3-D Password for More Security

Only available on StudyMode
  • Download(s) : 118
  • Published : April 21, 2013
Open Document
Text Preview
ADVANCED E-SECURITY
CP5603
MINOR RESEARCH REPORT

Submitted By: Neeraj Kumar
MIT-MBA
Student ID. : 12682310

TABLE OF CONTENTS
Title Page no ABSTRACT 3 INTRODUCTION 2-6 1.1 Authentication 5 1.2 Authentication Methods 5-6 1.3 Organization of the Report 6 ACTUAL RESEARCH WORK 7-8 3D PASSWORD SYSTEM

2.1 Overview 7 2.2 Innovative Component 7-8 2.3 Comparison with Current Authentication Systems 8 IMPLEMENTATION OF THE 3D PASSWORD 9-16 3.1 Virtual Object Recognition 9 3.2 3D Password Selection and Inputs 10-13 3.3 3D Virtual Environment Design Guidelines 14-16 APPLICATIONS 17-18 4.1 Advantages 18 CONCLUSION 19 REFERENCES 20

ABSTRACT

Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this report mechanism of secure authentication is dicussed.The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space.

INTRODUCTION

In this chapter the password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack...
tracking img