Seminar Report'10 3-D Password
Seminar Report'10 3-D Password
3-D Password
INTRODUCTION
The dramatic increase of computer usage has given rise to many security concerns. One major security concern is authentication, which is the process of validating who you are to whom you claimed to be. In general, human authentication techniques can be classified as knowledge based (what you know), token based (what you have), and biometrics (what you are). Knowledge-based authentication can be further divided into two categories as follows: 1) recall based and 2) recognition based. Recall-based techniques require the user to repeat or reproduce a secret that the user created before. Recognition based techniques require the user to identify and recognize the secret, or part of it, that the user selected before. One of the most common recallbased authentication schemes used in the computer world is textual passwords. One major drawback of the textual password is its two conflicting requirements: the selection of passwords that are easy to remember and, at the same time, are hard to guess. Many authentication systems, particularly in banking, require not only what the user knows but also what the user possesses (token-based systems). However, many reports have shown that tokens are vulnerable to fraud, loss, or theft by using simple techniques. Graphical passwords can be divided into two categories as follows: 1) recognition based and 2) recall based. Various graphical password schemes have been proposed. Graphical passwords are based on the idea that users can recall and recognize pictures better than words. However, some of the graphical password schemes require a long time to be performed. Moreover, most of the graphical passwords can be easily observed or recorded while the legitimate user is performing the graphical password; thus, it is vulnerable to shoulder surfing attacks. Currently, most graphical passwords are still in their research phase and require more enhancements and usability studies to deploy them in the market. Many biometric schemes have been proposed; fingerprints, palm prints, hand geometry, face recognition, voice recognition, iris recognition, and retina recognition are all different biometric schemes. Each biometric recognition scheme has its advantages and disadvantages based on several factors such as consistency, uniqueness, and acceptability. One of the main drawbacks of applying biometrics is its intrusiveness upon a users personal characteristic. Moreover, retina biometrical recognition schemes require the user to willingly subject their eyes to a low-intensity infrared light. In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users. 1
Seminar Report10
3-D Password
The 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. It is the users choice to select which type of authentication techniques will be part of their 3-D password. This is achieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring the objects that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase. Thus, it becomes much more difficult for the attacker to guess the users 3-D password.
Seminar Report10
3-D Password
RELATED WORKS
Many graphical password schemes have been proposed. Blonder introduced the first graphical password schema. Blonders idea of graphical passwords is that by having a predetermined image, the user can select or touch regions of the image causing the sequence and the location of the touches to construct the users graphical password. After Blonder, the notion of graphical passwords was developed. Many graphical password schemes have been proposed. Existing graphical passwords can be categorized into two categories as follows: 1) recall based and 2) recognition based. Dhamija and Perrig proposed Dj Vu, which is a recognition-based graphical password system that authenticates users by choosing portfolios among decoy portfolios. These portfolios are art randomized portfolios. Each image is derived from an 8-B seed. Therefore, an authentication server does not need to store the whole image; it simply needs to store the 8-B seed. Another recognition-based graphical password is Passfaces. Passfaces simply works by having the user select a subgroup of k faces from a group of n faces. For authentication, the system shows m faces and one of the faces belongs to the subgroup k. The user has to do the selection many times to complete the authentication process. Another scheme is the Story scheme, which requires the selection of pictures of objects (people, cars, foods, airplanes, sightseeing, etc.) to form a story line. Davis et al. concluded that the users choices in Passfaces and in the Story scheme result in a password space that is far less than the theoretical entropy. Therefore, it leads to an insecure authentication scheme. The graphical password schema of Blonder is considered to be recall based since the user must remember selection locations. Moreover, PassPoint is a recall-based graphical password schema, where a background picture is presented and the user is free to select any point on the picture as the users password (users PassPoint). Draw A Secret (DAS), which is a recall-based graphical password schema and introduced by Jermyn et al, is simply a grid in which the user creates a drawing. The users drawings, which consist of strokes, are considered to be the users password. The size and the complexity of the grid affect the probable password space. Larger grid sizes increase the full password space. However, there are limitations in grid complexity due to human error. It becomes very hard to recall where the drawing started and ended and where the middle points were if we have very large grid sizes.
Seminar Report10
3-D Password
One important type of authentication is based on who you are or, in other words, biometrics. Biometric recognition systems have been exhaustively studied as a way of authentication. Fingerprints, palm prints, face recognition, voice recognition, and iris and retina recognition are all different methodologies of biometric recognition systems. However, some human properties are vulnerable to change from time to time due to several reasons such as aging, scarring, face makeup, change of hairstyle, and sickness (change of voice). Moreover, people tend to resist biometrics for different reasons. Some people think that keeping a copy of the users fingerprints is not acceptable and is a threat to the users privacy. In addition, some users resist the idea of a low-intensity infrared light or any other kind of light directed at their eyes, such as in retina recognition systems. Moreover, biometrics cannot be revoked, which leads to a dilemma in case the users data have been forged. Unlike other authentication schemes where the user can alter his/her textual password in case of a stolen password or replace his/her token if it has been stolen or forged, a users biometrics cannot be revoked. Many authentication systems are based on tangible objects and are referred to as tokenbased systems. Many token-based systems are vulnerable to theft and loss; therefore, most token based systems require a personal identification number (PIN) for authentication. The 3-D password has been proposed, and initial results have been presented.
