3D PASSWORD SEMINAR REPORT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

WERABE UNIVESITY

INSTITUTE OF TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY

Seminar

Report On

SEMINAR TITTLE: 3D PASSWORD

BY DAGNACHEW DEGAYEHU

WERABE, Ethiopia (Oct, 2024)


Tables of contents

Contents
1. Introduction…………………………………………………………………………………2

2. How 3D developed…………………………………………………..…………………….3

3. How it works……………………………………………………….………………………3

4. Advantages and disadvantages……………………………………………………………..5

5. Area of application…………………………………………………………………………5

6. Summer……………………………………………………….…………………………….6

7. Conclusions……………………………………………….………………………………..7

8. References…………………………………………………..………………………………7
1. INTRODUCTION

A 3D password is an innovative authentication technique that combines various existing


methods like text passwords, graphical passwords, and biometrics into a single 3D virtual
environment. Users interact with objects in this virtual world to create their unique 3D
password. When logging in, they must recreate the same sequence of interactions, making it
more secure and harder for attackers to guess. The dramatic increase of computer usage
has given rise to many security concerns. One major security concern is authentication,
which is the process of validating who you are to whom you claimed to be.

The 3D Password is a multi-featured, multi-factor authentication technique that integrates the


advantages of existing authentication schemes into a single virtual 3D environment. This
presentation will concentrate on the notion of the new authentication technique, how it works,
and how it might be used.

3D password is an XML-based protocol designed to be an added security layer for online


transactions. This strategy was initially developed by Arco Systems, Inc. and first deployed
by Visa with the purpose of refining the security of Internet payments and is offered to clients
under the name Verified by Visa. The 3D password is very userfriendly and very interesting
way of authentication process. Generally passwords are set on the bases of human memory.
Usually simple passwords like pet names, places and phone numbers are set so as to quickly
recall them. But in this 3d scheme human memory has to undertake the facts of recalling,
recognition, token or biometrics based authentication in one single authentication system.
When the 3d password is implemented and we log in to a protected site, the 3D password
GUI opens up. Initially in 3d password system user can combine the earlier existing schemes
for example, textual passwords, biometrics, graphical passwords, and even token based etc. in
a single 3D virtual environment. The user is given the permission for choosing the type of
authentication strategy which he is comfortable. A user who is good at memorizing the
password might prefer to select textual or graphical password schema as a part of their 3d

Password. Moreover, a user who often forgets textual passwords prefers to select biometrics
or smart cards as part of their 3D Password. Hence, users are given full freedom to pick and

select how the ideal and desired 3D Password will be constructed.


2. How 3D Password Developed and who developed it?

The increase in the usage of computer systems has given rise to many security concerns.
One of the major security concerns is authentication, which is the process of validating who
you are to whom you claimed to be.

Current authentication systems suffer from various weaknesses. People usually use textual
passwords; however they do not follow their requirements. The issue is that users intend to
use meaningful words from the dictionary, which eventually are easier to break and
vulnerable to attack.

A major drawback of the textual password is its conflicting requirements-


the selection of a password that is easy to remember (for the user), and at the same time, hard
to guess (to prevent unauthorized access to private data).

As a solution, many biometric authentications have been proposed. The increase in the usage
of computer systems has given rise to many security concerns.
One of the major security concerns is authentication, which is the process of validating who
you are to whom you claimed to be.

Current authentication systems suffer from various weaknesses. People usually use textual
passwords; however they do not follow their requirements. The issue is that users intend to
use meaningful words from the dictionary, which eventually are easier to break and
vulnerable to attack.

A major drawback of the textual password is its conflicting requirements-


the selection of a password that is easy to remember (for the user), and at the same time, hard
to guess (to prevent unauthorized access to private data).

As a solution, many biometric authentications have been proposed. These include:

1. Retinal scans

2. Finger scanning

3. Iris recognition

4. Facial recognition
5. Finger vein ID

Some factors include:

What a user KNOWS: that is their password.

What a user HAS: that is a smart card/hard token.

What a user IS: that is a retinal scan/ finger print.

3. HOW IT WORK?

The 3DS authentication process uses Secure Sockets Layer (SSL) protocol to send
Extensible Mark-up Language (XML) messages with client authentication, providing digital
certificates to confirm the identity of all parties involved in the transaction. 3D passwords are
a sophisticated multi-factor authentication system that combines various types of security
measures into a single, comprehensive approach. Here’s a breakdown of how they work:

1. Virtual Environment: The user interacts with a 3D virtual environment, which can be
customized with various objects and actions. This environment serves as the platform for
creating the password.

