Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Lecture 6 User Authentication (cont)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Authentication System
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Information Security for Managers (Master MIS)
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
GSM Network Structure Lance Westberg.
COEN 250 Authentication. Between human and machine Between machine and machine.
Lecture 11: Strong Passwords
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Kerberos Guilin Wang School of Computer Science 03 Dec
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Overview of cellular system
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
CSCE 522 Identification and Authentication
Outline The basic authentication problem
Wireless Network PMIT- By-
Challenge/Response Authentication
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
KERBEROS.
COEN 351 Authentication.
Presentation transcript:

Identification (User Authentication)

Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask the following: –Who are you? (prove that you’re Alice) –Who the **** is Alice? Eve wishes to impersonate Alice: –One time impersonation –Full impersonation (identity theft)

Identification Scenarios Local identification –Human authenticator –Device Remote identification –Human authenticator –Corporate environment (LAN, database etc.), similarly Telecom Operator environment –E-commerce environment

Initial Authentication The problem: how does Alice initially convince anyone that she’s Alice? The solution must often involve a “real- world” type of authentication – id card, driver’s license etc. Errors due to human factor are numerous Example – the Microsoft-Verisign fiasco Example - phishing

Closed Environments

Model The initial authentication problem is fully solved by a trusted party, Carol Carol can distribute the identification material in a secure fashion, e.g by hand, or over encrypted and authenticated lines Example – a corporate environment Example – an operator’s network Eve’s attack avenue is the Alice-Bob connection We begin by looking at remote authentication

Passwords Model 1: –Alice is assigned a password, PWD, by Carol in a secure manner –Bob receives the pair from Carol in a secure manner –Alice authenticates herself to Bob by sending the pair

Problems with Model 1 Bob needs to hold a username, password database If Eve has access to Bob’s database (for instance by a Trojan horse), she can impersonate Alice Eve can eavesdrop, capture the pair and impersonate Alice Human-chosen and memorized passwords are vulnerable to guessing attacks Bob can impersonate Alice

Improvements to Model 1 The internal database contains pairs of, where h is a one way function Example – Unix systems The database is often held at a central location Advantage – less space, Bob can’t impersonate Alice Disadvantage – new attack avenues

Architecture 1 Carol Bob Alice 1.Black lines – secure initial connection 2.White lines – online authentication

Architecture 2 Carol Bob Alice 1.Black lines – secure initial connection 2.White lines – online authentication DB

Solving Eavesdropping First solution: –Use encrypted and authenticated lines –Advantage – attacks by Eve are very difficult –Disadvantages – need encryption and authentication in place for every transaction. Infrastructure and performance overhead Second solution: challenge and response protocols

Challenge – Response (Model 2) PWD is used as a key Protocol: –Alice sends authentication request using her name –Bob retrieves PWD –Bob sends random challenge, r –Alice replies with h PWD (r) –Bob tests authenticity

Pros and Cons Pros: –PWD is not passed in the clear –No need for encryption and authentication Cons: –Database has to be managed by Bob –Guessing attacks are still possible Caution: Challenges must not be repeated. Sequence numbers or time should be used

Summary Challenge and response model is sufficient for closed, non-flexible environments. Main security problems: impersonation by database administrator (Bob), guessing attacks. Operational problems: adding and removing authorized users

GSM Authentication Mobile Station (cell-phone) authenticates to mobile operator (PLMN) Mobile Station (MS) stores a symmetric authentication key k i in the SIM. Same key is stored by Home PLMN Problem: authentication to visited PLMN that doesn’t have key, without exposing key over air Solution: first - billing agreement between HPLMN and visited PLMN. Second – challenge response protocol

GSM Authentication Components MS BS VLR HLR AUC Visited PLMN HPLMN

GSM Authentication Protocol MS sends IMSI to visited PLMN, identifying MS and HPLMN. HPLMN sends n triplets in the clear over land lines or Microwave. Visited PLMN sends to MS the challenge, RAND MS response SRES=A3 ki (RAND) MS passes authentication if XRES=SRES Traffic between MS and BS is encrypted using A5 algorithm with the key k c = A8 ki (RAND)

Local Authentication Device Level

Local ID Technologies Passwords Tokens: smart-cards, Secure-ID, USB tokens Biometric identification: –Fingerprints –Voice recognition –Face recognition Multi-Factor authentication

Tokens: Pros and Cons Pros –Stronger security than passwords –Even physical attacks are difficult Cons –Require extra hardware –Require standardization –Easily lost

Biometrics: Pros and Cons Pros –Large key, reasonable amount of entropy –Not easily lost –Not easily transferable Cons –Invasion of privacy –Can’t be changed –False positives and negatives –Susceptible to many types of physical attacks

Biometrics (cont.) Technology is not mature yet Fingerprint technology is the most mature: –Less false positives and negatives –Not as easy to fool (really?!) The technology’s fate is still unclear Example – be careful with biometrics. Remote access using biometric information as password is problematic