SlideShare a Scribd company logo
1 of 32
Kanishka Khandelwal
                               Final Year,
Dept of Computer Science and engineering,
                       Jadavpur University
   Authentication
   Existing Systems
   Proposed 3D password system
   3D Virtual environment
   Expected Functionalities
   The Idea
   System Implementation
   Objects Required
   Security Analysis
   Applications
   Conclusion


                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   Who you are to whom you claimed to be?




                 Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   What   you   know (knowledge based).
   What   you   have (token based).
   What   you   are (biometrics).
   What   you   recognize (recognition based).




                     Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   Textual passwords
   Graphical passwords
   Biometrics
   Token based




                 Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   Most common authentication technique used
    in Computer world
   Two conflicting requirements: passwords
    should be easy to remember and hard to
    guess
   Kept very simple say a word from the
    dictionary or their pet names , girlfriends etc
   Klien cracked 25% of the passwords using a
    very small sized but well formed dictionary.
   Drawback- Guessable!


                   Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
 Biometrics consists of methods for uniquely
  recognizing humans based upon one or more
  intrinsic physical or behavioral traits
 Drawbacks-
 Intrusiveness to privacy
 Biometrics cannot be revoked
 Resistance to exposure of retinas to IR rays




               Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   Users can recall and recognize pictures more
    than words.
   Password space is less than or equal to
    textual password space.
   Vulnerable to Shoulder attack
   Process of selecting a set of pictures from the
    picture database can be tedious and time
    consuming for the user




                   Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   Vulnerable to loss or theft or duplication
   User has to carry the token whenever access
    required




                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   The 3-D password is a multifactor
    authentication scheme.
   The 3D password combines all existing
    authentication schemes into one three-
    dimensional virtual environment.
    Users have the freedom to select whether the
    3D password will be solely recall, biometrics,
    recognition, or token based, or a combination
    of two schemes or more



                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
The following requirements are satisfied
 Secrets are easy to remember and very
  difficult for intruders to guess
 Secrets are not easy to write down on paper
  and difficult to share with others
 Secrets can be easily revoked or changed.




                Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   The three-dimensional virtual environment
    consists of many items or objects.
   Each item has different responses to actions
   The user actions, interactions and inputs
    towards the objects or towards the three-
    dimensional virtual environment creates the
    user’s 3D password.




                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   The user can decide his own authentication schemes.

   The 3D environment can change according to users
    request.

   It would be difficult to crack using regular techniques.

   Can be used in critical areas such as Nuclear Reactors,
    Missile Guiding Systems etc.

   Added with biometrics and card verification, the scheme
    becomes almost unbreakable.


                      Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   large number of possible passwords because of the
    high number of possible actions and interactions
    towards every object and towards the three
    dimensional virtual environment.

   The authentication can be improved since the
    unauthorized persons will not interact with the
    same object as a legitimate user would. We can
    also include a timer. Higher the security higher the
    timer. Say after 20 seconds a weak password will
    be thrown out.


                    Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   The user navigates through a three
    dimensional virtual environment
   The combination and the sequence of the
    user’s actions and interactions towards the
    objects in the three dimensional virtual
    environment constructs the user’s 3D
    password.




                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   For example, the user can enter the virtual
    environment and type something on a computer
    that exists in (x1 , y1 , z1 ) position, then enter a
    room that has a fingerprint recognition device
    that exists in a position (x2 , y2 , z2 ) and
    provide his/her fingerprint. Then, the user can
    go to the virtual garage, open the car door, and
    turn on the radio to a specific channel. The
    combination and the sequence of the previous
    actions toward the specific objects construct the
    user’s 3D password


                     Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
    A computer with which the user can type.
    A fingerprint reader that requires the user’s
    fingerprint.
   A light bulb
    A biometric recognition device.
    A television or radio where channels can be
    selected.
    A car that can be driven.
    Any graphical password scheme.
    Any real life object.
    Any upcoming authentication scheme.


