Preview

3D PASSWORD FOR MORE SECURE AUTHENTICATION

Good Essays
Open Document
Open Document
725 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3D PASSWORD FOR MORE SECURE AUTHENTICATION
3D PASSWORD FOR MORE SECURE AUTHENTICATION

INTRODUCTION

Normally the authentication scheme the user undegoes is paticularly very lenient or very strict.Throughout the yeras authentication has been a very interesting approach.With all the means of technology developing ,it can be very easy for 'others ' to fabricate or to steal identity or to hack someones password.Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key.The algorithms are such based to pick a random number in the range of 10^6 and therefore the possbilities of the sane number coming is rare.

Users nowadays are provided with major password stereotypes such as textual passwords,biometric scanning,tokens or cards(such as an ATM) etc.Mostly textual passwords follow an encryption algorithm as mentioned above.Biometric scanning is your "natural" signature and Cards or Tokens prove your validity.But some people hate the fact to carry around their cards,some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names,grilfriends etc.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.Now with the technology change,fast processors and many tools on the Internet this has become a Child 's Play.

Therefore we preset our idea, the 3D passwords which are more customisable, and very interesting way of authentication.

WORKING

Now the passwords are based on the fact of Human memory.Generally simple passwords are set so as to quickly recall them.The human memory,in our scheme has to undergo the facts of Recognition,Recalling,Biometrics or Token based authentication.

Once implemented and you log in to a secure site,the 3D password GUI opens up.This is an additional textual passwords which the user can simply put.Once he goes through the first authentication, a 3D virtual room will open on the



References: IEEE paper:3D passwords for more secure authentication-Fawaz A.Alsulaiman and Abdulmotaleb El Saddik | | | Reference: http://www.seminarprojects.com/Thread-3d-password-for-more-secure-authentication-full-report#ixzz1iyw8elvg

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    Group Policy Object that will display information about previous logons while you are trying to login yourself. So basically, you are going to be able to see who has logged on to the machine before you.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The PASSWORD EXPIRE option can be used to force a user to change his or her password at the time of the next login.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assesment 1

    • 477 Words
    • 3 Pages

    situation you lost that you can't have access to all the password have this policy enable.…

    • 477 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    It is known as not a normal practice, it is used for applications or programs to read the users password for permission to use. It stores the password as plain text, and used in last resort situations where there is no need to protect the password or other options are outweighed for risk.…

    • 504 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Many services, including has Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone…

    • 691 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It takes a great deal of effort to encode things into memory. It does not always consist of repetition. There is a difference in an automatic response and something you have to work at. Drinking when thirsty is an automatic response, as opposed to riding a bicycle take concentration and you need to put the steps into memory. People tend to process information differently. Two individuals can watch the same video and gather different bits of information but both correctly state the main point of the video. Simply trying to remember things by simple repetition simply will not do. When choosing a password, people tend to choose something that has meaning to them so they will not forget it. I tend to use one of three passwords in different variations and I tend to forget them until I request a password reset.…

    • 311 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    6. What is the purpose of the login.defs file? Creates accounts and is site specific for the shadow login. This has rules like expirations, password requirements.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays