3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
#1


Members:
Tushar V.Nagarkar
Yatin Mahajan
Sagar Shinde


3D PASSWORD FOR MORE SECURE AUTHENTICATION

INTRODUCTION

Normally the authentication scheme the user undegoes is paticularly very lenient or very strict.Throughout the yeras authentication has been a very interesting approach.With all the means of technology developing ,it can be very easy for 'others' to fabricate or to steal identity or to hack someones password.Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key.The algorithms are such based to pick a random number in the range of 10^6 and therefore the possbilities of the sane number coming is rare.

Users nowadays are provided with major password stereotypes such as textual passwords,biometric scanning,tokens or cards(such as an ATM) etc.Mostly textual passwords follow an encryption algorithm as mentioned above.Biometric scanning is your "natural" signature and Cards or Tokens prove your validity.But some people hate the fact to carry around their cards,some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names,grilfriends etc.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.Now with the technology change,fast processors and many tools on the Internet this has become a Child's Play.

Therefore we preset our idea, the 3D passwords which are more customisable, and very interesting way of authentication.


WORKING

Now the passwords are based on the fact of Human memory.Generally simple passwords are set so as to quickly recall them.The human memory,in our scheme has to undergo the facts of Recognition,Recalling,Biometrics or Token based authentication.

Once implemented and you log in to a secure site,the 3D password GUI opens up.This is an additional textual passwords which the user can simply put.Once he goes through the first authentication, a 3D virtual room will open on the screen.In our case, lets say a virtual garage.

Now in a day to day garage one will find all sorts of tools, equipments ,etc.each of them having a unique properties.The user will then interact with these properties accordingly.Each object in the 3D space, can be moved around in an (x,y,z) plane.Thats the moving attribute of each object.This property is common to all the objects in the space.Suppose a user logs in and enters the garage.He sees and picks a screw-driver(initial position in xyz coordinates (5,5,5)) and moves it 5 palces to his right (in XY plane ie (10,5,5).That can be identified as an authentication.

Only the true user understands and recognizes the object which he has to choose among many.This is the Recall and Recognition part of human memeory coming into play.Interestingly,a password can be set as approaching a radio and setting its frequency to number only the user knows.

Security can be enhanced by the fact of including Cards and Biometric scanner as input.There can be levels of authentication a user can undergo.More the confidentiality more the complexity.In that scenario a virtual environment can be developed as a globe,a city or simply a garage.


EXPECTED FUNCTIONALITIES

1.The user can decide his own authentication schemes.If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above.

2.The authentication can be improved since the unauthorised persons will not interact with the same object as a legitimate user would.We can also include a timer.Higher the security higher the timer.Say after 20 seconds a weak password will be thrown out.

3.The 3D environment can change according to users request.

4.It would be difficult to crack using regular techniques.Since all the algorithms follow steps to authenticate,our project has no fixed number of steps.Hence to calculate all those possibilites and decipher them is not easy.

5.Can be used in critical areas such as Nuclear Reactors,Missile Guiding Systems etc.

6.Added with biometrics and card verification,the scheme becomes almost unbreakable.



References


IEEE paper:3D passwords for more secure authentication-Fawaz A.Alsulaiman and Abdulmotaleb El Saddik
Reply
#2
hfj chntfuj fjjjjj hgutu fhhutitoy
Reply
#3
can i get the code for this project or any kind of a hint to this kind of a project....
i am a final year student of engineering..
my branch is I.T.
hope u will help me in doing this project...
plz reply to me.....
Reply
#4
has this technology been implemented anywhere??
what are its practical applications?
please reply.
Reply
#5
3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Reply
#6
Its really a great concept can u plz mail me the details about the project..
It will be of gr8 help....
Reply
#7
Reply
#8
Smile 
i need this ,its quite interesting ............
Reply
#9
Question 
dgdscgbcbc
Reply
#10
Hey i need the detailed info and report regarding this topic. if possible i need the code....please help me...
Reply
#11
hi can u send me ppt for 3-d password for secure authentication
Reply
#12
This article is presented by:Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, Senior Member, IEEE
Three-Dimensional Password for More
Secure Authentication


ABSTRACT
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this paper, we present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space.

