Authentication
A U T H E N T I C A T I O N I S A P R O C E S S O F V A L I D A T I N G W H O
PROVIDED.
A U T H E N T I C A T I O N M U S T B E U S E D F O R P R I V A T E A N D
CONFIDENTIAL DATA.
Knowledge
(something I know)
Password
PIN
ATTACKS AND
COUNTERMEASURES
Drawbacks Of
Existing Systems
3D Password
The 3D Password is a multifactor
authentication scheme that combine
RECOGNITION
+ RECALL
+TOKENS
+BIOMETRIC
In one authentication system
VIRTUAL OBJECTS
Virtual objects can be any object we encounter in real life:
A computer on which the user can type in
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
An Automated teller(ATM) machine that requires a
token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
D VIRTUAL ENVIRONMEN
3-D environment reflects the administration needs and the
security requirements.
System Importance
EXAMPLES
OBJECTIVES
To provide more secure authentication technique
To design & develop more user friendly & easier
authentication scheme
Filling
Username
Click on
graphical
passwor
d
item
Specifc key
pressed
Moving inside
Virtual 3D
environment
Verifying
Performing
Graphical
Passwords
S
pr pec
es if
se c k
d ey
Specifc key
pressed
Typing
Textual
Passwords
Performing
Biometrics
Biometric item is
clicked
Mo
Ob ve
Tu ject
rn
on
/ of
ACCESS
GRANTED
Changing
object status
ADVANTAGES
Flexibility
Strength
Easy to Memorize
Respect of Privacy
Applications
The 3D password can have a password space that
is very large compared to other authentication
schemes, so the 3D passwords main application
domains are protecting critical systems and
resources.
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
ATM
P E R S O N A L D I G I TAL A S S I S TAN C E
DESKTOP COMPUTERS & LAPTOPS
W E B AU T H E N T I C ATI O N E T C .
CONCLUSION
The authentication can be improved with 3d password ,because the
unauthorized person may not interact with same object at a particular
location as the legitimate user.
It is difficult to crack ,because it has no fixed number of steps and a
particular procedure.
Added with biometrics and token verification this schema becomes
almost unbreakable.