3dpasswordppt 130318101150
3dpasswordppt 130318101150
3dpasswordppt 130318101150
weakness.Textual passwords are commonly used,users do not follow their requirements.Users tends to choose meaningful words from dictionaries,which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper,we present and evaluate our contribution i.e. the 3D password
Existing System
Textual password Graphical Password Biometrics Token Based
PASSWORD
3D PASSWORD
The 3D passwords which are more customizable, and very interesting way of authentication. A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS
The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
System Implementation
For example, the user can enter the virtual environment
and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the users 3D password
Virtual objects
Virtual objects can be any object we encounter in real life:
A computer on which the user can type in A fingerprint reader that requires users fingerprint A paper or white board on which user can type An Automated teller(ATM) machine that requires a token A light that can be switched on/off A television or radio A car that can be driven A graphical password scheme
Snapshot of a proof - of - concept virtual art gallery , which contains 36 pictures and six computers
3D VIRTUAL ENVIRONMENT
3D Virtual Environment
3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. 3-D environment reflects the administration needs and the security requirements.
3D Virtual Environment
Advantages
Flexibility Strength Ease to Memorize Respect of Privacy
Applications
The 3D passwords main application domains are protecting critical systems and resources.
Critical Servers Nuclear Reactors & military Facilities Airplanes and missile Guiding
State Diagram
Conclusion
The authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user.
It is difficult to crack ,because it has no fixed number of steps and a particular procedure.
Added with biometrics and token verification this schema becomes almost unbreakable.
QUERIES