European Journal of Computer Science and Information Technology Vol.4, No.3, pp.47-52, May 2016 ___Published by European Centre for Research Training and Development UK (www.eajournals.org) 47 ISSN 2054-0957 (Print), ISSN 2054-0965 (Online) 3D SHAPES TECHNIQUE TO IMPROVE MAIL SERVICES AUTHENTICATION Mr. Mohammed Hussain Ali, and Mrs. Tamara Saad Mohamed Cihan university \ Sulaimaniah \ Iraq ABSTRACT: In today’s world, security is important aspect in day to day life .So, everyone used various ways for security purpose. users use passwords for their mail security and Generally, everyone uses textual password. Textual password is combination of alphabets, characters and numbers. users keep textual password as name of their favorite things, actors or actress, dish and meaningful word from dictionary. But the person who is very close to that person can easily guess the password. Graphical password is advanced version of password. Graphical passwords have received considerable attention lately as Potential alternatives to text-based passwords .Graphical password is composed of images, parts of images, or sketches. These passwords are very easy to use and remember. To Drawbacks of previously existing authentication techniques. We present A new improved authentication technique. The proposed system is about a new technique to generate password; there are three password fields each field is about one character and one number, when the user fill the three fields the system security generate a special algorithm which is available in the user’s machine itself to convert the content of the three password’s fields to a 3D graphical shape which are saved and transfer in the form of 3D shape in server side . so all the password have been stored in the form of 3D shape at the server . so anybody want to hack password he will face difficulty to guess the exact password because he can see only the shape not real password ( the three pairs of characters and numbers) . KEYWORDS: Authentication, 3D Shape, Mail Service, Processing 2.0 mode P3D Technique. INTRODUCTION Authentication technology allows the receiver of an email and the Internet Service Provider (ISP) to confirm the identity of the sender. If the identity of the sender can not be authenticated, then ISPs may reject the message, or put it through additional filters to determine if it should be delivered. Without authentication, your chances of being filtered by major ISPs are greatly increased and the chances of them blocking spoofed messages impossible .Email authentication is important because it addresses one of the fundamental security problems inherent to email sending technology. By exploiting such weaknesses phishers and spoofers have been able to thrive. Authentication is integral to preventing phishing and other fraud while playing a key role in the emerging reputation and accreditation systems that will drive the future of email. As a legitimate business, authentication is not optional; rather it is essential to securing your brand and online reputation. Ideally there are two different types of Authentication schemes are available according to nature of scheme & techniques used, those types are: Recall based In this authentication tech. user need to recall or remember his/her password which is created before. Knowledge based authentication is a part of this technique, E.g. Textual password,