Presented By:: Manisha Saini
Presented By:: Manisha Saini
Presented By:: Manisha Saini
MANISHA SAINI
1. Password
2. Passphrase
3. Authentication
4. Drawbacks of Human Authentication Techniques
5. 3D password
6. Virtual Environment
7. Virtual Objects
8. System Implementation
9. Mathematical Concept Related to 3D password
10. Example
11. State Diagram
12. Working of 3D password
13. Programming languages
14. Attacks and Counter Measures
15. Advantages
16. Disadvantages
17. Applications
18. References
• A password is a word or string of characters
used for the authentication to prove identity.
• Password is basically an encryption
algorithms.
• It is 8-15 character or slightly more than that.
• Passwords are the first line of defense against
cyber criminals.
It is the advanced version of password.
It is a combination of words or simply
collection of password in a proper sequence.
Length of passphrase is from 30-50 words or
more than that also.
More secure than an ordinary password.
Authentication is a process of validating who
are you to whom you are claimed to be.
(a) Keys
(b) Passport
(c) Smart card
(d) ID proofs
Typical Click on a
Performing
Textual graphical
password
Graphical Password
Password
Specific item
key Specific key pressed
password
Biometric item
Moving Inside is checked
Enter User Name Performing
Virtual 3D
Biometrics
Environment
Login
password
Access not Move object,
Verifying Turn ON/OFF
granted
Access
Changing
granted
Item Status
C++
Java and Java3D
.NET languages such as C# or Visual Basics
Parrot virtual machine
OpenGL library :
(i) uses both graphics and CAD programs.
(ii) supported on Windows, Macintosh, UNIX workstations,
PCs, X-Box, Linux, etc.
GLUT :
(i) library for using C++ and OpenGL
Direct 3D :
(i) supported only on Microsoft windows platforms and X-
box.
1. Brute Force Attack: A brute force attack is a trial-and-error
method used to obtain information such as a user password or
personal identification number (PIN). The attack is difficult
because:
(i) Required time to login: Time required to login may vary from
20 seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very
high.
2. Well Studied Attack:
(i) Attacker has to study whole password scheme.
(ii) Attacker has to try combination of different attacks on
scheme.
(iii) As 3D password scheme is multi-factor & multi-password
authentication scheme, attacker fail to studied whole scheme.
This attacks also not much effective against 3D password
scheme.
3. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so
are difficult to break.
4. Timing Attack:
(i) The attacker observes how long it takes a
legitimate user to perform a correct sign-in using 3D
password.
(ii) Helps in determining length of password.
(iii) Effective if the 3D virtual environment is
designed correctly.
5. Key logger:
(i) Attacker install as software called key logger on
system where authentication scheme is used.
(ii) Software stores text entered through
keyboard and those text are stored in text file.
(iii) More effective and useful for only textual
password. Fails in case of 3D password because it
includes biometrics which are hard to crack.
1. Provides high security.
2. Flexible, as it provides multifactor authentication ,i.e., token
based, knowledge based, biometrics.
3. Provides infinite number of password possibilities.
4. Can be memorized in form of short stories.
5. Implementation of system is easy.
6. Ease to change password anytime.
7. Helps to keep lot of personal details.
8. Due to the use of multiple schemes in one scheme password
space is increased to great extent.
1. Difficult for blind people to use this
technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
1. Critical servers.
2. Nuclear reactors and military facilities.
3. Airplanes, jet fighters and missile guiding.
4. Networking.
5. A small virtual environment can be used in following
areas:
(i) ATM.
(ii) Desktop computers and laptop logins.
(iii) Web authentication.
(iv) Security analysis.
The authentication can be improved with 3D
password, because the unauthorized person
may not interact with same object at a
particular location as the legitimate user.
It is difficult to crack because it has no fixed
number of steps and a particular procedure.
Added with biometrics and token verification
this scheme becomes almost unbreakable.
www.ifet.ac.in
3Dvas.com
www.ijesit.com
www.sri.com
https://www.youtube.com/watch?v=Tw1
mXjMshJE