Top Banner
11

3 d password

Apr 13, 2017

Download

Technology

Murlidhar Sarda
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 3 d password
Page 2: 3 d password

CONTENTS Introduction

Authentication Schemes

Functionalities Required

3D Password selection and Input

Virtual Environment Design Guidelines

Applications

Security Analysis

Attacks and Countermeasures

Conclusion

Page 3: 3 d password

INTRODUCTION

Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.

3D password is a multifactor authentication scheme.

Page 4: 3 d password

AUTHENTICATION SCHEMES

KNOWLEDGE BASED Recall basedRecognition based

TOKEN BASEDeg : smart card

Page 5: 3 d password

BIOMETRIC BASEDFingerprint ,palm prints ,hand geometry ,face

recognitionIntrusiveness upon a user’s personal

characteristics.GRAPHICAL PASSWORDS

Recognition basedRecall based

Page 6: 3 d password

Virtual Computer where user typing a textual password as a part of user’s 3D Password

Page 7: 3 d password

Snapshot of a proof-of-concept virtual art gallery

Page 8: 3 d password

APPLICATIONS

Critical servers.

Nuclear and military facilities.

Airplanes and jetfighters.

ATMs, PDA’s, desktop computers and laptops.

Page 9: 3 d password

SECURITY ANALYSIS

3D Password Space Size.

3D Password Distribution Knowledge.

Page 10: 3 d password

CONCLUSIONCommonly used authentication schemes are

vulnerable to attacks.3D Password is a multifactor authentication

scheme.Design of 3D virtual environment, selection

of objects inside the environment, and the object type reflects the resulted password space.

User’s choice and decision to construct the desired and preferred 3D password

Page 11: 3 d password