3d ..

Slides:



Advertisements
Similar presentations
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
Access Control Methodologies
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
FIT3105 Smart card based authentication and identity management Lecture 4.
第十章 1 Chapter 10 Authentication of People. 第十章 2 Introduction This chapter deals with password-related issues like how to force users to choose unguessable.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
Security Awareness: Applying Practical Security in Your World
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Identity Management, what does it solve By Gautham Mudra.
Marjie Rodrigues
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Chapter 10: Authentication Guide to Computer Network Security.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
The Impact of Physical Security on Network Security
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
3D password Umesh ECE.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
What state are we in?. What are the two main parts of a computer program? – Data – Algorithms We have previously emphasized – how real-world information.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
G53SEC 1 Authentication and Identification Who? What? Where?
Humanity versus Entropy: Problems with Keeping a Secret Eamon Johnson CWRU Math 408, Spring 2012 Project Presentation.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Presented by Sharan Dhanala
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
CSCE 201 Identification and Authentication Fall 2015.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Computer Security Set of slides 8 Dr Alexei Vernitski.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
3D Password.
Towards Another Step from 3D Password to 4D Password:
PASSWORD SECURITY A Melbourne Athenaeum Library
A device tat transfers data from the outside world into a computer
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
State Diagrams What state are we in?.
Authentication Schemes for Session Passwords using Color and Images
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Adaptive Authentication
Strong Password Authentication Protocols
COEN 351 Authentication.
Presentation transcript:

3d .

CONTENTS:- INTRODUCTION EXISTING SYSTEM PROPOSED SYSTEM BRIEF DESCRIPTION OF A SYSTEM SYSTEM IMPLEMENTATION 3D PASSWORD SELECTION AND INPUT APPLICATIONS CONCLUSION

Introduction: A multifactor authentication scheme. The user login by navigating through a 3D environment. Collected user action and interactions in the virtual environment construct the 3Dpassword.

EXISTING SYSTEM : Current authentication systems suffer from many weaknesses. Textual passwords are commonly used Many available graphical passwords have a password space that is less than or equal to the textual password space Smart cards or tokens can be stolen. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme

Proposed system : The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. The following requirements are satisfied in the proposed scheme   The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3. The new scheme provides secrets that can be easily revoked or changed.

BRIEF DESCRIPTION OF SYSTEM: The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements.

SYSTEM IMPLIMENTATION For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.

Objects required : 1) A computer with which the user can type. 2) A fingerprint reader that requires the user’s fingerprint. 3) A biometric recognition device. 4)A paper or a white board that a user can write, sign, or draw on. 5) An automated teller machine (ATM) that requests a token; 6) A light that can be switched on/off. 7) A television or radio where channels can be selected. 8) A staple that can be punched. 9) A car that can be driven. 10) A book that can be moved from one place to another. 11) Any graphical password scheme. 12) Any real life object. 13) Any upcoming authentication scheme.

Principle: The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ), where x1 = x2 , y1 = y2 , and z1 = z2 . Therefore, to perform the legitimate 3D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.

3D PASSWORD SELECTION AND INPUT Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” The initial representation of user actions in the 3Dvirtual environment can be recorded as follows:

(10, 24, 91) Action = Open the car door. (10, 24, 91) Action = Close the car door. (4, 34, 18) Action = Typing, “F”. (4, 34, 19) Action = Typing, “A”. (4, 34, 17) Action = Typing, “L”. (4, 34, 16) Action = Typing, “C”. (4, 34, 15) Action = Typing, “O”. (4, 34, 14) Action = Typing, “N”.

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. Real Life Similarity. Object uniqueness . Three Dimensional Virtual Environment Size. Number of objects and their types . System Importance .

3D PASSWORD APPLICATION   The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources Critical server Nuclear and military facilities . Airplanes and jet fighters .

In addition, 3D passwords can be used in less critical systems A small virtual environment can be used in the following systems like ATM Personal Digital Assistance Desktop Computers & laptop logins Web Authentication Security Analysis

STATE DIAGRAM

SECURITY ANALYSIS 3D Password space size. 3D password distribution knowledge.

Attacks and Counter measures Brute Force Attack. Well-Studied Attack. Shoulder Surfing Attack. Timing Attack.

CONCLUSION The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore the resulting password scheme is flexible ,strong enough ,easy to memorize as a little story and secured authentication

EXPECTED FUNCTIONALITIES 1.The user can decide his own authentication schemes. If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above. 2.The authentication can be improved since the un authorised persons will not interact with the same object as a legitimate user would. We can also include a timer .Higher the security higher the time. 3.The 3D environment can change according to users request. 4.It would be difficult to crack using regular techniques .Since all the algorithms follow steps to authenticate ,our project has no fixed number of steps .Hence to calculate all those possibilities and decipher them is not easy. 5.Can be used in critical areas such as Nuclear Reactors, Missile Guiding Systems etc. 6.Added with biometrics and card verification ,the scheme becomes almost unbreakable.

REFERENCES [1] X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annu. Compute. Security Appl. Conf., Dec. 5–9, 2005, pp. 463–472. [2] D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,” in Proc. USENIX Security Workshop, 1990, pp. 5–14. [3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003.

THANK U!!!

Comments From U Are Always Welcome…????