3D Password Technology

 3D Password Technology

Authentication is one of the most important security services provided to the system by the different authentication schemes or algorithms. To protect any system authentication must be provided so that only authorized persons can have the right to use or handle that system & data related to that system securely. There are many authentication algorithms are available some are effective & secure but having some drawbacks. Previously there are many authentication techniques were introduced such as graphical passwords, text passwords, Biometric authentication, etc. generally, there are four types of authentication techniques are available such as: -Knowledge-based: means what you know. Textual password is the best example of this authentication scheme. – -Token-based: means what you have. This includes Credit cards, ATM cards, etc as example. -Biometrics: means what you are. Includes Thumb impression, etc. -Recognition Based: means what you recognize. Includes graphical password, iris recognition, face recognition, etc. 

Ideally, there are two types of Authentication schemes are available according to the nature of the scheme & techniques used, those types are 

1) Recall based: In this authentication tech. Users need to recall or remember his/her password which is created before. Knowledge based authentication is a part of this technique, E.g. Textual password, graphical password, etc. this technique is commonly used all over the world where security needed. 

2) Recognition based: In this user need to identify, recognize the password created before. Recognition-based authentication can be used in the graphical password. Generally, this technique is not used much more as Recall based is used. Still, both recall-based & recognition-based authentication techniques having some drawbacks & limitations when they are used separately or used single authentication scheme at a time. To overcome these drawbacks & limitations of previously existing authentication schemes. We have introduced a new authentication scheme that is based on previously existing schemes. This authentication scheme is based on a combination of passwords called as “3D Password”. Which is a multifactor scheme that uses a combination of the above-discussed scheme as well as biometric & many other schemes. All these schemes are implemented in a virtual 3D environment while creating 3d Password. Where this environment contains various virtual objects through which the user interacts with. The interaction with 3D environment changes as per user changes. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions.


3D password

Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your “natural” signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning). Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends, etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors, and many tools on the Internet, this has become a Child’s Play.

3D Virtual environment

3d virtual environment affects the usability, effectiveness, and acceptability of a 3D password system.

3d virtual environment reflects the administration needs and the security requirements.

The design of 3d virtual environment should follow these guidelines

  • Real-life similarity
  • Object uniqueness &distinction
  • 3d virtual environment size
  • Number of objects & their types
  • System importance

Advantages

  • Flexibility
  • Strength
  • Ease to memorize
  • Respect of privacy

Application

The 3D password’s main application domain are protecting critical system and resources.

  • Critical servers
  • Nuclear reactors & military facilities.
  • Airplanes and missile guiding.

A small virtual environment can be used in the following system like:

  • ATM
  • Personal digital assistance
  • Wed authentication etc.

Attacks and countermeasures

  • Brute force attack
  • Well studied attack
  • Should-surfing attack

The 3D password is a multi-factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics-based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.

like and comments are most welcome

Comments

Post a Comment

Popular posts from this blog

Top Mobile App Development Tools That Are Open Source

Cross Platform Mobile App Development