Presentation is loading. Please wait.

Presentation is loading. Please wait.

Towards Another Step from 3D Password to 4D Password:

Similar presentations


Presentation on theme: "Towards Another Step from 3D Password to 4D Password:"— Presentation transcript:

1 Towards Another Step from 3D Password to 4D Password:
A New Generation Security System Initiative Presented by: Saurabh Allawadhi

2 Abstract We have many authentication schemes presently, but they all have a few disadvantages. So recently, the 3D password paradigm was introduced. The 3D password is multi-factor authentication system as it uses a various authentication techniques such as graphical password, textual password etc. Most important part of 3D password is inclusion of 3D virtual environment. However the 3D Password is still in its initial stages. Moreover, gathering attackers from various foundations to break the system is one of the future works that will lead to system improvement and demonstrate the complexity of breaking a 3D password. This paper introduces a study of the 3D password and a way to deal with reinforce it by method for including a Fourth dimension, that that deals with time recording and gesture recognition, and that would help strengthen the authentication paradigm. Henceforth we endeavor to propose a 4D Password as a one-up technique to the 3D Password.

3 Introduction Authentication Scheme is one of the most important security service provided to system by the different authentication schemes or algorithms. Generally there are four types of authentication schemes are available such as: Knowledge based: This means what you know. This includes Textual password. Token based: This means what you have. This includes ATM cards, debit card, credit card etc. Biometrics: This means what you are. This includes Thumb impression, fingerprint etc. Recognition Based: This means what you recognize. This includes graphical password, face recognition, iris recognition etc.

4 The 3d password scheme 3D Password is multi-factor authentication scheme. So that many password schemes like graphical password, biometric, textual password etc. can be used as a part of 3D Password. Selecting of different schemes is totally based on the category of user who is going to use this scheme to their system, Figure shows the state diagram of 3D Password Creation.

5 introducing 4d password
The 4-D Password scheme is an attempt to create the existing scheme even more secure, robust and powerful. We propose to add some another key to the current scheme, this can lend a lot of stability and make the attacks on user privacy even tougher to reach. This key, what we propose to refer to as the ‘FOURTH DIMENSION’ would be an encrypted string or message that encapsulates a gesture that the user is meant to create with his hands, in front of a webcam, aside from his password. Hence, the final password of the user would be: Hand Gesture + 3D Password.

6 Security analysis Shoulder Surfing Attack: In this attack, Attacker uses a camera for recording & capturing of 3D password. This attack is more effective than any other attacks on 3D password and some other graphical passwords. Timing Attacks: This attack is totally based on how much time required for completing successful sign- in using 3D password scheme In this attack it gives an indication of 3-D Passwords length to the attacker. Key logger: In this attack, the attacker installs an invisible code or a software called a key logger on system where authentication scheme is used, that is meant to capture all keys written through the user’s keyboard and output them as a stream in an in a text file.

7 Brute Force Attack: This attacks considers two points.
Required time to login: Time required for successful login varies from 25s to 2 min that means it is very time consuming. Cost required to attack: As it requires 3D virtual environment and 3D environment may contain biometric object, so the cost of making such an environment is very high.

8 Application Area Nuclear & Military areas. Airplane & Jetfighters.
Networking. Other Areas ATM, Cyber Cafes, Industries (for data security), critical servers, Laptop’s, Web Services etc.

9 Conclusion And Future Scope
There is always a chance of threat in 3D password as it is more prone to hacking. Also, 3D suffers from weakness like timing attacks, brute force attack etc. Therefore another level of security is added in 3D password to transform it to 4D password. 4D password consist of three parts that is all existing schemes of 3D password like text or graphic codes, a virtual 3D environment and a gesture recognition system. This schemes is completely user friendly i.e. user can easily select what type of authentic scheme like biometric or gestures along with 3D password it want to use for its organization. Our future work will be carried out in adding multidimensional password generation method to multi-level authentication technique. This combination of techniques such as fingerprint scanners along with retinal check can lead to another revolutionary concept of authentication that even overcome the utility and robustness of the current authentication schemes i.e. 3D password. Of course, the fourth dimension makes it totally exceptional.

10 Saurabh Allawadhi Nitin Kumar Sanjib Kumar Sahu Amit Prakash Singh
Thanking You Saurabh Allawadhi Nitin Kumar Sanjib Kumar Sahu Amit Prakash Singh


Download ppt "Towards Another Step from 3D Password to 4D Password:"

Similar presentations


Ads by Google