Paper 3079
Paper 3079
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
I. INTRODUCTION
There is an authentication technique that ensures that and confirms a user's identity. Providing Authentication to any
system leads to providing more security to that system. For improving authentication and avoiding password hacking
with management policies that are enforced by password expiration, length, and complexity requirements. Username
and password systems are among the oldest forms of digital authentication. To protect any system authentication must
be provided, so that only authorized persons can have the right to use or handle that system & data securely. There are
many authentication algorithms are available some are effective & secure but There are some authentication techniques
are as follows.
1.1 Types of Authentications
Types of authentications
.
3.1 Objectives
Flexibility: In 3D password technology, a 3D password provides multifactor authentication such as biometric
and textual passwords can be embedded in it.
Strength: It provides almost endless password possibilities.
Easy to Remember: it can be kept in mind easily as a short story.
Privacy: organizers have an option. The administrator can choose authentication designs that respect the user's
privacy.
Therefore, this system makes interaction with only those objects that perform the acquisition of information
from the user that he is comfortable to provide. It neglects interaction with the rest of the objects that might
demand the information which the user might not want to provide to the system.
IV. WORKING
Consider a three-dimensional virtual atmosphere space that is of the size G x G x G. Each point in the three-
dimensional atmosphere space is represented by the coordinates. (x, y, z) [1...G] x [1...G] x [1...G]. The entities are
distributed in the 3-dimensional virtual atmosphere. Every entity has its x, y, and z coordinates. Assume the user can
navigate and walk through the 3-dimensional virtual atmosphere and can see the entities and interact with the entities.
The input device for interactions with entities may be a mouse, a keyboard, stylus, a card reader, a microphone...etc.
4.2 Advantages
1. This 3D password Provides security.
2. It can't take by any other person.
3. 3D graphical password has no limit.
4. It may Change the Password easily.
Copyright to IJARSCT DOI: 10.48175/IJARSCT-3079 164
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
4.3 Disadvantages
1. 3D password Difficult for blind people to use this technology.
2. It Requires sophisticated computer technology.
3. It is Expensive.
4. Lots of program coding is required.
V. CONCLUSION
The 3D password is a multi-factor authentication scheme that combines the various authentication schemes into a
single 3D virtual environment. The design of the 3D virtual environment is the selection of objects inside the
environment and the object's type reflects the resulted password space. Its password space is very large compared to
any existing authentication scheme. It is the task of the system administrator to design the environment and to select the
appropriate object that reflects the protected system requirements. Its design is simple and easy to use 3D virtual
environment is a factor that leads to higher user acceptability of the 3D password system.
REFERENCES
[1]. Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, "A Novel 3D Graphical Password Schema, IEEE
International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems,
July 2006.
[2]. https://www.uniassignment.com/cassy -samples/information technology/secured authentication 3d-password-
information technology essay.php
[3]. https://www.slideshare.net/mobile/Gowsayasn/3d-password.ppt
[4]. www.seminarsonly.com/Labels/3D password- technology.php