Seminar Report10
3-D Password
recall, biometrics, recognition, or token-based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Some users do not like to carry cards. Some users do not like to provide biometrical data, and some users have poor memories. Therefore, to ensure high user acceptability, the users freedom of selection is important. 3) The new scheme should provide secrets that are easy to remember and very difficult for intruders to guess. 4) The new scheme should provide secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 5
Seminar Report10
3-D Password
5) The new scheme should provide secrets that can be easily revoked or changed. Based on the aforementioned requirements, we propose our contribution, i.e., the 3-D password authentication scheme.
a computer with which the user can type; a fingerprint reader that requires the users fingerprint; a biometrical recognition device; a paper or a white board that a user can write, sign, or draw on; an automated teller machine (ATM) that requests a token; a light that can be switched on/off; a television or radio where channels can be selected;
5) 6) 7) 6
Seminar Report10 8) 9) 10) 11) 12) 13) a staple that can be punched; a car that can be driven; a book that can be moved from one place to another; any graphical password scheme; any real-life object; any upcoming authentication scheme.
3-D Password
The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1, z1) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2, y2, z2), where x1 x2, y1 y2, and z1 z2. Therefore, to perform the legitimate 3-D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence. The choice of what authentication schemes will be part of the users 3-D password reflects the users preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical passwords as part of their 3-D password. On the other hand, users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3-D password. Moreover, users who prefer to keep any kind of biometrical data private might not interact with objects that require biometric information. Therefore, it is the users choice and decision to construct the desired and preferred 3-D password.
Seminar Report10
3-D Password
The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone. We consider the sequence of those actions and interactions using the previous input devices as the users 3-D password. For example, consider a user who navigates through the 3-D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types FALCON. Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button. The initial representation of user actions in the 3-D virtual environment can be recorded as follows: (10, 24, 91) Action = Open the office door; (10, 24, 91) Action = Close the office door; (4, 34, 18) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 18) Action = Typing, L; (4, 34, 18) Action = Typing, C; (4, 34, 18) Action = Typing, O; (4, 34, 18) Action = Typing, N; (10, 24, 80) Action = Pick up the pen; (1, 18, 80) Action = Drawing, point = (330, 130). This representation is only an example. The extensive real representation will not be discussed in this paper. In order for a legitimate user to be authenticated, the user has to follow the same sequence and type of actions and interactions toward the objects for the users original 3-D password. Fig. 1 shows a virtual computer that accepts textual passwords as a part of a users 3D password. Three-dimensional virtual environments can be designed to include any virtual objects. Therefore, the first building block of the 3-D password system is to design the 3-D virtual environment and to determine what objects the environment will contain. In addition, specifying
Seminar Report10
3-D Password
the objects properties is part of the system design. The design of the 3-D virtual environment influences the overall password space, usability, and performance of the 3-D password system. Fig. 2 shows a snapshot of an experimental 3-D virtual environment.
Fig. 1. Snapshot of a proof of concept of 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the users 3-D password.
Fig. 2. Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers.
Seminar Report10
3-D Password
system is to design a 3-D environment that reflects the administration needs and the security requirements. The design of 3-D virtual environments should follow these guidelines.
1. Real-life similarity: The prospective 3-D virtual environment should reflect what
people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real-life situations. Object responses should be realistic. The target should have a 3-D virtual environment that users can interact with, by using common sense.
2. Object uniqueness and distinction: Every virtual object or item in the 3-D virtual
environment is different from any other virtual object. The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. However, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3-D virtual environment should consider that every object should be distinguishable from other objects. A simple real-life example is home numbering. Assume that there are 20 or more homes that look like each other and the homes are not numbered. It would be difficult to distinguish which house was visited a month ago. Similarly, in designing a 3-D virtual environment, it should be easy for users to navigate through and to distinguish between objects. The distinguishing factor increases the users recognition of objects. Therefore, it improves the system usability.
3. Three-dimensional virtual environment size: A 3-D virtual environment can depict
a city or even the world. On the other hand, it can depict a space as focused as a single room or office. The size of a 3-D environment should be carefully studied. A large 3-D virtual environment will increase the time required by the user to perform a 3-D password. Moreover, a large 3-D virtual environment can contain a large number of virtual objects. Therefore, the probable 3-D password space broadens. However, a small 3-D virtual environment usually contains only a few objects, and thus, performing a 3-D password will take less time.
