ByZishan Mohsin
B.tech, Computer Science And Engineering
Integral University.
CONTENTS
 Introduction
 Authentication Schemes
 Functionalities Required
 3D Password selection and Input
 Virtual Environment Design Guidelines
 Applications
 Security Analysis
 Attacks and Countermeasures
 Conclusion
INTRODUCTION
Commonly used authentication schemes are textual

passwords, graphical passwords and biometrics.

3D password is a multifactor authentication scheme.

To be authenticated, we require a 3D virtual

environment.
Combines recognition, recall, token, and biometrics

based systems.

Users choice to select the type of authentication

technique.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED
Recall based
Recognition based

TOKEN BASED

e.g : smart card
BIOMETRIC BASED
Fingerprint ,palm prints ,hand geometry ,face

recognition
Intrusiveness upon a user’s personal characteristics.

GRAPHICAL PASSWORDS
Recognition based
Recall based
FUNCTIONALITIES REQUIRED
New scheme should combine the existing

authentication schemes

Freedom to select the type of authentication

technique.

Should provide secrets that are easy to remember,

difficult to guess.
3D PASSWORD SELECTION AND INPUT
3D environment space represented by the co-

ordinates

User navigate into the 3D virtual environment using

any input device.

The sequence of actions and interactions forms the

users 3D password.
Representation of user actions in the 3D virtual

environment

(10,24,91) Action=Open the office door;
(10,24,91) Action=Close the office door;
(4,34,18) Action= Typing,“F”;
(4,34,18) Action= Typing,”A”;
(4,34,18) Action= Typing,”L”;
(4,34,18) Action= Typing,”C”;
(4,34,18) Action= Typing,”O”;
(4,34,18) Action= Typing,”N”;
(10,24,80) Action= Pick up the pen;
(1,18,80) Action= Drawing, point=(330,130).
Virtual Computer where user typing a textual password
as a part of user’s 3D Password
Snapshot of a proof-of-concept virtual art
gallery
State diagram of a 3D Password application
3D VIRTUAL ENVIRONMENT DESIGN
GUIDELINES
Real-life similarity
Object uniqueness and distinction
Three-dimensional virtual environment
System importance
APPLICATIONS
Critical servers.
Nuclear and military facilities.
Airplanes and jet fighters.
ATM, desktop computers and laptops.
SECURITY ANALYSIS
3D Password Space Size.
3D Password Distribution Knowledge.
ATTACKS AND COUNTER MEASURES
Brute Force Attack
Well-Studied Attack
Shoulder Surfing Attack
Timing Attack
CONCLUSION
Commonly used authentication schemes are

vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
User’s choice and decision to construct the desired
and preferred 3D password
3D Password

More Related Content

PDF
SEMINAR REPORT ON 3D PASSWORD
PPT
3D-Password: A More Secure Authentication
PPTX
3D Password and its importance
PPTX
3d password 23 mar 14
PPT
3 d password
PPTX
3D password
PPT
3D Password Presentation
PPTX
3D Password
SEMINAR REPORT ON 3D PASSWORD
3D-Password: A More Secure Authentication
3D Password and its importance
3d password 23 mar 14
3 d password
3D password
3D Password Presentation
3D Password

What's hot (20)

PPTX
3D PASSWORD
PPTX
3D-Password
PPTX
3d passwords
PDF
3D Password PPT
PPTX
3d password ppt
PPTX
3D Password
PPT
3D PASSWORD
PPT
3D PASSWORD
PPTX
3 d password
PPTX
3D PASSWORD SEMINAR
PPTX
SRAVYA
PDF
3d password - Report
PPTX
3d password
PPT
3d password ppt
PPTX
3D Password
PPTX
Graphical Password Authentication
PPT
3 d password
PPTX
3d password
PPT
graphical password authentication
PPTX
Graphical Password Authentication
3D PASSWORD
3D-Password
3d passwords
3D Password PPT
3d password ppt
3D Password
3D PASSWORD
3D PASSWORD
3 d password
3D PASSWORD SEMINAR
SRAVYA
3d password - Report
3d password
3d password ppt
3D Password
Graphical Password Authentication
3 d password
3d password
graphical password authentication
Graphical Password Authentication
Ad

Viewers also liked (19)

