3D Password: Presented By: Pulkit Saxena 081102162 Cse Sec-D
3D Password: Presented By: Pulkit Saxena 081102162 Cse Sec-D
3D Password: Presented By: Pulkit Saxena 081102162 Cse Sec-D
3D password
Guided by: Kulamal vinod kumar Asst. professor of cse
INTRODUCTION EXISTING
SYSTEM PROPOSED SYSTEM BRIEF DESCRIPTION OF A SYSTEM SYSTEM IMPLEMENTATION OBJECTS REQUIRED PRINCIPLE 3D PASSWORD APPLICATION CONCLUSION
multifactor authentication scheme. The user login by navigating through a 3D environment. Collected user action and interaction in the virtual environment construct the 3D password.
Current
authentication systems suffer from many weaknesses. Textual passwords are common. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Moreover, biometrics cannot be revoked. The 3D password is a multi factor authentication scheme.
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. The following requirements are satisfied in the proposed scheme The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
The
new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
new scheme provides secrets that can be easily revoked or changed.
The
The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the users 3D password reflects the users preferences and requirements.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1,y1,z1) position , then enter a room that has a fingerprint recognition device that exists in a position(x2, y2, z2) and provide his/her fingerprint. Then, the user can go the virtual garage, open the car door, and turn on the radio to a specific channel . The combination and the sequence of the previous actions towards the specific objects construct the users 3D password.
computer with which the user can type. A fingerprint reader that requires the users fingerprint. A biometric recognition device. A paper or a white board that a user can write, sign, or draw on. An automated teller machine(ATM) that requests a token. A light that can be switched on/off. A television or radio where channels can be selected.
staple that can be punched. A car that can be driven. A book that can be moved from one place to another. Any graphical password scheme. Any real life object. Any upcoming authentication scheme.
The
action toward an object(assume a fingerprint recognition device) that exists in location (x1,y1,z1) is different from the actions toward a similar object(another fingerprint recognition device) that exists in location(x2, y2, z2), where x1=x2, y1=y2, and z1=z2. to perform the legitimate 3D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.
Therefore,
The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D passwords main application domains are protecting critical system and resources Critical server Nuclear and military facilities Airplanes and jet fighters. ATM Personal Digital Assistance Desktop Computers & laptop logins Web Authentication Security Analysis
The
user can decide his own authentication schemes. If hes comfortable to recall and recognition methods then he can choose the 3D authentication just used above. The authentication can be improved since the unauthorized persons will not interact with the same object as a legitimate user would. We can also include a timer. Higher the security higher the time. The 3D environment can change according to users request.
It
would be difficult to crack using regular techniques. Since all the algorithms follow steps to authenticate, our project has no fixed number of steps . Hence to calculate all those possibilities and apply them is not easy. It can be used in critical areas such as Nuclear Reactors, Missile Guiding Systems etc. Added with biometrics and card verification, the scheme becomes almost unbreakable.
THANK YOU