4. Number of objects (items) and their types: Part of designing a 3-D virtual
environment is determining the types of objects and how many objects should be
10
Seminar Report10
3-D Password
placed in the environment. The types of objects reflect what kind of responses the object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3D password.
5. System importance: The 3-D virtual environment should consider what systems will
be protected by a 3-D password. The number of objects and the types of objects that have been used in the 3-D virtual environment should reflect the importance of the protected system.
11
Seminar Report10
3-D Password
Innovative Component
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the users freedom of selection is important.
12
Seminar Report10
3-D Password
Clicks
Performing Biometrics
Access granted
13
Seminar Report10
3-D Password
by a textual password. A 3-D password authentication proposes a sound replacement for a textual password. Moreover, entrances to such locations are usually protected by access cards and sometimes PIN numbers. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers.
2. Nuclear and military facilities: Such facilities should be protected by the most powerful
authentication systems. The 3-D password has a very large probable password space, and since it can contain security locations.
3. Airplanes and jetfighters: Because of the possible threat of misusing airplanes and
jetfighters for religio-political agendas, usage of such airplanes should be protected by a powerful authentication system. The 3-D password is recommended for these systems. In addition, 3-D passwords can be used in less critical systems because the 3-D virtual environment can be designed to fit any systems needs. A small 3-D virtual environment can be used in many systems, including the following: ATMs; Personal digital assistants; Desktop computers and laptop logins; Web authentication.
14
Seminar Report10
3-D Password
SECURITY ANALYSIS
To analyze and study how secure a system is, we have to consider how hard it is for the attacker to break such a system. A possible measurement is based on the information content of a password space, which is defined as the entropy of the probability distribution over that space given by the relative frequencies of the passwords that users actually choose. We have seen that textual password space may be relatively large; however, an attacker might only need a small subset of the full password space as Klein observed to successfully break such an authentication system. As a result, it is important to have a scheme that has a very large possible password space as one factor for increasing the work required by the attacker to break the authentication system. Another factor is to find a scheme that has no previous or existing knowledge of the most probable user password selection, which can also resist the attack on such an authentication scheme.
Fig. 4. Password space of the 3-D password, textual password, Pass faces, and DAS with grid sizes of 5 5 and 10 10. Length is the number of actions and interactions for a 3-D password, the number of characters for textual passwords, the number of selections for Pass faces, and the number of points that represent the strokes for DAS. The length is up to eight (characters/actions, interactions, inputs/selections).
15
Seminar Report10
3-D Password
where xi = xj , yi = yj , and zi = zj , only if i = j. The design of the 3-D environment will determine the value of Omax. The variable m represents all possible actions and interactions toward all existing objects Oi. However, g(AC) counts the total number of actions and inputs toward the 3-D virtual environment, whereas m, as we mentioned before, counts the actions and interactions toward the objects. An example of g(AC) can be a user movement pattern, which can be considered as a part of the users 3-D password. The function h(Oi, Ti, xi, yi, zi) = f(Oi, Ti, xi, yi, zi) is the number of possible actions and interactions toward the object Oi based on the object type Ti. Object types can be textual password objects, DAS objects, or any authentication scheme. The function f is determined from the object type. It counts the possible actions and interactions that the object can accept. If we assume that an object Keyboard is in location (x0, y0, z0) of type = textual password, f will count the possible characters and numbers that can be typed, which is around 93 possibilities. As we mentioned before, an object type is one of the important factors that affects the overall password space. Therefore, a higher outcome of function f means larger 3-D password space size. From the previous equations, we observe that the number of objects and the type of actions and interactions determines the probable password space. Therefore, the design of the 3D virtual environment is a very critical part of the 3-D password system. Figs. 4 and 5 illustrate the resulting password space of the proposed 3-D password compared to textual password, Passfaces, and DAS of a grid of 5 5 and 10 10, respectively. Notice the difference between a 3-D passwords built on a simple 3-D virtual environment compared to the other authentication schemes.
16
Seminar Report10
3-D Password
Fig. 5. Password space of the 3-D password, textual password, Passfaces, and DAS with grid sizes of 5 5 and 10 10. Length is the number of actions and interactions for a 3-D password, the number of characters for textual passwords, the number of selections for Passfaces, and the number of points that represent the strokes for DAS. The length is up to eight (characters/actions, interactions, inputs/selections). The 3-D password virtual environment is as specified in Section V-A; bit size is the log2 of the entire probable password space.
Fig. 6. Observing the number of possible actions/interactions of a 3-D password within a 3-D environment specified in Section V-A compared to the two critical points of textual passwords. Point a is the bit size of Klein [2] (3 106) dictionary of eight-character textual passwords. Point b represents the full password space of eight-character textual passwords.
