22-12-2012, 12:27 PM
3-D PASSWORD
3-D PASSWORD.pptx (Size: 3.45 MB / Downloads: 57)
Authentication
Authentication is a process of validating who are you to whom you claimed to be
Human authentication techniques are as follows:
Knowledge Base (What you know)
Token Based(what you have)
Biometrics(what you are)
Recognition Based(What you recognize)
Drawbacks
Textual Password:
Textual Passwords should be easy to remember at the same time hard to guess
Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴
From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
Graphical Password
Graphical passwords can be easily recorded as these schemes take a long time.
One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.
They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
3D PASSWORD SCHEME
The 3D password presents a virtual environment containing various virtual objects.
The user walks through the environment and interacts with the objects
The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
3D Password selection
Virtual objects can be any object we encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
3D Passwords Differentiators
Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.
Strength: This scenario provides almost unlimited passwords possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
3D Password Application Areas
Critical Servers
Nuclear and military Facilities
Airplanes and Jetfighters
ATMs,Desktop and Laptop Logins, Web Authentication
Attacks and Countermeasures
Brute Force Attack: The attack is very difficult because
Time required to login may vary form 20s to 2 min therefore it is very time consuming.
Cost of Attack: A 3D Virtual environment may contain biometric object ,the attacker has to forge all biometric information.
Well Studied Attack: Attacker tries to get the most probable distribution of 3D Password. This is difficult because attacker has to perform customized attack fo different virtual environment .
CONCLUSION
The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment.
The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.
Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space.
3-D PASSWORD.pptx (Size: 3.45 MB / Downloads: 57)
Authentication
Authentication is a process of validating who are you to whom you claimed to be
Human authentication techniques are as follows:
Knowledge Base (What you know)
Token Based(what you have)
Biometrics(what you are)
Recognition Based(What you recognize)
Drawbacks
Textual Password:
Textual Passwords should be easy to remember at the same time hard to guess
Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴
From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary
Graphical Password
Graphical passwords can be easily recorded as these schemes take a long time.
One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.
They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
3D PASSWORD SCHEME
The 3D password presents a virtual environment containing various virtual objects.
The user walks through the environment and interacts with the objects
The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
3D Password selection
Virtual objects can be any object we encounter in real life:
A computer on which the user can type
A fingerprint reader that requires users fingerprint
A paper or white board on which user can type
A Automated teller(ATM) machine that requires a token
A light that can be switched on/off
A television or radio
A car that can be driven
A graphical password scheme
3D Passwords Differentiators
Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.
Strength: This scenario provides almost unlimited passwords possibility.
Ease to Memorize: can be remembered in the form of short story.
Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
3D Password Application Areas
Critical Servers
Nuclear and military Facilities
Airplanes and Jetfighters
ATMs,Desktop and Laptop Logins, Web Authentication
Attacks and Countermeasures
Brute Force Attack: The attack is very difficult because
Time required to login may vary form 20s to 2 min therefore it is very time consuming.
Cost of Attack: A 3D Virtual environment may contain biometric object ,the attacker has to forge all biometric information.
Well Studied Attack: Attacker tries to get the most probable distribution of 3D Password. This is difficult because attacker has to perform customized attack fo different virtual environment .
CONCLUSION
The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment.
The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.
Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space.