PPTX
3d password by suresh
PPTX
Kanishka_3D Passwords
PPTX
3D Password M Sc BHU Sem 1
PPTX
Atm using fingerprint
PPTX
Graphical password authentication
PDF
Latest Seminar Topics for Engineering,MCA,MSc Students
PPTX
LinkedIn powerpoint
PPTX
5G Wireless Technology
PDF
Cloud Computing in 3-D
PPTX
Algorithm paradigms
DOCX
3d pass words
PPT
3dpassword
PPTX
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
PPTX
3D Password
PPT
3D password
PPT
3D PASSWORD
PPT
Ppt on 3d password (2)
PPTX
Senior Project: Final Presentation
PPTX
3D PASSWORD
3d password by suresh
Kanishka_3D Passwords
3D Password M Sc BHU Sem 1
Atm using fingerprint
Graphical password authentication
Latest Seminar Topics for Engineering,MCA,MSc Students
LinkedIn powerpoint
5G Wireless Technology
Cloud Computing in 3-D
Algorithm paradigms
3d pass words
3dpassword
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
3D Password
3D password
3D PASSWORD
Ppt on 3d password (2)
Senior Project: Final Presentation
3D PASSWORD
Ad

Similar to 3D Password (20)

PPTX
3d password
PPT
3 d password
PPTX
3d password ppt presentation innovative idea
PPTX
3dpswd 130320115940-phpapp01-converted
PPTX
3 d password
PPTX
3dpassword by janapriya
DOC
Deepak 3 dpassword (2)
PPTX
PPT
3 d password by M Sangam Subudhi
PPTX
3d pswdbysuresh-120112091037-phpapp02
PPT
3 dpswd
PPTX
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
PPTX
3dpassword11.pptx.......................
PPTX
PPTX
3D Passwrd
PPTX
3D Password for Secure Authentication
PPT
3D Password ppt
3d password
3 d password
3d password ppt presentation innovative idea
3dpswd 130320115940-phpapp01-converted
3 d password
3dpassword by janapriya
Deepak 3 dpassword (2)
3 d password by M Sangam Subudhi
3d pswdbysuresh-120112091037-phpapp02
3 dpswd
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
3dpassword11.pptx.......................
3D Passwrd
3D Password for Secure Authentication
3D Password ppt

Recently uploaded (20)

PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Internet of Everything -Basic concepts details
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
LMS bot: enhanced learning management systems for improved student learning e...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Internet of Everything -Basic concepts details
Convolutional neural network based encoder-decoder for efficient real-time ob...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Electrocardiogram sequences data analytics and classification using unsupervi...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
SaaS reusability assessment using machine learning techniques
Co-training pseudo-labeling for text classification with support vector machi...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Advancing precision in air quality forecasting through machine learning integ...
Data Virtualization in Action: Scaling APIs and Apps with FME
Auditboard EB SOX Playbook 2023 edition.
4 layer Arch & Reference Arch of IoT.pdf
Training Program for knowledge in solar cell and solar industry

3D Password

  • 1. ByZishan Mohsin B.tech, Computer Science And Engineering Integral University.
  • 2. CONTENTS  Introduction  Authentication Schemes  Functionalities Required  3D Password selection and Input  Virtual Environment Design Guidelines  Applications  Security Analysis  Attacks and Countermeasures  Conclusion
  • 3. INTRODUCTION Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment.
  • 4. Combines recognition, recall, token, and biometrics based systems. Users choice to select the type of authentication technique.
  • 5. AUTHENTICATION SCHEMES KNOWLEDGE BASED Recall based Recognition based TOKEN BASED e.g : smart card
  • 6. BIOMETRIC BASED Fingerprint ,palm prints ,hand geometry ,face recognition Intrusiveness upon a user’s personal characteristics. GRAPHICAL PASSWORDS Recognition based Recall based
  • 7. FUNCTIONALITIES REQUIRED New scheme should combine the existing authentication schemes Freedom to select the type of authentication technique. Should provide secrets that are easy to remember, difficult to guess.
  • 8. 3D PASSWORD SELECTION AND INPUT 3D environment space represented by the co- ordinates User navigate into the 3D virtual environment using any input device. The sequence of actions and interactions forms the users 3D password.
  • 9. Representation of user actions in the 3D virtual environment (10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,“F”; (4,34,18) Action= Typing,”A”; (4,34,18) Action= Typing,”L”; (4,34,18) Action= Typing,”C”; (4,34,18) Action= Typing,”O”; (4,34,18) Action= Typing,”N”; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
  • 10. Virtual Computer where user typing a textual password as a part of user’s 3D Password
  • 11. Snapshot of a proof-of-concept virtual art gallery
  • 12. State diagram of a 3D Password application
  • 13. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES Real-life similarity Object uniqueness and distinction Three-dimensional virtual environment System importance
  • 14. APPLICATIONS Critical servers. Nuclear and military facilities. Airplanes and jet fighters. ATM, desktop computers and laptops.
  • 15. SECURITY ANALYSIS 3D Password Space Size. 3D Password Distribution Knowledge.
  • 16. ATTACKS AND COUNTER MEASURES Brute Force Attack Well-Studied Attack Shoulder Surfing Attack Timing Attack
  • 17. CONCLUSION Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. User’s choice and decision to construct the desired and preferred 3D password