3D PASSWORD SEMINAR REPORT
3D PASSWORD SEMINAR REPORT
3D PASSWORD SEMINAR REPORT
INSTITUTE OF TECHNOLOGY
Seminar
Report On
BY DAGNACHEW DEGAYEHU
Contents
1. Introduction…………………………………………………………………………………2
2. How 3D developed…………………………………………………..…………………….3
3. How it works……………………………………………………….………………………3
5. Area of application…………………………………………………………………………5
6. Summer……………………………………………………….…………………………….6
7. Conclusions……………………………………………….………………………………..7
8. References…………………………………………………..………………………………7
1. INTRODUCTION
Password. Moreover, a user who often forgets textual passwords prefers to select biometrics
or smart cards as part of their 3D Password. Hence, users are given full freedom to pick and
The increase in the usage of computer systems has given rise to many security concerns.
One of the major security concerns is authentication, which is the process of validating who
you are to whom you claimed to be.
Current authentication systems suffer from various weaknesses. People usually use textual
passwords; however they do not follow their requirements. The issue is that users intend to
use meaningful words from the dictionary, which eventually are easier to break and
vulnerable to attack.
As a solution, many biometric authentications have been proposed. The increase in the usage
of computer systems has given rise to many security concerns.
One of the major security concerns is authentication, which is the process of validating who
you are to whom you claimed to be.
Current authentication systems suffer from various weaknesses. People usually use textual
passwords; however they do not follow their requirements. The issue is that users intend to
use meaningful words from the dictionary, which eventually are easier to break and
vulnerable to attack.
1. Retinal scans
2. Finger scanning
3. Iris recognition
4. Facial recognition
5. Finger vein ID
3. HOW IT WORK?
The 3DS authentication process uses Secure Sockets Layer (SSL) protocol to send
Extensible Mark-up Language (XML) messages with client authentication, providing digital
certificates to confirm the identity of all parties involved in the transaction. 3D passwords are
a sophisticated multi-factor authentication system that combines various types of security
measures into a single, comprehensive approach. Here’s a breakdown of how they work:
1. Virtual Environment: The user interacts with a 3D virtual environment, which can be
customized with various objects and actions. This environment serves as the platform for
creating the password.
Textual Passwords: Traditional passwords that the user types in. Biometrics: Fingerprint,
facial recognition, or other biometric data.
3. Interaction: The user navigates through the virtual environment and interacts with objects
in a specific sequence. For example, they might move an object, enter a code, or perform a
gesture. Each interaction adds a layer of security.
4. Customization: The virtual environment and the interactions can be highly customized,
making it difficult for unauthorized users to replicate the exact sequence of actions required
to authenticate1.
-User-friendly
-Prevents phishing
2. Learning Curve Adapting to 3D passwords may require a significant learning curve for
both users and system administrators....
6. SUMMERY
Versatile Applications: Suitable for critical systems, mobile devices, and virtual
environments.
7. CONCLUSION
However, there are some drawbacks, including a learning curve for users and potential
usability issues1. Despite these challenges, the enhanced security provided by 3D passwords
makes them a valuable addition to any organization’s security measures
8. REFERENCES
April 2019 IJSDR | Volume 4, Issue 4 1Mrs. Ashbins B P, 2Ms. Bohemia J, 3Ms. CT S, 4Mr.
G M AK shay Baht, 5Mr. Naveen Kumar N 1Assistant Professor, 2,3,4,5UG Students
Department of Computer Science and Engineering. Multifactor Authentication using 3D
Password Nursery Bhaidkar1 Pratik Prasad2 and Akashi Kimble 3Department of Computer
Engineering, St. John College of Engineering and Management Kumar, kepi & Goya, Dr
Dinesh & Scholar, M. (2014). 3D Password Based Authentication System Using Multiple
Layers. International Global Journal for Engineering Research. 9. 1-2014.