MINOR RESEARCH REPORT
Submitted By: Neeraj Kumar
Student ID. : 12682310
TABLE OF CONTENTS
Title Page no ABSTRACT 3 INTRODUCTION 2-6 1.1 Authentication 5 1.2 Authentication Methods 5-6 1.3 Organization of the Report 6 ACTUAL RESEARCH WORK 7-8 3D PASSWORD SYSTEM
2.1 Overview 7 2.2 Innovative Component 7-8 2.3 Comparison with Current Authentication Systems 8 IMPLEMENTATION OF THE 3D PASSWORD 9-16 3.1 Virtual Object Recognition 9 3.2 3D Password Selection and Inputs 10-13 3.3 3D Virtual Environment Design Guidelines 14-16 APPLICATIONS 17-18 4.1 Advantages 18 CONCLUSION 19 REFERENCES 20
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this report mechanism of secure authentication is dicussed.The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space.
In this chapter the password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack...