Chapter 3 User Authentication 1. RFC 4949 RFC 4949 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.”

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 3: User Authentication.
Lecture 6 User Authentication (cont)
Password Cracking Lesson 10. Why crack passwords?
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
FIT3105 Smart card based authentication and identity management Lecture 4.
第十章 1 Chapter 10 Authentication of People. 第十章 2 Introduction This chapter deals with password-related issues like how to force users to choose unguessable.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Information System Security, Intruders and password protection Presented by: Yanal Kilani Presented to: Dr. Lo’ai Tawalbeh Summer 2006.
NS-H /11041 System Security. NS-H /11042 Authentication Verifying the identity of another entity Two interesting cases (for this class): –Computer.
Marjie Rodrigues
Security-Authentication
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Password Management. Password Protection Virtually all multiuser systems require that a user provide not only a name or identifier (ID) but also a password.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Chapter 9 Intruders.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Authentication What you know? What you have? What you are?
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Chapter 3 User Authentication
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Chapter 9 Intruders.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
Chapter 9 Intruders.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security: Principles and Practice
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Chapter 3 User Authentication 1

RFC 4949 RFC 4949 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.” 2

Authentication Process Fundamental building block and primary line of defense Fundamental building block and primary line of defense Basis for access control and user accountability Basis for access control and user accountability Identification step Identification step Presenting an identifier to the security system Verification step Verification step Presenting or generating authentication information that corroborates the binding between the entity and the identifier 3

The four means of authenticating user identity are based on: 4

Password Authentication Widely used line of defense against intruders Widely used line of defense against intruders o User provides name/login and password o System compares password with the one stored for that specified login The user ID: The user ID: o Determines that the user is authorized to access the system o Determines the user’s privileges o Is used in discretionary access control 5

6 The salt serves three purposes: It prevents duplicate passwords from being visible in the password file. Even if two users choose the same password, those passwords will be assigned different salt values. Hence, the hashed passwords of the two users will differ. It greatly increases the difficulty of offline dictionary attacks. For a salt of length b bits, the number of possible passwords is increased by a factor of 2 b, increasing the difficulty of guessing a password in a dictionary attack. It becomes nearly impossible to find out whether a person with passwords on two or more systems has used the same password on all of them.

UNIX Implementation Original scheme Up to eight printable characters in length 12-bit salt used to modify DES encryption into a one-way hash function Use zero value as data, repeatedly encrypted 25 times Output translated to 11 character sequence Now regarded as inadequate Still often required for compatibility with existing account management software or multivendor environments 7

Improved Implementations Much stronger hash/salt schemes available for Unix Recommended hash function is based on MD5 Salt of up to 48-bits Password length is unlimited Produces 128-bit hash Uses an inner loop with 1000 iterations to achieve slowdown OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt Most secure version of Unix hash/salt scheme Uses 128-bit salt to create 192- bit hash value 8

Password Cracking Dictionary attacks Develop a large dictionary of possible passwords and try each against the password file Each password must be hashed using each salt value and then compared to stored hash values Rainbow table attacks Pre-compute tables of hash values for all salts A mammoth table of hash values Can be countered by using a sufficiently large salt value and a sufficiently large hash length Password crackers exploit the fact that people choose easily guessable passwords Shorter password lengths are easier to crack John the Ripper Open-source password cracker first developed in in 1996 Uses a combination of brute-force and dictionary techniques 9

Modern Approaches Complex password policy o Forcing users to pick stronger passwords However password-cracking techniques have also improved o The processing capacity available for password cracking has increased dramatically A PC running a single AMD Radeon HD7970 GPU, for instance, can try on average an 8.2 * 10 9 password combinations each second, o The use of sophisticated algorithms to generate potential passwords [NARA05] developed a model for password generation using the probabilities of letters in natural language. The researchers used standard Markov modeling techniques o Studying examples and structures of actual passwords in use In 2009 when an SQL injection attack against online games service RockYou.com exposed 32 million plaintext passwords used by its members to log in to their accounts [TIMM10]. Since then, numerous sets of leaked password files have become available for analysis. 10

