25-08-2017, 09:32 PM
THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT
THREE DIMENSIONAL PASSWORD .pdf (Size: 292.54 KB / Downloads: 33)
ABSTRACT
Current authentication systems suffer from many weaknesses. Textual passwords are com-
monly used; however, users do not follow their requirements. Users tend to choose mean-
ingful words from dictionaries, which make textual passwords easy to break and vulnerable
to dictionary or brute force attacks. Many available graphical passwords have a password
space that is less than or equal to the textual password space. Smart cards or tokens can be
stolen. Many biometric authentications have been proposed; however, users tend to resist
using biometrics because of their intrusiveness and the effect on their privacy. Moreover,
biometrics cannot be revoked. In this project, we present and evaluate our contribution, i.e.,
the 3-D password.
The 3-D password is a multifactor authentication scheme. To be authenticated, we present
a 3-D virtual environment where the user navigates and interacts with various objects. The
sequence of actions and interactions toward the objects inside the 3-D environment con-
structs the users 3-D password. The 3-D password can combine most existing authentica-
tion schemes such as textual passwords, graphical passwords, and various types of biomet-
rics into a 3-D virtual environment. The design of the 3-D virtual environment and the type
of objects selected determine the 3-D password key space.
An Overview
The project entitled Three Dimensional Password for More Secure Authentication
aims at developing a multi-factor authentication scheme. The project has been developed
with Android as the Front End and SQLite as the Back End. The project is prepared to
implement in Windows XP platform.
Objective of the Project
The dramatic increase of computer usage has given rise to many security concerns.
One major security concern is authentication, which is the process of validating who you
are to whom you claimed to be. In general, human authentication techniques can be clas-
sified as knowledge based (what you know), token based (what you have), and biometrics
(what you are). Knowledge-based authentication can be further divided into two categories
Recall based and Recognition based. Recall-based techniques require the user to repeat or
reproduce a secret that the user created before. Recognition-based techniques require the
user to identify and recognize the secret, or part of it, that the user selected before. One
of the most common recall-based authentication schemes used in the computer world is
textual passwords. One major drawback of the textual password is its two conflicting re-
quirements: the selection of passwords that are easy to remember and, at the same time,
are hard to guess.
Application Framework
By providing an open development platform, Android offers developers the ability to
build extremely rich and innovative applications. Developers are free to take advantage of
the device hardware, access location information, run background services, set alarms, add
notifications to the status bar, and much, much more.
Developers have full access to the same framework APIs used by the core applications. The
application architecture is designed to simplify the reuse of components; any application
can publish its capabilities and any other application may then make use of those capabil-
ities (subject to security constraints enforced by the framework). This same mechanism
allows components to be replaced by the user.
SYSTEM ANALYSIS
System analysis deals with the study of the current system. System analysis is the most
critical process of information development. It can be defined as problem solving which
consist of our phases they can be successfully completed by applying appropriate each
dimensions of the information system.
System analysis is a logical process; the objective of this phase is not actually to
solve the problem but to determine what must be done to solve the problem. The basic
objective of the analysis stage is to develop the logical model of the system using tools
such as the data flow diagram and elementary data description of the elementary algorithm.
The logical model is subject to review by both the management and the user who agree that
the model does in fact reflect what should be done to solve the problem.
System analysis is not a precise science. It is in fact more of an art, aided by scientific
approach to find definition and recording data, gathering traditional structures is only one
part of the system analysis, the next step is to examine the data, assess the situation and
looking at the alternatives.