Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 3: User Authentication.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 Pretty Good Privacy (PGP) Security for Electronic .
Plan My Care Brokerage Training Working in partnership with Improvement and Efficiency South East.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Chapter 15 Computer Security Techniques
13 Copyright © 2005, Oracle. All rights reserved. Monitoring and Improving Performance.
PP Test Review Sections 6-1 to 6-6
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
PSSA Preparation.
Energy Generation in Mitochondria and Chlorplasts
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Lecture 6 User Authentication (cont)
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Authentication & Kerberos
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Marjie Rodrigues
Chapter 10: Authentication Guide to Computer Network Security.
Password Management. Password Protection Virtually all multiuser systems require that a user provide not only a name or identifier (ID) but also a password.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 5 User Authentication modified from slides of Lawrie Brown.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Authentication What you know? What you have? What you are?
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Chapter 3 User Authentication 1. RFC 4949 RFC 4949 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.”
Chapter 3 User Authentication
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Chapter One: Mastering the Basics of Security
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
Security in Networking
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security: Principles and Practice
Computer Security Protection in general purpose Operating Systems
Chapter Goals Discuss the CIA triad
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 3: User Authentication

2 Chapter 3 overview Electronic user authentication principles Password-based authentication Token-based authentication Biometric authentication Remote user authentication Security issues for user authentication Practical application: an iris biometric system Case stury: security problems for ATM systems

3 Learning objectives Discuss the four general means of authenticating a user’s identity Explain the mechanism by which hashed passwords used for user authentication Understand the use of the Bloom filters in password management Present an overview of token-based user authentication Discuss the issues involved and the approaches for remote user authentication

4 User Authentication Fundamental security building block – basis of access control & user accountability The process of verifying an identity claimed by or for a system entity Two steps: – identification: specify identifier – verification: bind entity (person) and identifier Distinct from message authentication (when communicating parties are concerned with the integrity of the exchanges messages)

5 A model for electronic user authentication NIST SP defines EUA as: the process of establishing confidence in user identity that are electronically presented The NIST SP model – User applies to registration authority (RA) and becomes a subscriber of a credential service provider (CSP) – RA is a trusted entity – The CSP exchanges with the subscriber – The credential (a data structure) binds an identity to a token possessed by the subscriber – Claimant: the party to be authenticated – Verifier: the party verifying – The verifier passes an assertion about the subscriber to the relaying party (PR)

6 A model for electronic user authentication

7 Means of user authentication Four means of authenticating user's identity Based one something the individual – knows, e.g. password, PIN – possesses, e.g. key, token, smartcard – is (static biometrics), e.g. fingerprint, retina – does (dynamic biometrics), e.g. voice, sign Can use alone or combined All can provide user authentication All have issues

8 Risk assessment for user authentication Assurance level: the degree of certainty that a user has presented a credential that refers to his/her identity – Level 1: little confidence (an online forum) – Level 2: some confidence (professional organizations) – Level 3: High confidence (patent office applicants) – Level 4: Very high confidence (employees accessing restricted/sensitive services) Potential impact: low, moderate, impact

9 Risk assessment for user authentication Assurance Level Impact Profiles Potential Impact Categories for Authentication Errors1234 Inconvenience, distress, or damage to standing or reputationLowMod High Financial loss or organization liabilityLowMod High Harm to organization programs or interestsNoneLowModHigh Unauthorized release of sensitive informationNoneLowModHigh Personal safetyNone Low Mod/ High Civil or criminal violationsNoneLowModHigh

10 Password authentication Widely used user authentication method – user provides name/login and password – system compares password with that saved for specified login Authenticates ID of user logging and – that the user is authorized to access system – determines the user’s privileges – is used in discretionary access control

11 Password vulnerabilities offline dictionary attack specific account attack (user john) popular password attack (against a wide range of IDs) password guessing against single user (w/ previous knowledge about the user) workstation hijacking exploiting user mistakes exploiting multiple password use electronic monitoring

12 Countermeasures for password vulnerability stop unauthorized access to password file intrusion detection measures account lockout mechanisms policies against using common passwords but rather hard to guess passwords training & enforcement of policies automatic workstation logout encrypted network links

13 Countermeasures for password vulnerability It is worthwhile to study/research password and password vulnerabilities – Most common – Still the most efficient

14 Use of hashed passwords

15 Why a salt value? Prevents duplicate passwords from being visible in the password file Increases the difficulty of offline dictionary attacks Nearly impossible to tell if a person used the same password on multiple systems

16 UNIX Implementation Original scheme – 8 character password form 56-bit key – 12-bit salt used to modify DES encryption into a one-way hash function – output translated to 11 character sequence Now regarded as woefully insecure – e.g. supercomputer, 50 million tests, 80 min Sometimes still used for compatibility

17 Improved implementations Have other, stronger, hash/salt variants Many systems now use MD5 – with 48-bit salt – password length is unlimited – is hashed with 1000 times inner loop – produces 128-bit hash OpenBSD uses Blowfish block cipher based and hash algorithm called Bcrypt – uses 128-bit salt to create 192-bit hash value