11

Password File Access Control Can block offline guessing attacks by denying access to encrypted passwords Make available only to privileged users Shadow password file (Hashed passwords are kept in a eparate file from the user IDs,) Vulnerabilities Vulnerabilities Weakness in the OS that allows access to the file Accident with permissions making it readable Users with same password on other systems Access from backup media Sniff passwords in network traffic 12

Password Selection Strategies Complex password policy User is allowed to select their own password, however the system checks to see if the password is allowable, and if not, rejects it Goal is to eliminate guessable passwords while allowing the user to select a password that is memorable Reactive password checking System periodically runs its own password cracker to find guessable passwords Computer generated passwords Users have trouble remembering them User education Users can be told the importance of using hard to guess passwords and can be provided with guidelines for selecting strong passwords 13

Table 3.2 Types of Cards Used as Tokens 14

Memory Cards Can store but do not process data Can store but do not process data The most common is the magnetic stripe card The most common is the magnetic stripe card Can include an internal electronic memory Can include an internal electronic memory Can be used alone for physical access Can be used alone for physical access o Hotel room o ATM Provides significantly greater security when combined with a password or PIN Provides significantly greater security when combined with a password or PIN Drawbacks of memory cards include: Drawbacks of memory cards include: o Requires a special reader o Loss of token o User dissatisfaction: can be used on ATM, not on computer 15

Smart Tokens Physical characteristics: Physical characteristics: o Include an embedded microprocessor o A smart token that looks like a bank card o Can look like calculators, keys, small portable objects Interface: Interface: o Manual interfaces include a keypad and display for interaction o Electronic interfaces communicate with a compatible reader/writer Authentication protocol, three categories: Authentication protocol, three categories: o Static: token authenticates the user to the computer. o Dynamic password generator: the token generates a unique password periodically (e.g., every minute). o Challenge-response: computer system generates a challenge, such as a random string of numbers. The smart token generates a response based on the challenge, e.g., by encrypting the challenge string w. token private key. 16

Smart Cards Most important category of smart token Most important category of smart token o Has the appearance of a credit card o Has an electronic interface o May use any of the smart token protocols Contain: Contain: o An entire microprocessor Processor Memory I/O ports Typically include three types of memory: Typically include three types of memory: o Read-only memory (ROM) Stores data that does not change during the card’s life o Electrically erasable programmable ROM (EEPROM) Holds application data and programs o Random access memory (RAM) Holds temporary data generated when applications are executed 17

18

Electronic Identity Cards (eID) Use of a smart card as a national identity card for citizens Can serve the same purposes as other national ID cards, and similar cards such as a driver’s license, for access to government and commercial services Can provide stronger proof of identity and can be used in a wider variety of applications In effect, is a smart card that has been verified by the national government as valid and authentic 19

Biometric Authentication Attempts to authenticate an individual based on unique physical characteristics Based on pattern recognition Is technically complex and expensive when compared to passwords and tokens Physical characteristics used include: o Facial characteristics o Fingerprints o Hand geometry o Retinal pattern o Iris o Signature o Voice 20

21

22

23

24

25

Remote User Authentication Authentication over a network, the Internet, or a communications link is more complex Authentication over a network, the Internet, or a communications link is more complex Additional security threats such as: Additional security threats such as: o Eavesdropping, capturing a password, replaying an authentication sequence that has been observed Generally rely on some form of a challenge- response protocol to counter threats Generally rely on some form of a challenge- response protocol to counter threats 26

Eavesdropping Adversary attempts to learn the password by some sort of attack that involves the physical proximity of user and adversary Host Attacks Directed at the user file at the host where passwords, token passcodes, or biometric templates are stored Replay Adversary repeats a previously captured user response Client Attacks Adversary attempts to achieve user authentication without access to the remote host or the intervening communications path Trojan Horse An application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric Denial-of-Service Attempts to disable a user authentication service by flooding the service with numerous authentication attempts 27

Summary Biometric authentication o Physical characteristics used in biometric applications o Operation of a biometric authentication system o Biometric accuracy Remote user authentication o Password protocol o Token protocol o Static biometric protocol o Dynamic biometric protocol Electronic user authentication principles Password-based authentication o The vulnerability of passwords o The use of hashed passwords o Password cracking of user- chosen passwords o Password file access control o Password selection strategies Token-based authentication o Memory cards o Smart cards o Electronic identity cards 28