Professional Documents
Culture Documents
SLIDE NAME
SLIDE NUMBER
3 4 5 7 8 9 10 11 14 15 16 19 20
2
Authentication What is a 3D Password? Literature Survey Proposed System System Overview Security Anaysis 3D Password Space Size Fault Tolerance Application Advantages Experimental Result Conclusion References
Authentication is a process of validating who are you to whom you claimed to be. Human authentication techniques are as follows:
1. 2. Knowledge Base (What you know) Token Based(what you have)
3.
4.
A multi factor authentication scheme where the users log into a system by navigating through a virtual 3D environment.
This scheme combines RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system
4
1.
2.
3.
Graphical Passwords:
(Recall Based+Recognition Based)
1.Free Recall
2.Serial Recall 3.Cued Recall
5
To analyse how secure a system is we have to consider how hard it is for the attacker to break into the system. Another measurement can be based on the information content of the password space.
n=Lmax
(Lmax,G)= (m+g(AC))
n=1
AC-possible actions
10
11
Resistant to brute force attack, timing and shoulder surfing attacks. Withstand well studied attacker Easy to remember and difficult for intruder to guess. 3d password space can be very large,hence the fault tolerance is high.
12
Critical Servers. Nuclear and Military Facilities. Airplanes and jet fighters. ATMs,Desktop and Laptop Logins, Web Authentication
13
Difficult to guess. Not easy to write on paper. Easily Changed. Difficult to share with others. Easiness to memorize. Respect of privacy.
14
50 users volunteered for this experiment. C#.net was used to build the 3D environment which consists of an art gallery and chess board game that the user can walk through.
15
16
17
All authentication schemes are vulnerable to attacks. The 3D Password is a multifactor authentication scheme which combines various authentication schemes into a single 3D virtual environment. It is still in its early stages of development and hence a lot of research is the proper solution. Gathering attackers for testing the system will help in enhancing the system more. A field of research is the proper solution.
18
Fawaz A Alsulaiman and Abdulmotaleb El Saddik,A Novel 3D Graphical Password, VECIMS 2006 IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems Schema. Ms.VidyaMhaske-Dhamdhere, Prof. G. A. Patil Three Dimensional Object Used for Data Security, in International Conference on Computational Intelligence and Communication Networks,2010.
D. V. Klein, Foiling the cracker: A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 1990, pp. 514. NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003.
19
20