Beruflich Dokumente
Kultur Dokumente
CONTENTS
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security Analysis Attacks and Countermeasures Conclusion References
INTRODUCTION
Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED
Recall based Recognition based
BIOMETRIC BASED
GRAPHICAL PASSWORDS
Recognition based
Recall based
FUNCTIONALITIES REQUIRED
(10,24,91) Action=Open the office door; (10,24,91) Action=Close the office door; (4,34,18) Action= Typing,F; (4,34,18) Action= Typing,A; (4,34,18) Action= Typing,L; (4,34,18) Action= Typing,C; (4,34,18) Action= Typing,O; (4,34,18) Action= Typing,N; (10,24,80) Action= Pick up the pen; (1,18,80) Action= Drawing, point=(330,130).
Virtual Computer where user typing a textual password as a part of users 3D Password
System importance
APPLICATIONS
Critical servers. Nuclear and military facilities. Airplanes and jetfighters. ATMs, PDAs, desktop computers and laptops.
SECURITY ANALYSIS
Well-Studied Attack
Shoulder Surfing Attack Timing Attack
CONCLUSION
Commonly used authentication schemes are vulnerable to attacks. 3D Password is a multifactor authentication scheme. Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space. Users choice and decision to construct the desired and preferred 3D password
REFERENCES
[1]F. A. Alsulaiman and A. El Saddik, A novel 3D graphical password schema, IEEE Journal Virtual Environment, HumanComputer Interfaces, July 2008,pp.125-128. [2]X.Suo, Y. Zhu , and G. S. Owen, Graphical passwords: A survey, Proc.21st Annual Computer Security Applications Conference, Dec. 5-9,2005,pp.463-472.
[3]The science behind passfaces,http://www.realusers.com
[4] R. Dhamija and A. Perrig, Deja vu: A user study using images for authentication,Proc. 9th USINEX Security Symp.,Aug.2004,pp.45-58.
[5]I.Jermyn,A.Mayer,F.Monrose,M.K.Reiter,and A.D.Rubin, The design and analysis of 3D passwords, Special Issue on HCI Research in Privacy and Security,vol. 63,July 2005,pp.102127.