Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

AMBO UNIVERSITY

HACHALU HUNDESSA CAMPUS


SCHOOL OF INFORMATICS & ELECTRICAL ENGINEERING
DEPARTMENT OF INFORMATION TECHNOLOGY

MSc. REGULAR ….2016 E.C


COURSE: ADVANCED SEMINAR IN IT MSc
TITLE: - 3D PASSWORD
BY: GADISA GEMECHU…………………. ID..PGR/68878/15
SUBMITTED TO: Mr. BAYISA NATEA (ass. professor)

Ambo, Ethiopia
Dec 25, 2023
LISTS OF CONTENTS
CHAPTER ONE CHAPTER TWO
 Introduction to 3D password  Literature review

 Background of the Study  Advantage

Limitations of Traditional passwords  Disadvantage


Introducing the 3D Password  Application area of 3D password
 Motivation behind the seminar
CHAPTER THREE
 Objectives of the seminar
 Methodology
 Scope of 3D password
 3D password design
 Significance of 3D password
CHAPTER FOUR
 Limitation of 3D password
 Summary and conclusion
Introduction to 3D password
• In today's digital era, the security of personal information and
sensitive data is crucial.
• Traditional password-based systems have demonstrated
vulnerabilities.
• Brute force attacks, dictionary attacks, and social engineering.
• The need for stronger authentication mechanisms has led to
innovative approaches.
Background of the Study

History and Evolution of Passwords


• Passwords have a long history, dating back to ancient
times when they were used to identify friend or foe.
• In the 1960s and 1970s, passwords gained prominence
with the rise of time-sharing systems.
• Early password systems relied on simple alphanumeric
passwords.
Limitations of Traditional Text-based Passwords

• As computer systems advanced, so did password cracking


techniques, such as brute-force attacks and dictionary
attacks.
• Password complexity requirements were implemented,
including the use of uppercase and lowercase letters,
numbers, and special characters.
• However, single-factor authentication based on text-based
passwords has inherent limitations.
Introducing the 3D Password

• In response to the limitations of traditional passwords, the


concept of the 3D password was introduced.
• The 3D password is a multi-factor authentication scheme
that leverages three-dimensional graphical environments.
• It integrates various authentication factors, such as
gestures, biometrics, and graphical objects, to create a
more complex and secure authentication process
Motivation Behind Organizing the Seminar on
3D Password Authentication

• In the face of increasing cyber security threats, the seminar aims

to address the need for stronger authentication methods.

• Traditional password-based systems have proven vulnerable to

various attacks, compromising user data and system security.

• The seminar seeks to explore innovative approaches like the 3D

password to enhance authentication security.


Cont…

• Need for Stronger Authentication Methods

• With the proliferation of digital systems and online services,


the importance of robust authentication methods cannot be
overstated.
• Cybercriminals continuously develop sophisticated techniques
to exploit password vulnerabilities.
• Stronger authentication methods are essential to protect
sensitive information and prevent unauthorized access.
Objectives of the Seminar

• Raise Awareness: Increase awareness among participants


about the vulnerabilities of traditional password-based
systems and the need for stronger authentication methods.
• Understand the Benefits of 3D Passwords: Provide a
comprehensive understanding of the 3D password
concept, its underlying principles, and its potential
advantages over traditional methods.
Scope of the Seminar
• The seminar focuses on the technical aspects of work of 3D

password system and evaluating its usability.

• It covers various topics related to 3D passwords, including

design, authentication schemes, architectural study, and

working mechanisms.

• The seminar explores the potential applications of 3D

passwords in different domains and industries.

• It also discusses the limitations and challenges associated

with 3D password authentication.


Significance of the Seminar
• Knowledge Enrichment: Attending this seminar will provide me

with valuable insights into the concept of 3D password

authentication. I have gain a deep understanding of its benefits,

implementation challenges, and potential applications.

• Professional Development: The seminar offers an opportunity to

expand your professional network by connecting with researchers,

practitioners, and industry experts. Engaging in discussions and

collaborations can lead to new ideas, insights, and potential career

opportunities.
Cont…
• Addressing Industry Needs: The seminar addresses the
growing need for stronger authentication methods in
various industries.

• Promoting Innovation: By actively participating in the


seminar, you contribute to the collective effort of
advancing authentication technologies and driving
innovation in the field of cyber security.
Limitations of 3D Password
Authentication
• User Acceptance: The adoption of 3D password
authentication may face resistance from users who are
accustomed to traditional text-based passwords. The initial
learning curve and adjustment to the new authentication
method may pose challenges.

• Implementation Complexity: Designing and implementing


a 3D password system requires expertise in and complexity
of integrating multiple authentication factors can increase
Cont…
• System Compatibility: Compatibility issues may arise when
integrating 3D password authentication with existing systems
and infrastructure. Ensuring seamless integration and
interoperability with different platforms and technologies can
be a challenge.