17
Seminar Report10
3-D Password
Fig. 6 shows the points where the 3-D password exceeds two important textual password points. Point a shows that by having only two actions and interactions as a 3-D password, the 3-D password exceeds the number of textual passwords used by Klein to break 25% of textual passwords of eight characters. Point b represents the full textual password space of eight characters or less. It shows that by performing only four interactions, actions, and inputs as a 3-D password, the 3-D password space exceeds the full textual passwords of eight characters or less.
18
Seminar Report10
3-D Password
objects that exist in one 3-D password system might not exist on other 3-D password systems. Therefore, more effort is required to build the knowledge of most probable 3-D passwords.
Brute Force Attack: The attacker has to try all possible 3-D passwords. This kind of attack is very difficult for the following reasons. 1) Time required to login: The total time needed for a legitimate user to login may vary from 20 s to 2 min or more, depending on the number of interactions and actions, the size of the 3-D virtual environment, and the type of actions and interactions done by the user as a 3-D password. Therefore, a brute force attack on a 3-D password is very difficult and time consuming.
2) Cost of attacks: In a 3-D virtual environment that contains biometric recognition
objects and token-based objects, the attacker has to forge all possible biometric information and forge all the required tokens. The cost of forging such information is very high; therefore, cracking the 3-D password is more challenging. The high number of possible 3D password spaces leaves the attacker with almost no chance of breaking the 3D password.
Well-Studied Attack: The attacker tries to find the highest probable distribution of 3-D passwords. However, to launch such an attack, the attacker has to acquire knowledge of the most probable 3-D password distributions. Acquiring such knowledge is very difficult because the attacker has to study all the existing authentication schemes that are used in the 3-D environment. Moreover, acquiring such knowledge may require forging all existing biometrical data and may require forging token-based data. In addition, it requires a study of the users selection of objects, or a combination of objects, that the
19
Seminar Report10
3-D Password
user will use as a 3-D password. Moreover, a well-studied attack is very hard to accomplish since the attacker has to perform a customized attack for every different 3-D virtual environment design. Every system can be protected by a 3-D password that is based on a unique 3-D virtual environment. This environment has a number of objects and types of object responses that differ from any other 3-D virtual environment. Therefore, a carefully customized study is required to initialize an effective attack.
Shoulder Surfing Attack: An attacker uses a camera to record the users 3-D password or tries to watch the legitimate user while the 3-D password is being performed. This attack is the most successful type of attack against 3-D passwords and some other graphical passwords. However, the users 3-D password may contain biometrical data or textual passwords that cannot be seen from behind. The attacker may be required to take additional measures to break the legitimate users 3-D password. Therefore, we assume that the 3-D password should be performed in a secure place where a shoulder surfing attack cannot be performed.
Timing Attack: In this attack, the attacker observes how long it takes the legitimate user to perform a correct sign-in using the 3-D password. This observation gives the attacker an indication of the legitimate users 3-D password length. However, this kind of attack alone cannot be very successful since it gives the attacker mere hints. Therefore, it would probably be launched as part of a well-studied or brute force attack. Timing attacks can be very effective if the 3-D virtual environment is poorly designed.
20
Seminar Report10
3-D Password
CONCLUSION
The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements. Designing a simple and easy to use 3D virtual environment is a factor that leads to a higher user acceptability of a 3D password system. The choice of what authentication scheme will be part of user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical passwords as part of their 3-D password. On the other hand, users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3-D password. Moreover, users who prefer to keep any kind of biometrical data private might not interact with objects that require biometric information. Therefore, it is the users choice and decision to construct the desired and preferred 3-D password. The 3-D password is still in its early stages. Designing various kinds of 3-D virtual environments, deciding on password spaces, and interpreting user feedback and experiences from such environments will result in enhancing and improving the user experience of the 3-D password. Shoulder surfing attacks are still possible and effective against 3-D passwords. Therefore, a proper solution is a field of research.
21
Seminar Report10
3-D Password
BIBLIOGRAPHY
1) X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords: A survey, in Proc. 21st
Annu. Comput. Security Appl. Conf., Dec. 59, 2005, pp. 463472.
2) D. V. Klein, Foiling the cracker: A survey of, and improvement to passwords
Authentication using graphical passwords: Basic results, in Proc. Human-Comput. Interaction Int., Las Vegas, NV, Jul. 2527, 2005.
4) A.Adams and M. A. Sasse, Users are not the enemy:Why users compromise
computer security mechanisms and how to take remedial measures, Commun. ACM, vol. 42, no. 12, pp. 4046, Dec. 1999.
5) F. A. Alsulaiman and A. El Saddik, A novel 3D graphical password schema, in
Proc. IEEE Int. Conf. Virtual Environ., Human-Comput. Interfaces, Meas. Syst., Jul. 2006, pp. 125128.
22