18 Password Cracking Dictionary attacks – try each word then obvious variants in large dictionary against hash in password file Rainbow table attacks – a large dict of possible passwords – for each password: precompute tables of hash values for all salts a mammoth table of hash values: e.g. 1.4GB table cracks 99.9% of alphanumeric Windows passwords in 13.8 secs – not feasible if larger salt values used

19 Password choices/concerns users may pick short passwords – e.g. 3% were 3 chars or less, easily guessed – system can reject choices that are too short users may pick guessable passwords – so crackers use lists of likely passwords – e.g. one study of encrypted passwords guessed nearly 1/4 of them – would take about 1 hour on fastest systems to compute all variants, and only need 1 break!

20 Another case study An analysis of passwords used by 25,000 students Over 10% recovered after 10^10 guesses

21 Password File Access Control Can block offline guessing attacks by denying access to encrypted passwords – make available only to privileged users – often using a separate shadow password (for su only) Still have vulnerabilities – exploit O/S bug – accident with permissions making it readable – users with same password on other systems – access from unprotected backup media – sniff passwords in unprotected network traffic

22 Using Better Passwords Clearly have problems with passwords Goal to eliminate guessable passwords – Still easy for user to remember Techniques – user education – computer-generated passwords – reactive password checking (periodic checking) – proactive password checking (at the time of selection)

23 Proactive Password Checking Rule enforcement plus user advice, e.g. – 8+ chars, upper/lower/numeric/punctuation – may not suffice Password cracker – list of bad passwords – time and space issues Markov Model – generates guessable passwords – hence reject any password it might generate Bloom Filter – use to build table based on dictionary using hashes – check desired password against this table

24 Token-based authentication Object user possesses to authenticate, e.g. – memory card (magnetic stripe) – smartcard

25 Memory Card store but do not process data magnetic stripe card, e.g. bank card electronic memory card used alone for physical access (e.g., hotel rooms) some with password/PIN (e.g., ATMs) Drawbacks of memory cards include: – need special reader – loss of token issues – user dissatisfaction (OK for ATM, not OK for computer access)

26 Smartcard credit-card like has own processor, memory, I/O ports – ROM, EEPROM, RAM memory executes protocol to authenticate with reader/computer – static: similar to memory cards – dynamic: passwords created every minute; entered manually by user or electronically – challenge-response: computer creates a random number; smart card provides its hash (similar to PK) also have USB dongles

27 Electronic identify cards An important application of smart cards A national e-identity (eID) Serves the same purpose as other national ID cards (e.g., a driver’s licence) – Can provide stronger proof of identity – A German card Personal data, Document number, Card access number (six digit random number), Machine readable zone (MRZ): the password Uses: ePass (government use), eID (general use), eSign (can have private key and certificate)

28 User authentication with eID

29 Authenticate user based on one of their physical characteristics: – facial – fingerprint – hand geometry – retina pattern – iris – signature – voice Biometric authentication

30 Operation of a biometric system Verification is analogous to user login via a smart card and a PIN Identification is biometric info but no IDs; system compares with stored templates

31 Biometric Accuracy The system generates a matching score (a number) that quantifies similarity between the input and the stored template Concerns: sensor noise and detection inaccuracy Problems of false match/false non-match

32 Biometric Accuracy Can plot characteristic curve (2,000,000 comparisons) Pick threshold balancing error rates

33 Remote User Authentication Authentication over network more complex – Problems of eavesdropping, replay Generally use challenge-response – user sends identity – host responds with random number r – user computes f(r,h(P)) and sends back – host compares value from user with own computed value, if match user authenticated Protects against a number of attacks

34 Protocol for a password verification Similar approach for token and biometric verification

35 Authentication Security Issues Client attacks: attacker attempts to achieve user authentication without access to the remote host – Masquerade as a legitimate user (e.g., guess the password or try all passwords) – Countermeasure: strong passwords; limit number of attempts

36 Authentication Security Issues Host attacks: attacker attacks the host where passwords/passcodes are stored – Countermeasure: hashing, protect password databases

37 Authentication Security Issues Eavesdropping: attacker attempts to learn passwords by observing the user, finding written passwords, keylogging – Countermeasures diligence to keep passwords multifactor authentication admin revoke compromised passwords

38 Authentication Security Issues Replay: attacker repeats a previously captured user response – Countermeasure Challenge-response 1-time passcodes

39 Authentication Security Issues eavesdropping replay trojan horse

40 Authentication Security Issues Trojan horse: an application or physical device masquerades as an authentic application or device – Countermeasure: authentication of the client within a trusted security environment Denial of service: attacker attempts to disable a user authentication service (via flooding) – Countermeasure: a multifactor authentication with a token

41 Practical Application

42 Case Study: ATM Security

43 Summary Introduced user authentication – using passwords – using tokens – using biometrics Remote user authentication issues Example application and case study