INTRODUCTION
THE DRAMATIC increase of computer usage has given rise to many security concerns. One major security concern is authentication, which is the process of validating who you are to whom you claimed to be. In general, human authentication techniques can be classified as knowledge based (what you know), token based (what you have), and biometrics (what you are). Knowledge-based authentication can be further divided into two categories as follows: 1) recall based and 2) recognition based [1]. Recall-based techniques require the user to repeat or reproduce a secret that the user created before. Recognitionbased techniques require the user to identify and recognize the secret, or part of it, that the user selected before [1]. One of the most common recall-based authentication schemes used in the computer world is textual passwords. One major drawback of the textual password is its two conflicting requirements: the selection of passwords that are easy to remember and, at the same time, are hard to guess. Klein [2] collected the passwords of nearly 15 000 accounts that had alphanumerical passwords, and he reached the following observation: 25% of the passwords were guessed by using a small yet well-formed dictionary of 3 × 106 words. Furthermore, 21% of the passwords were guessed in the first week and 368 passwords were guessed within the first 15 min. Klein [2] stated that by looking at these results in a system with about 50 accounts, the first account can be guessed in 2 min and 5–15 accounts can be guessed in the first day. Klein [2] showed that even though the full textual password space for eight-character passwords consisting of letters and numbers is almost 2 × 1014 possible passwords, it is easy to crack 25% of the passwords by using only a small subset of the full password space. It is important to note that Klein’s experiment was in 1990 when the processing capabilities, memory, networking, and other resources were very limited compared to today’s technology. Many authentication systems, particularly in banking, require not only what the user knows but also what the user possesses (token-based systems). However, many reports [3]–[5] have shown that tokens are vulnerable to fraud, loss, or theft by using simple techniques. Graphical passwords can be divided into two categories as follows: 1) recognition based and 2) recall based [1]. Various graphical password schemes have been proposed [6]–[8], [10]–[12]. Graphical passwords are based on the idea that users can recall and recognize pictures better than words. However, some of the graphical password schemes require a long time to be performed. Moreover, most of the graphical passwords can be easily observed or recorded while the legitimate user is performing the graphical password; thus, it is vulnerable to shoulder surfing attacks. Currently, most graphical passwords are still in their research phase and require more enhancements and usability studies to deploy them in the market. Many biometric schemes have been proposed; fingerprints, palmprints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition are all different biometric schemes. Each biometric recognition scheme has its advantages and disadvantages based on several factors such as consistency, uniqueness, and acceptability. One of the main drawbacks of applying biometrics is its intrusiveness upon a user’s personal characteristic. Moreover, retina biometrical recognition schemes require the user to willingly subject their eyes to a low-intensity infrared light. In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users.


Reply
#13

[attachment=6403]


INTRODUCTION

Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.

Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
Reply
#14
can u send full report of this topic to my mail id.
Reply
#15
its there on top of the page.. a 92 kb doc file..
Reply
#16
hi
there is an attached file on above posts. please download it.
Reply
#17
Giv me the project
Nic idea
hander.sharma007[at]gmail.com
Reply
#18
hello chanderpie,
please download the attached file
Reply
#19
Reply
#20
badaru,
what you want on this topic??
Reply
#21
please give me full report on 3d password seminars
Reply
#22
full seminar report of atleast 10 pages
Reply
#23
3D PASSWORD seminar atleast 10 pages
Reply
#24
i too need full wid code can u help me out
Reply
#25
hi thue jsadjgm jag fjg jpgjajg ajr jSad
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: download full ppt report on 3d password, report on 3d password**roblem study, 3d secure password report, more secure computing environment, source code for a more secure steganography method in spatial domain in matlab, password authentication failed postgres, source code for three dimensional password for more secure authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 31,275 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 24,058 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 18,524 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 20,152 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 56,729 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 66,913 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 16,898 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 34,622 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 34,722 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 23,293 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: