3 d password

40 %
60 %
Information about 3 d password
Technology

Published on March 28, 2014

Author: cizharulhaq

Source: slideshare.net

Description

This is draft report for cs students
in Recent developments in IT
Complete report will b uploaded soon.......................

3-D Password Abdul Rauf Butt B-15142 Izhar-ul-Haq Cheema B-14855 Department of Bachelor Science in Computer Science Department of Bachelor Science in Computer Science University of South Asia University of South Asia Lahore, Punjab, Pakistan Lahore, Punjab, Pakistan AbdulRauf.Butt02@gmail.com Izharcheema07@gmail.com I. ABSTRACT We have had many authentication schemes presently, but they all have some drawbacks. So lately, the 3D password paradigm was introduced. The 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. However the 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments, deciding on password spaces, and interpreting user feedback and experiences from such environments will result in enhancing and improving the user experience of the 3-D password. Moreover, gathering attackers from different backgrounds to break the system is one of the future works that will lead to system improvement and prove the complexity of breaking a 3-D password. This paper presents a study of the 3D password and an approach to strengthen it by way of adding a Fourth dimension, that deals with gesture recognition and time recording, and that would help strengthen the authentication paradigm altogether. II. INTRODUCTION What method is applied for data collection? And which factors are applied also, Explain. How much users use the textual passwords and what characters they use (week password, medium password, strong password). What is the perception of users about 3d password? How 3d password can relief us and what are the drawbacks? How 3D password’s timing and space can be complicated? Where 3d password can be used in wide areas for security system? III. KEYWORDS Authentication, Password, Security, 3D Password, Password Technology, 3d Environment IV. BACKGROUND WORK Many graphical password schemes have been proposed [6]–[8], [10]–[12]. Blonder [6] introduced the first graphical password schema. Blonder’s idea of graphical passwords is that by having a predetermined image, the user can select or touch regions of the image causing the sequence and the location of the touches to construct the user’s graphical password. After Blonder [6], the notion of graphical passwords was developed. Many graphical password schemes have been proposed. Dhamija and Perrig [7] proposed Déjà Vu, which is a Recognition-based graphical password system that authenticates Users by choosing portfolios among decoy portfolios. These portfolios are art randomized portfolios. Each image is derived from an 8-B seed. Therefore, an authentication server does not need to store the whole image; it simply needs to store the 8-B seed. Another recognition-based graphical password is Pass faces [8]. Pass faces simply works by having the user select a subgroup of k faces from a group of n faces. For authentication, the system shows m faces and one of the faces belongs to the subgroup k. The user has to do the selection many times to complete the authentication process. Another scheme is the Story scheme [9], which requires the selection of pictures of objects (people, cars, foods, airplanes, sightseeing, etc.) to form a story line. Davis et al. [9] concluded that the user’s choices in Pass faces and in the Story scheme result in a password space that is far less than the theoretical entropy. Therefore, it leads to an insecure authentication scheme. The graphical password schema of Blonder [6] is considered to be recall based since the user must remember selection locations. Moreover, Pass Point [10]–[12] is a recall-based graphical password schema, where a background picture is presented and the user is free to select any point on the picture as the user’s password (user’s Pass Point). Draw a Secret (DAS), which is a recall-based graphical password schema and introduced by Jermyn et al. [13], is simply a grid in which the user creates a drawing. V. METHODOLOGY For collecting the data about 3D password the method has been used is that consulting the related eBooks, forums, research papers, newspapers, blogs and direct help from different companies and thesis. VI. DATA COLLECTION A company conducted a user study on 3-D passwords using the experimental 3-D virtual environments. The study reviewed the usage of textual passwords and other authentication schemes. The study covered almost 30

users. The users varied in age, sex, and education level. Even though it is a small set of users, the study produced some distinct results [5]. Company observed the following regarding textual passwords, 3-D passwords, and other authentication schemes. VII. DATA ANALYSIS 1. Most users who use textual passwords of 9–12 character lengths or who use random characters as a password have only one to three unique passwords. 2. More than 50% of user’s textual passwords are eight characters or less. 3. Almost 25% of users use meaningful words as their textual passwords. 4. Almost 75% of users use meaningful words or partially meaningful words as their textual passwords. In contrast, only 25% of users use random characters and letters as textual passwords. 5. Over 40% of users have only one to three unique textual passwords, and over 90% of users have eight unique textual passwords or less. 6. Over 90% of users do not change their textual passwords unless they are required to by the system. 7. Over 95% of users under study have never used any graphical password scheme as a means of authentication. 8. Most users feel that 3-D passwords have a high acceptability. 9. Most users believe that there is no threat to personal privacy by using a 3-D password as an authentication scheme. 3D Password scheme is combination of re- call based, recognized based, Biometrics etc. into single authentication technique [1]. Due to use of multiple schemes into one scheme password space is increased to great extent. More secure authentication scheme over currently available schemes. Time and memory requirement is large. Shoulder-suffering attack is still can affect the schema. More expensive as cost required is more than other schemes. VIII. CONCLUSION The 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single 3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes. The choice of what authentication schemes will be part of the user’s 3-D password reflects the user’s preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical passwords as part of their 3-D password. On the other hand, users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3-D password. Moreover, users who prefer to keep any kind of biometrical data private might not interact with objects that require biometric information. Therefore, it is the user’s choice and decision to construct the desired and preferred 3-D password. IX. REFERENCES [1] ALSULAIMAN, F.A.; EL SADDIK, A., "THREE- FOR SECURE," IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL.57, NO.9, PP 1929-1938.SEPT. 2008. [2] DUHAN POOJA, GUPTA SHILPI , SANGWAN SUJATA, & GULATI VINITA, ―SECURED AUTHENTICATION: 3D PASSWORD‖ , I.J.E.M.S., VOL.3(2),242 – 245, 2012. [3] GROVER AMAN, NARANG WINNIE, ―4-D PASSWORD: STRENGTHENING THE AUTHENTICATION SCENE‖ , INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 10, OCTOBER-2012. [4] A.B.GADICHA , V.B.GADICHA , ―VIRTUAL REALIZATION USING 3D PASSWORD‖ , IN INTERNATIONAL JOURNAL OF ELECTRONICS AND COMPUTER SCIENCE ENGINEERING, ISSN 2277- 1956/V1N2-216-222. [5]J. Thorpe and P. C. van Oorschot, “Graphical dictionaries and the memorable space of

graphical passwords,” in Proc. USENIX Security, San Diego, CA, Aug. 9–13, 2004, p. 10. Adams and M. A. Sasse, “Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures,”Commun. ACM, vol. 42, no. 12, pp. 40–46, Dec. 1999. [6] G. E. BLONDER, “GRAPHICAL PASSWORD,” U.S. PATENT 5 559 961, SEP. 24, 1996. [7] R. DHAMIJA AND A. PERRIG, “DÉJÀ VU: A USER STUDY USING IMAGES FOR AUTHENTICATION,” IN PROC. 9TH USINEX SECURITY SYMP., DENVER, CO, AUG. 2000, PP. 45–58. [8] REAL USER CORPORATION, THE SCIENCE BEHIND PASSFACES. (2005, OCT.). [ONLINE]. AVAILABLE: HTTP://WWW.REALUSERS.COM [9] D. DAVIS, F. MONROSE, AND M. K. REITER, “ON USER CHOICE IN GRAPHICAL PASSWORD SCHEMES,” IN PROC. 13TH USENIX SECURITY SYMP., SAN DIEGO, CA, AUG. 2004, PP. 1–14. [10] S. WIEDENBECK, J. WATERS, J.-C. BIRGET, A. BRODSKIY, AND N. MEMON, “AUTHENTICATION USING GRAPHICAL PASSWORDS: EFFECTS OF TOLERANCE AND IMAGE CHOICE,” IN PROC. SYMP. USABLE PRIVACY SECURITY, PITTSBURGH, PA, JUL. 2005, PP. 1–12. [11] D. DAVIS, F. MONROSE, AND M. K. REITER, “ON USER CHOICE IN GRAPHICAL PASSWORD SCHEMES,” IN PROC. 13TH USENIX. [12] S. WIEDENBECK, J. WATERS, J.-C. BIRGET, A. BRODSKIY, AND N. MEMON, “PASSPOINTS: DESIGN AND LONGITUDINAL EVALUATION OF A GRAPHICAL PASSWORD SYSTEM,” INT. J. HUMAN-COMPUT. STUD. (SPECIAL ISSUE ON HCI RESEARCH IN PRIVACY AND SECURITY), VOL. 63, NO. 1/2, PP. 102–127, JUL. 2005.JERMYN, A. MAYER, F. MONROSE, M. K. REITER, AND A. D. RUBIN, “THE DESIGN AND ANALYSIS OF GRAPHICAL PASSWORDS,” IN PROC. 8TH USENIX SECURITY SYMP., WASHINGTON DC, AUG. 1999, PP. 1–14. [13] J. THORPE AND P. C. VAN OORSCHOT, “GRAPHICAL DICTIONARIES AND THE MEMORABLE SPACE OF GRAPHICAL PASSWORDS,” IN PROC. USENIX SECURITY, SAN DIEGO, CA, AUG. 9–13, 2004, P. 10. ADAMS AND M. A. SASSE, “USERS ARE NOT THE ENEMY: WHY USERS COMPROMISE COMPUTER SECURITY MECHANISMS AND HOW TO TAKE REMEDIAL MEASURES,”COMMUN. ACM, VOL. 42, NO. 12, PP. 40–46, DEC. 1999.

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

3-D Secure - Wikipedia, the free encyclopedia

3-D Secure XML-based protocol designed to be an additional security layer for online credit and debit card transactions. It was originally developed by ...
Read more

3-D Secure – Wikipedia

3-D Secure ist ein Verfahren, das für zusätzliche Sicherheit bei Online-Kreditkartentransaktionen eingesetzt wird. Es wurde von der ...
Read more

3 D Password Login - YouTube

The video shows the implementation of a 3-D password login system. A user walks through the 3-D environment and perform certain actions such as ...
Read more

3D ContentCentral

Passwort: Anmeldung speichern. Passwort vergessen? Registrierung erforderlich? Diese Meldung zukünftig nicht mehr anzeigen. Wir verwenden Cookies für das ...
Read more

kartensicherheit.de - 3D Secure

Die Hausbank verifiziert das Passwort und gibt die Transaktion frei. ... Demo herunterladen (Flash-Animation als ZIP-Datei) (zip, 638.3 KB) 17.05.2011.
Read more

Password Recovery Software

Password Recovery Software : ... May 31 – June 3, 2015 Myrtle Beach, SC. ... Owner, R & D Consulting. Thanks for your help, ...
Read more

3-D Secure - Viseca Card Services SA | Mastercard und Visa ...

3-D Secure ist ein international anerkannter Sicherheitsstandard für Kartenzahlungen im Internet. Bei einem Online-Einkauf kontrollieren und bestätigen ...
Read more

1&1 Login

Passwort-Center. Kundenpasswort vergessen? Wir helfen Ihnen gerne! Kundennummer oder Nutzernamen prüfen! Geben Sie einfach Ihre Kundennummer oder Ihren ...
Read more