Seminar Report: Submitted by
Seminar Report: Submitted by
Seminar Report: Submitted by
Submitted by
DERRICK
INFORMATION SCIENCE
1EW07IS021
BANGALORE
CONTENTS
1. INTRODUCTION 3
2. WHAT IS AUTHENTICATION 4
3. AUTHENTICATION METHODS 4
5. INNOVATIVE COMPONENT 6
6. WHAT IS 3D PASSWORD 7
7. STATE DIAGRAM 8
8. SYSTEM IMPLEMENTATION 9
10. APPLICATION 15
12. ATTACKS 18
13. CONCLUSION 22
15. REFERENCES 24
INTRODUCTION
In this paper, we present and evaluate our contribution, i.e., the 3-D
password. The 3-D password is a multifactor authentication scheme. To be
authenticated, we present a 3-D virtual environment where the user navigates
and interacts with various objects. The sequence of actions and interactions
toward the objects inside the 3-D environment constructs the user’s 3-D
password. The 3-D password can combine most existing authentication schemes
such as textual passwords, graphical passwords, and various types of biometrics
into a 3-D virtual environment. The design of the 3-D virtual environment and
the type of objects selected determine the 3-Dpassword key space.
WHAT IS AUTHENTICATION?
AUTHENTICATION METHODS
There are two types of techniques for doing this.
The first is comparing the attributes of the object itself to
what is known about objects of that origin. For example, an art expert might
look for similarities in the style of painting, check the location and form of a
signature, or compare the object to an old photograph. An archaeologist might
use carbon dating to verify the age of an artifact, do a chemical analysis of the
materials used, or compare the style of construction or decoration to other
artifacts of similar origin. The physics of sound and light, and comparison with
a known physical environment, can be used to examine the authenticity of audio
recordings, photographs, or videos.
The second type relies on documentation or other external
affirmations. For example, the rules of evidence in criminal courts often require
establishing the chain of custody of evidence presented. This can be
accomplished through a written evidence log, or by testimony from the police
detectives and forensics staff that handled it. Some antiques are accompanied by
certificates attesting to their authenticity. External records have their own
problems of forgery and perjury, and are also vulnerable to being separated
from the artifact and lost.
INNOVATIVE COMPONENT
The proposed system is a multi factor authentication scheme
that combines the benefits of various authentication schemes. Users have the
freedom to select whether the 3D password will be solely recall, recognition, or
token based, or combination of two schemes or more. This freedom of selection
is necessary because users are different and they have different requirements.
Therefore, to ensure high user acceptability, the user’s freedom of selection is
important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult
for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper.
Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
WHAT IS A 3D PASSWORD?
For example, if an item requests an iris scan and the user is not
comfortable in providing such information, the user simply avoids interacting
with that item. Moreover, giving the user the freedom of choice as to what type
of authentication schemes will be part of their 3-D password and given the large
number of objects and items in the environment, the number of possible 3-D
passwords will increase. Thus, it becomes much more difficult for the attacker
to guess the user’s 3-D password.
STATE DIAGRAM OF A 3D PASSWORD APPLICATION
For example, the user can enter the virtual environment and
type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a
room that has a fingerprint recognition device that exists in a position (x2 , y2 ,
z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage,
open the car door, and turn on the radio to a specific channel. The combination
and the sequence of the previous actions toward the specific objects construct
the user’s 3Dpassword.
1) Real life-similarity
The prospective 3D virtual environment should reflect what
people are used to seeing in real life. Objects used in virtual
environments should be relatively similar in size to real objects (sized to
scale). Possible actions and interactions toward virtual objects should reflect
real life situations. Object responses should be realistic. The target should have
a 3D virtual environment that users can interact.
5) System Importance
The 3D virtual environment should consider what
systems will be protected by a 3D password. The number of objects and the
types of objects that have been used in the 3D virtual environment should
reflect the importance of the protected system.
3D PASSWORD APPLICATIONS
1. Critical servers
Many large organizations have critical servers that are usually
protected by a textual password. A 3D password authentication proposes a
sound replacement for a textual password.
• ATM
• Web Authentication
SECURITY ANALYSIS
Password should be easy to remember for the user, and not force insecure
actions (e.g., the very bad and insecure practice of writing the password
down on a Post-It note stuck to the monitor)
FIG: Password space of the 3-D password, textual password, Pass faces,
and DAS with grid sizes of 5 × 5 and 10 × 10. Length is the number of actions and
interactions for a 3-D password, the number of characters for textual passwords,
the number of selections for Pass faces, and the number of points that represent
the strokes for DAS. The length is up to eight.
ADVANTAGES
Time required to login The total time needed for a legitimate user
to login may vary depending on the number of interactions and actions, the
size of the 3D virtual environment, and the type of actions and interactions.
Therefore, a brute force attack on a 3D password is very difficult and time
consuming.
4) Timing Attack
In this attack, the attacker observes how long it takes
the legitimate user to perform a correct sign-in using the 3D password. This
observation gives the attacker an indication of the legitimate user’s
3D password length. However, this kind of attack alone cannot be very
successful since it gives the attacker mere hints. Therefore, it would probably be
launched as part of a well studied or brute force attack. Timing attacks can be
very effective if the 3D virtual environment is poorly designed.
CONCLUSION
FUTURE WORK
REFERENCES
Rachna Dhamija, Adrian Perrig, Déjà Vu: A User Study Using Images
for Authentication. 2000, Denver, Colorado, pages 45-58.