                    Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   The action towards an object (assume a
    fingerprint recognition device) that exists in
    location (x1, y1 , z1 ) is different from the
    actions toward a similar object (another
    fingerprint recognition device) that exists in
    location (x2 , y2 , z2 ). Therefore, to perform the
    legitimate 3D password, the user must follow the
    same scenario performed by the legitimate user.
    This means interacting with the same objects
    that reside at the exact locations and perform the
    exact actions in the proper sequence


                    Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012

    Let us consider a 3D virtual environment space of
    size G ×G × G. The 3D environment space is
    represented by the coordinates (x, y, z) ∈ [1, . . . , G]
    ×[1, . . . , G] ×[1, . . . , G ]. consider a user who
    navigates through the 3D virtual environment that
    consists of an office and a meeting room . Let us
    assume that the user is in the virtual office and the
    user turns around to the door located in (10, 24, 91)
    and opens it . Then, the user closes the door. The
    user then finds a computer to the left, which exists in
    the position (4, 34, 19), and the user types “FALCON.”
    The initial representation of user actions in the
    3Dvirtual environment can be recorded as follows

                      Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   (10, 24, 91) Action = Open the car door.
    (10, 24, 91) Action = Close the car door.
    (4, 34, 19) Action = Typing, “F”.
    (4, 34, 18) Action = Typing, “A”.
    (4, 34, 17) Action = Typing, “L”.
    (4, 34, 16) Action = Typing, “C”.
   (4, 34, 15) Action = Typing, “O”.
   (4, 34, 14) Action = Typing, “N”.



                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
Kanishka Khandelwal,Dept of
     Comp Sc. and Engg,J.U.   5/10/2012
The Size of the 3D Password Space
-We noticed that by increasing the number of
 objects in the three-dimensional virtual
 environment, the 3D password space
 increases exponentially.




               Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   3D Password Distribution Knowledge
    - Knowledge about the user’s selection of
    three-dimensional passwords is not
    available
     - knowledge about the design of a three-
    dimensional virtual environment is required
    by the attacker
    - the attacker must have knowledge about
    every single authentication scheme


                  Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
The 3D password can have a password space
  that is very large compared to other
  authentication schemes, so the 3D
  password’s main application domains are
  protecting critical systems and resources
 Critical server
 Nuclear and military facilities .
 Airplanes and jet fighters




               Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
In addition, 3D passwords can be used in less
  critical systems
  A small virtual environment can be used in
  the following systems like
 ATM
 Personal Digital Assistance
 Desktop Computers & laptop logins
 Web Authentication
 Security Analysis




                Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
A virtual art gallery that consist of 36 pictures and 6 computers
where users can navigate and interact with virtual objects by
either typing or drawing.
http://www.youtube.com/watch?v=4bvMo1NiyX0
                       Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
Kanishka Khandelwal,Dept of
     Comp Sc. and Engg,J.U.   5/10/2012
Kanishka Khandelwal,Dept of
     Comp Sc. and Engg,J.U.   5/10/2012
   1.The user can decide his own authentication schemes. If he's
    comfortable with Recall and Recognition methods then he can
    choose the 3d authentication just used above.
   2.The authentication can be improved since the un authorized
    persons will not interact with the same object as a legitimate
    user would. We can also include a timer .Higher the security
    higher the time.
   3.The 3D environment can change according to users request.
   4.It would be difficult to crack using regular techniques .Since all
    the algorithms follow steps to authenticate ,the scheme has no
    fixed number of steps .Hence to calculate all those possibilities
    and decipher them is not easy.
    5.Can be used in critical areas such as Nuclear Reactors, Missile
    Guiding Systems etc.
    6.Added with biometrics and card verification ,the scheme
    becomes almost unbreakable.




                         Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
   A Novel 3D Graphical Password Schema -
    Fawaz A Alsulaiman and Abdulmotaleb El
    Saddik
   http://www.authorstream.com/Presentation/
    kkarthikeyan08-895930-3d-password/
   http://www.technospot.net/blogs/what-is-
    3d-password-scheme-3/




                 Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U.   5/10/2012
Kanishka Khandelwal,Dept of
     Comp Sc. and Engg,J.U.   5/10/2012

More Related Content

What's hot (20)

3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password
3d password3d password
3d password
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password 3 d password
3 d password
 
3 d password
3 d password3 d password
3 d password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3D password
3D password3D password
3D password
 
3D password
3D password3D password
3D password
 
3D password
3D password 3D password
3D password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 

Viewers also liked

Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
Protecting Passwords
Protecting PasswordsProtecting Passwords
Protecting Passwordsinaz2
 
Password Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP ArgentinaPassword Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP ArgentinaAnthony Ferrara
 
How-to crack 43kk passwords while drinking your juice/smoozie in the Hood
How-to crack 43kk passwords  while drinking your  juice/smoozie in the HoodHow-to crack 43kk passwords  while drinking your  juice/smoozie in the Hood
How-to crack 43kk passwords while drinking your juice/smoozie in the HoodYurii Bilyk
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (13)

3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Protecting Passwords
Protecting PasswordsProtecting Passwords
Protecting Passwords
 
Password Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP ArgentinaPassword Storage And Attacking In PHP - PHP Argentina
Password Storage And Attacking In PHP - PHP Argentina
 