• Usability and Convenience: While 3D passwords aim to


enhance security, there is a need to balance it with usability and
convenience. Complex authentication processes or frequent
interactions with 3D environments may impact user experience
and efficiency.
Problems in 3D password

• Designing and implementing a reliable 3D password


system requires substantial expertise in various fields
such as computer graphics, computer vision, and user
behavior analysis.

• While they have the potential to provide enhanced


security, they may also introduce usability issues for
users
• Users might find it difficult to remember the exact
sequence of actions required to authenticate themselves,
especially if the system demands a high level of
precision.
.
CHAPTER TWO
Literature review
What is 3d password
• 3D password is a novel authentication method that aims to
enhance the security of traditional password-based systems.

• Unlike traditional passwords that are typically based on


alphanumeric characters, the 3D password adds an extra
dimension to the authentication process by incorporating
three different factors: something the user knows, something
the user has, and something the user is.
Cont….
• The first factor, something the user knows
• The second factor, something the user has
• The third factor, something the user is, utilizes biometric
characteristics to authenticate as follow:-
Advantage
• 3D passwords establish a robust defense against
unauthorized access.

• The personalization inherent in spatial and biometric


components contributes to a sense of ownership and user
engagement, fostering a more secure authentication
experience.

• The utilization of multimodal biometrics enhances


accuracy and resilience against spoofing attempts
Disadvantages
Applications of 3D Passwords
1. Enterprise Security.
2. Financial Services.
3. E-commerce Platforms.
4. Smartphones and Mobile Devices.
5. Cloud Security.
6. Airport Security and Border Control.
CHAPTER THREE
METHODOLOGY
• The methodology used to prepare the seminar on 3D
Password involved extensive research and information
gathering from the internet.

• As the internet serves as a vast repository of knowledge


and resources, it was leveraged to access a wide range of
information related to the 3D password

• The methodology began with identifying credible and


authoritative sources that provided valuable insights into
the 3D password concept. sword concept.
Cont…
• The methodology also involved organizing and
structuring the gathered information in a logical and
coherent manner.

• The collected data was categorized into relevant sections,


such as introduction, background, motivation, problem
statement, objectives, literature review, and significance
of study.

• In conclusion, the methodology employed for preparing


the 3D Password seminar involved extensive research and
information gathering from the internet.
3D password design
• The design should consider factors such as navigation
controls, object manipulation, and visual cues that guide
users through the authentication process.
• platform compatibility and scalability should be
considered to ensure the system can be deployed across
various devices and operating environments.
Working of 3D password scheme
1. Registration
• Whenever a new user tries to register, he must enter all the
details are available in the registration form.
• Now the user enters a virtual environment where he must input
textual password an also select images from the multiple
images option available.
• all these interactions now get stored in the database in an
encrypted form.
2. Authentication
• user must enter the username and password.
• Then he needs to click on the images in a proper sequence.
• After that, all the interactions get fetched from the database
and get compared one after another upon the grant of the
access to authorized user, now he can access all the
application.
CHAPTER FOUR
Summary and conclusion

• The seminar titled "3D Password" aims to address the


vulnerabilities of traditional authentication systems in
today's digital era by introducing a novel approach that
utilizes three-dimensional graphical environments for
authentication.

• The 3D password is a multi-factor authentication scheme


that incorporates gestures, biometrics, and graphical
objects to create a robust and secure authentication
system.
• Furthermore, the seminar explores the security strengths
and weaknesses of the 3D password approach.
Cont…
• It highlights how the 3D password mitigates common
security threats, such as password guessing, shoulder
surfing, and key logger.

• Therefore, the seminar delves into user experiences,


preferences, and potential challenges in real-world
deployment, providing participants with insights to
address these usability concerns effectively.
Conclusion
• In conclusion, the seminar on 3D passwords has shed
light on the potential of this innovative authentication
paradigm to transform the field of security.

• With the limitations of traditional password-based


authentication systems becoming increasingly evident,
the need for stronger authentication mechanisms has
become imperative.

• The 3D password approach offers a promising solution by


incorporating multiple factors and leveraging three-
dimensional graphical environments.
Cont…
• The seminar has emphasized the importance of stronger
authentication methods in today's digital landscape, where
the security of personal information and sensitive data is of
utmost concern.

• By attending the seminar, participants have gained a deeper


understanding of the underlying principles, technical aspects,
and security implications of the 3D password concept.

• Generally, the seminar on 3D passwords has not only


provided participants with a comprehensive overview of the
concept but has also inspired them to explore the potential
benefits and applications of this innovative authentication
paradigm.
END OF SLIDE
THANK YOU !!!!

You might also like