-
tion, biometrics, and token based authentication
schemes.

4 3D PASSWORD –ARCHITECTURAL STUDY


Fig : 3.1 3D password as multi-factor & Multi-password This section tell about that how to create 3D password & what
Authentication Scheme. are different schemes used to form a complete 3d password..
3D password is multi-factor & multi password authentication
For authentication with 3D password a new virtual environ- scheme. So that many password schemes like textual pass-
ment is introduced called as 3D virtual environment where word, graphical password, biometric, etc. password schemes
user navigate , moving in 3D virtual environment to create a can be used as a part of 3D password. Choosing of different
password which is based on both the schemes. We don‘t use schemes are based on category of user who are going to use
this scheme to their system.
IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 447
ISSN 2229-5518
quest”. Next time when user want to access his account
4.1 Working of 3D Password Scheme then he has to select all the object which he has selected
In 3D password user have to First Authenticate with simple at the time of creating password with proper sequence.
textual password (I.e. user need to provide user name & This sequence is then compared with coordinates which are
password). Once authentication successful then user moves in stored in file. If authentication successful thereafter access is
3D virtual environment, Thereafter a computer with keyboard given to authorized user. 3D password working algorithm is
will be seen on screen. On that screen user have to enter pass- shown in fig.4.1 which will give the flowchart for 3D pass-
word (textual).which is stored in a simple text file in the form word creation & authentication process.
of encrypted co-ordinates(x1, y1, z1). After successfully com-
pletion of this authentication, Then user automatically enter 4.2 Point Selection using Ultimate Planar Algorithm
into an art gallery, where he/she has to select multiple point in Before seeing about reversal of divide and conquer algorithm
that gallery or he can do some action in that environment like (ULTIMATE PLANAR ) divide and conquer algorithm ad-
switching button on/off or perform action associated with any heree the following strategy. First break the problem into sub-
object like opening door, etc. problem and then recursively solve the problem.Finally com-
bine the solution of subproblems to get the actual solu-
tion.
In our algorithm
1. First divide the problem into subproblems.
2. Determine how the problem can be solved (with-
out actual combining)
3. Then all the subproblems are solved recursively[5]

IJSER
4.3 3D Virtual Environment
In this multi-factor authentication scheme the basic building
block used is 3D virtual environment. 3D virtual environment
is created inside a 2D screen, refer Fig 4.2 3D environment is a
real time scenario seen by peoples in day to day life which is
created virtually in 3D virtual environment[1]. We can use any
real time object as a environment like any room or village but
for simplicity we suggest to use small environment like room.

Fig 4.1 Working Of 3D Password


Fig 4.2 Virtual Environment under 2D screen
The sequence in which user has clicked (i.e. selecting objects)
that sequence of points are stored in text file in the en- For selecting the sequence of objects (i.e. points) we have used
crypted form. In this way the password is set for that partic- a very simple, easy & efficient algorithm called as convex hull
ular user. For selection of points we have used 3d algorithm. The 3d ultimate planar algorithm is used. & also
Ultimate planar algorithm which is based on convex hull the points selected are stored in the form of 3d co-ordinate(x,
algorithm from design & analysis of algorithms. Instead of y, z) in a simple text file. Some design guidelines related to 3d
other algorithm like quick hull it will have worse case op environment such

timal time complexity, it is the reverse of divide and 1. Virtual environment selected in such a way so that it
conquer technique which is called as “marriage before con- is similar to real life object.
IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 448
ISSN 2229-5518
2. Every object is unique & distinct from other. number of actions & interactions, the size of 3d virtual
3. Virtual environment size should be considered. environment.
2. Cost required to attack: as 3d password scheme re-
quires 3D virtual environment & cost of creating such
5 MATHEMATICAL CONCEPTS RELATED TO
a environment is very high.
3D PASSWORD SCHEME
3D password is a authentication technique which can be im- 6.3 Well-Studied Attacks
plemented in 3D virtual environment. As every project having In this attack attacker has to study whole password scheme.
problem statement which is relation with mathematical con- After studied about scheme the attacker tries combination of
cepts like feasibility study, complexities, set theory etc. this different attacks on scheme. As 3d password scheme is multi-
section of paper will explain almost all the mathematical con- factor & multi-password authentication scheme, attacker fail
cepts applied while creating 3D password schemes. to studied whole scheme. this attacks also not much effective
against 3D password scheme.
5.1 Time Complexity
For calculating the time complexity of 3D password scheme 6.4 Key Logger
let‘s assume A be the virtual 3d environment plotting, & B is In this attack attacker install as software called key logger on
algorithmic processing. From this data available we have system where authentication scheme is used. This software
come to time complexity of system. Equation (1) gives the time stores text entered through keyboard & those text are stored in
complexity of proposed system. text file. In this way this attacks is more effective & useful for
Time Complexity = Am + Bn ------------------(1) only textual password, but as 3D password is multi password
Where m is time required to communicate with system, & n is authentication scheme[3]. So that this kind of attacks are not
time required to process each algorithm in 3d environment.

IJSER
much effective in this case.