2. Multi-Factor Authentication: The 3D password system integrates multiple authentication


factors, such as:

Textual Passwords: Traditional passwords that the user types in. Biometrics: Fingerprint,
facial recognition, or other biometric data.

Token-Based Authentication: Using physical devices like smart cards or tokens.

Recognition-Based Authentication: Recognizing and interacting with objects in the virtual


environment

3. Interaction: The user navigates through the virtual environment and interacts with objects
in a specific sequence. For example, they might move an object, enter a code, or perform a
gesture. Each interaction adds a layer of security.
4. Customization: The virtual environment and the interactions can be highly customized,
making it difficult for unauthorized users to replicate the exact sequence of actions required
to authenticate1.

5. Enhanced Security: By combining multiple authentication factors and requiring specific


interactions within a virtual space, 3D passwords provide a higher level of security compared
to traditional password.

4. ADVANTEGE AND DISADVANTEG OF 3D PASSWORD

8.1 Advantages of 3d password:-

-More secure than traditional passwords

-User-friendly

-Prevents phishing

-Reduces shoulder surfing

-No other person can hack a 3D password

8.2. Disadvantage of 3d password:-

1. Complexity One of the major disadvantages of 3D passwords is their inherent


complexity....

2. Learning Curve Adapting to 3D passwords may require a significant learning curve for
both users and system administrators....

 3. Hardware and Software Requirements Another disadvantage of 3D passwords is


the requirement of specific hardware and software capabilities. ...

 4. Accessibility Challenges ...


5. AREA OF APPLICATION

3D passwords are an advanced authentication system that


combines multiple factors for enhanced security. Here are
some key application areas:
Critical Systems and Resources: Due to their high level of security,
3D passwords are ideal for protecting critical servers and sensitive
data in large organizations.
1. Mobile Devices: With the increasing use of mobile devices, 3D
passwords can provide a more secure and user-friendly
authentication option.
Virtual Environments: 3D passwords can be used in virtual
environments where users interact with 3D objects to authenticate
themselves.
2. Preventing Phishing and Shoulder Surfing: They are
effective in preventing phishing attacks and shoulder surfing
because they require interaction with 3D objects, making it
difficult for unauthorized users to replicate.

3. Multi-Factor Authentication: 3D passwords can combine


various authentication techniques, such as biometrics,
gestures, and text-based passwords, into a single system.

6. SUMMERY

3D passwords are an advanced authentication system that combines multiple authentication


factors into a single, interactive 3D environment. Users interact with various objects in a
virtual space to create a unique password. This method enhances security by making it
difficult for unauthorized users to replicate the authentication process. Key Features:
 Multi-Factor Authentication: Combines elements like biometrics, gestures, and
traditional passwords.

 Enhanced Security: Effective against phishing and shoulder surfing attacks.

 Versatile Applications: Suitable for critical systems, mobile devices, and virtual
environments.

7. CONCLUSION

In conclusion, 3D passwords offer a unique and advanced authentication system that


enhances security by combining multiple factors such as gestures, biometrics, and traditional
text-based passwords12. This multifactor approach makes it more challenging for
unauthorized users to gain access, providing a robust defence against common cyber threats1.

However, there are some drawbacks, including a learning curve for users and potential
usability issues1. Despite these challenges, the enhanced security provided by 3D passwords
makes them a valuable addition to any organization’s security measures

8. REFERENCES

April 2019 IJSDR | Volume 4, Issue 4 1Mrs. Ashbins B P, 2Ms. Bohemia J, 3Ms. CT S, 4Mr.
G M AK shay Baht, 5Mr. Naveen Kumar N 1Assistant Professor, 2,3,4,5UG Students
Department of Computer Science and Engineering. Multifactor Authentication using 3D
Password Nursery Bhaidkar1 Pratik Prasad2 and Akashi Kimble 3Department of Computer
Engineering, St. John College of Engineering and Management Kumar, kepi & Goya, Dr
Dinesh & Scholar, M. (2014). 3D Password Based Authentication System Using Multiple
Layers. International Global Journal for Engineering Research. 9. 1-2014.

You might also like