How-to crack 43kk passwords while drinking your juice/smoozie in the Hood
How-to crack 43kk passwords  while drinking your  juice/smoozie in the HoodHow-to crack 43kk passwords  while drinking your  juice/smoozie in the Hood
How-to crack 43kk passwords while drinking your juice/smoozie in the Hood
 
Iptv
IptvIptv
Iptv
 
3d passwords
3d passwords3d passwords
3d passwords
 
Death to Passwords SXSW 15
Death to Passwords SXSW 15Death to Passwords SXSW 15
Death to Passwords SXSW 15
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Use case-diagrams
Use case-diagramsUse case-diagrams
Use case-diagrams
 
Optativa catala (1)
Optativa catala (1)Optativa catala (1)
Optativa catala (1)
 
Store-Passwords
Store-PasswordsStore-Passwords
Store-Passwords
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Kanishka_3D Passwords

System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveyIRJET Journal
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schemaIOSR Journals
 
Generating 3 d model in virtual reality and analyzing its performance
Generating 3 d model in virtual reality and analyzing its performanceGenerating 3 d model in virtual reality and analyzing its performance
Generating 3 d model in virtual reality and analyzing its performanceijcsit
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
Eye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual KeyboardEye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual KeyboardIRJET Journal
 
IRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET Journal
 
Performance investigation of two-stage detection techniques using traffic lig...
Performance investigation of two-stage detection techniques using traffic lig...Performance investigation of two-stage detection techniques using traffic lig...
Performance investigation of two-stage detection techniques using traffic lig...IAESIJAI
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....Jitin Francis
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.docAjay Kumar
 
3d pass words
3d pass words3d pass words
3d pass wordsmkanth
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriyajanapriyanaidu
 

Similar to Kanishka_3D Passwords (20)

Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3d
3d3d
3d
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A Survey
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3dpassword
3dpassword3dpassword
3dpassword
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
Generating 3 d model in virtual reality and analyzing its performance
Generating 3 d model in virtual reality and analyzing its performanceGenerating 3 d model in virtual reality and analyzing its performance
Generating 3 d model in virtual reality and analyzing its performance
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Eye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual KeyboardEye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual Keyboard
 
IRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the BlindIRJET- Alternate Vision Assistance: For the Blind
IRJET- Alternate Vision Assistance: For the Blind
 
Performance investigation of two-stage detection techniques using traffic lig...
Performance investigation of two-stage detection techniques using traffic lig...Performance investigation of two-stage detection techniques using traffic lig...
Performance investigation of two-stage detection techniques using traffic lig...
 
Jitin_Francis_CV....
Jitin_Francis_CV....Jitin_Francis_CV....
Jitin_Francis_CV....
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
C0361419
C0361419C0361419
C0361419
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d pass words
3d pass words3d pass words
3d pass words
 
3d passwords
3d passwords 3d passwords
3d passwords
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Kanishka_3D Passwords

  • 1. Kanishka Khandelwal Final Year, Dept of Computer Science and engineering, Jadavpur University
  • 2. Authentication  Existing Systems  Proposed 3D password system  3D Virtual environment  Expected Functionalities  The Idea  System Implementation  Objects Required  Security Analysis  Applications  Conclusion Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 3. Who you are to whom you claimed to be? Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 4. What you know (knowledge based).  What you have (token based).  What you are (biometrics).  What you recognize (recognition based). Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 5. Textual passwords  Graphical passwords  Biometrics  Token based Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 6. Most common authentication technique used in Computer world  Two conflicting requirements: passwords should be easy to remember and hard to guess  Kept very simple say a word from the dictionary or their pet names , girlfriends etc  Klien cracked 25% of the passwords using a very small sized but well formed dictionary.  Drawback- Guessable! Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 7.  Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits  Drawbacks- Intrusiveness to privacy Biometrics cannot be revoked Resistance to exposure of retinas to IR rays Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 8. Users can recall and recognize pictures more than words.  Password space is less than or equal to textual password space.  Vulnerable to Shoulder attack  Process of selecting a set of pictures from the picture database can be tedious and time consuming for the user Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 9. Vulnerable to loss or theft or duplication  User has to carry the token whenever access required Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 10. The 3-D password is a multifactor authentication scheme.  The 3D password combines all existing authentication schemes into one three- dimensional virtual environment.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 11. The following requirements are satisfied  Secrets are easy to remember and very difficult for intruders to guess  Secrets are not easy to write down on paper and difficult to share with others  Secrets can be easily revoked or changed. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 12. The three-dimensional virtual environment consists of many items or objects.  Each item has different responses to actions  The user actions, interactions and inputs towards the objects or towards the three- dimensional virtual environment creates the user’s 3D password. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 13. The user can decide his own authentication schemes.  The 3D environment can change according to users request.  It would be difficult to crack using regular techniques.  Can be used in critical areas such as Nuclear Reactors, Missile Guiding Systems etc.  Added with biometrics and card verification, the scheme becomes almost unbreakable. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 14. large number of possible passwords because of the high number of possible actions and interactions towards every object and towards the three dimensional virtual environment.  The authentication can be improved since the unauthorized persons will not interact with the same object as a legitimate user would. We can also include a timer. Higher the security higher the timer. Say after 20 seconds a weak password will be thrown out. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 15. The user navigates through a three dimensional virtual environment  The combination and the sequence of the user’s actions and interactions towards the objects in the three dimensional virtual environment constructs the user’s 3D password. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 16. For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 17. A computer with which the user can type.  A fingerprint reader that requires the user’s fingerprint.  A light bulb  A biometric recognition device.  A television or radio where channels can be selected.  A car that can be driven.  Any graphical password scheme.  Any real life object.  Any upcoming authentication scheme. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 18. The action towards an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ). Therefore, to perform the legitimate 3D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 19. Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G ]. consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room . Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it . Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 19), and the user types “FALCON.” The initial representation of user actions in the 3Dvirtual environment can be recorded as follows Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 20. (10, 24, 91) Action = Open the car door.  (10, 24, 91) Action = Close the car door.  (4, 34, 19) Action = Typing, “F”.  (4, 34, 18) Action = Typing, “A”.  (4, 34, 17) Action = Typing, “L”.  (4, 34, 16) Action = Typing, “C”.  (4, 34, 15) Action = Typing, “O”.  (4, 34, 14) Action = Typing, “N”. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 21. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 22. The Size of the 3D Password Space -We noticed that by increasing the number of objects in the three-dimensional virtual environment, the 3D password space increases exponentially. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 23. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 24. 3D Password Distribution Knowledge - Knowledge about the user’s selection of three-dimensional passwords is not available - knowledge about the design of a three- dimensional virtual environment is required by the attacker - the attacker must have knowledge about every single authentication scheme Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 25. The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources  Critical server  Nuclear and military facilities .  Airplanes and jet fighters Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 26. In addition, 3D passwords can be used in less critical systems A small virtual environment can be used in the following systems like  ATM  Personal Digital Assistance  Desktop Computers & laptop logins  Web Authentication  Security Analysis Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 27. A virtual art gallery that consist of 36 pictures and 6 computers where users can navigate and interact with virtual objects by either typing or drawing. http://www.youtube.com/watch?v=4bvMo1NiyX0 Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 28. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 29. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 30. 1.The user can decide his own authentication schemes. If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above.  2.The authentication can be improved since the un authorized persons will not interact with the same object as a legitimate user would. We can also include a timer .Higher the security higher the time.  3.The 3D environment can change according to users request.  4.It would be difficult to crack using regular techniques .Since all the algorithms follow steps to authenticate ,the scheme has no fixed number of steps .Hence to calculate all those possibilities and decipher them is not easy.  5.Can be used in critical areas such as Nuclear Reactors, Missile Guiding Systems etc.  6.Added with biometrics and card verification ,the scheme becomes almost unbreakable. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 31. A Novel 3D Graphical Password Schema - Fawaz A Alsulaiman and Abdulmotaleb El Saddik  http://www.authorstream.com/Presentation/ kkarthikeyan08-895930-3d-password/  http://www.technospot.net/blogs/what-is- 3d-password-scheme-3/ Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012
  • 32. Kanishka Khandelwal,Dept of Comp Sc. and Engg,J.U. 5/10/2012

Editor's Notes

  1. Having knowledge about the most probable textualpasswords is the key behind dictionary attacks. Anyauthentication scheme is affected by the knowledgedistribution of the user’s secretsKnowledge about the user’s selection of three-dimensionalpasswords is not available, up to now, to the attacker.Moreover, having different kinds of authentication schemesin one virtual environment causes the task to be more difficultfor the attacker. However, in order to acquire suchknowledge, the attacker must have knowledge about everysingle authentication scheme and what are the most probablepasswords using this specific authentication scheme. Thisknowledge, for example, should cover the user’s mostprobable selection of textual passwords, different kinds ofgraphical passwords, and knowledge about the user’sbiometrical data. Moreover, knowledge about the design of athree-dimensional virtual environment is required in order forthe attacker to launch a customized attack.