5.2 Space Complexity 6.5 Shoulder Surfing Attacks


This system include 3D virtual environment, so that each Attacker uses camera for capturing & recording of 3D pass-
point in this environment will having 3 co-ordinate values. word. This attack is more effective than any other attacks on
Any point from 3D virtual environment is represented in the 3D password. So that 3D password[3] must be performed in a
form of (X, Y, Z).Where X, Y & Z are the coordinate values secure place where this attack can‘t be performed. Shoulder
stored for particular point. We are storing three co-ordinate surfing attacks is still effective & easily possible against 3D
values of each point such as (x1, y1, z1). There for space com- password.
plexity of proposed system is n3.
6.6 Advantage of 3D Pasword Technique
6 3D PASSWORD SECURE AUTHENTICATION SCHEME 1. 3D Password scheme is combination of re-call based,
ATTACKS & COUNTER MEASURES recognized based, Biometrics .etc into single authenti-
As mentioned earlier 3D password is most secure authentica- cation technique.
tion. We will see different kinds of attacks & how 3D pass- 2. Due to use of multiple schemes into one scheme
word scheme is more secure against different attacks. password space is increased to great extend.
3. More secure authentication scheme over currently
6.1 Timing Attacks available schemes.
This attack is based on how much time required completing
successful sign-in using 3D password scheme. Timing attacks 6.7 Disadvantage of 3D Pasword Technique
can be very much effective while Authentication scheme is not 1. Time and memory requirement is large.
well designed. But, as our 3D password scheme is designed 2. Shoulder-suffering attack is still can affect the
more securely, these kinds of attacks are not easily possible on schema.
3D Password & also not much effective as well.
3. More expensive as cost required is more than
6.2 Brute Force Attacks other schemes.
In This kind of attacks the attacker has to try n number of pos-
sibilities of 3D Password. As these attacks considers following 6.8 Application of 3D Pasword Technique
two points. As 3D password authentication scheme is more useful & more
1. Required time to login: as in 3d password time re- secure than any other authentication schemas, 3D password[3]
quired for successful login varies & is depend on

IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 449
ISSN 2229-5518
can be used in wide area where more security is needed to 8 REFERENCES
system. Some of areas are as follows: [1] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D
Graphical Password Schema, IEEE International Conference on Vir-
6.8.1 Networking tual Environments, Human-Computer Interfaces, and Measurement
Systems, July 2006.
Networking involves many areas of computer networks like
client-server architecture, critical servers, etc. To provide more [2] Duhan Pooja, Gupta Shilpi , Sangwan Sujata, & Gulati Vinita,
security to server of this architecture 3D password can be ―SECURED AUTHENTICATION: 3D PASSWORD, I.J.E.M.S.,
used. It very efficient & more secure way to keep data or im- VOL.3(2),242 – 245, 2012.
portant information secure from unauthorized people. For
email applications 3D password[2] is most secure & easier [3] Grover Aman, Narang Winnie, ―3-D Password: Strengthening the
Authentication Scene‖, International Journal of Scientific & Engineer-
scheme to used.
ing Research, Volume 3, Issue 10, October-2012.

6.8.2. Nuclear & Military Areas [4] http://en.wikipedia.org/wiki/3-D_Secure


Nuclear & military area of a country are most important area
where more security is needed we can use 3D password [5] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.69.5331&re
p=rep1&type=pdf
scheme in this area for more providing more secure authenti-
cation. 3D password scheme can protect data or secrete infor- [6] Alsulaiman, F.A.; El Saddik, A.,"Three- for Secure," IEEE
mation about these areas very securely. Transactions on Instrumentation and measurement, vol.57, no.9, pp
1929-1938.Sept. 2008.
6.8.3 Airplane & Jetfighters
[7] Vidya Mhaske et al, Int.J.Computer Technology & Applications,
There is possibility of misuse of airplanes and jetfighters for Vol 3 (2), ISSN: 2229-6093, 510-519.

IJSER
religion-political agendas. Such airplanes should be protected
[8] Tejal Kognule and Yugandhara Thumbre and Snehal Kognule, ―3D
by a powerful authentication system. The 3-D password is
password‖, International Journal of Computer Applications (IJCA),
recommended for these systems. In addition, 3-D passwords 2012.
can be used in less critical systems.
[9] A.B.Gadicha , V.B.Gadicha , ―Virtual Realization using 3D Pass-
word‖, in International Journal of Electronics and Computer Science
6.8.4 Other Areas Engineering, ISSN 2277-1956/V1N2-216-222.
We can use 3d password authentication scheme to areas such
as ATM, Cyber cafes, Industries (for data security), Laptop‘s
or PC‘s, critical servers, web services, etc & many more.

7 CONCLUSION
The 3D password is still new & in its early stages. Designing
various kinds of 3D virtual environments, deciding on pass-
word spaces, and interpreting user feedback and experiences
from such environments will result in enhancing and improv-
ing the user experience of the 3D password. Gathering attack-
ers from different background and attack made by them and
how to overcome them is main future work. Shoulder surfing
attacks are still possible so how to overcome that is a field of
research & development. Inclusion of biometrics leads to in-
creasing cost & hardware in scheme, to reduce this is still field
of research. So that 3D password can be used in many applica-
tion areas as discussed earlier & also many more area other
than those. Thus this paper tells about our study about 3D
password, still it is in early stage. Future work is needed in 3D
password scheme to develop this scheme up to more secure
level. Implementing 3D password for mobile handset is the
another important future work of this paper & also our project
too.

IJSER © 2014
http://www.ijser.org

You might also like