Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Lecture 6 User Authentication (cont)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Access Control Methodologies
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Security Awareness: Applying Practical Security in Your World
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Authentication.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
BUSINESS B1 Information Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Chapter 3: Security Basics Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
1 Authentication Celia Li Computer Science and Engineering York University.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication Presented by Justin Daniel.
Challenge/Response Authentication
Computer Communication & Networks
Authentication.
Radius, LDAP, Radius used in Authenticating Users
Network Security Unit-VI
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Authentication Chapter 2.
Operating Systems Concepts
Presentation transcript:

Authentication Chapter 2

Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication is and why it is necessary Understand how digital certificates are created and why they are used continued…

Learning Objectives Understand what tokens are and how they function Understand biometric authentication processes and their strengths and weaknesses Understand the benefits of multifactor authentication

Security of System Resources Three-step process (AAA)  Authentication Positive identification of person/system seeking access to secured information/services  Authorization Predetermined level of access to resources  Accounting Logging use of each asset

Authentication Techniques Usernames and passwords Kerberos Challenge Handshake Authentication Protocol (CHAP) Mutual authentication Digital certificates Tokens Biometrics Multifactor authentication

Usernames and Passwords Username  Unique alphanumeric identifier used to identify an individual when logging onto a computer/network Password  Secret combination of keystrokes that, when combined with a username, authenticates a user to a computer/network

Basic Rules for Password Protection 1.Memorize passwords; do not write them down 2.Use different passwords for different functions 3.Use at least 6 characters 4.Use mixture of uppercase and lowercase letters, numbers, and other characters 5.Change periodically

Strong Password Creation Techniques Easy to remember; difficult to recognize Examples:  First letters of each word of a simple phrase; add a number and punctuation Asb4M?  Combine two dissimilar words and place a number between them SleigH9ShoE  Substitute numbers for letters (not obviously)

Techniques to Use Multiple Passwords Group Web sites or applications by appropriate level of security  Use a different password for each group  Cycle more complex passwords down the groups, from most sensitive to least

Storing Passwords Written  Keep in a place you are not likely to lose it  Use small type  Develop a personal code to apply to the list Electronic  Use a specifically designed application (encrypts data)

Kerberos Provides secure and convenient way to access data and services through:  Session keys  Tickets  Authenticators  Authentication servers  Ticket-granting tickets  Ticket-granting servers  Cross-realm authentication

Kerberos in a Simple Environment Session key  Secret key used during logon session between client and a service Ticket  Set of electronic information used to authenticate identity of a principal to a service Authenticator  Device (eg, PPP network server) that requires authentication from a peer and specifies authentication protocol used in the configure request during link establishment phase continued…

Kerberos in a Simple Environment Checksum  Small, fixed-length numerical value  Computed as a function of an arbitrary number of bits in a message  Used to verify authenticity of sender

Kerberos in a Simple Environment

Kerberos in a More Complex Environment Ticket-granting ticket (TGT)  Data structure that acts as an authenticating proxy to principal’s master key for set period of time Ticket-granting server (TGS)  Server that grants ticket-granting tickets to a principal

Kerberos in a More Complex Environment

Kerberos in Very Large Network Systems Cross-realm authentication  Allows principal to authenticate itself to gain access to services in a distant part of a Kerberos system

Cross-Realm Authentication

Security Weaknesses of Kerberos Does not solve password-guessing attacks Must keep password secret Does not prevent denial-of-service attacks Internal clocks of authenticating devices must be loosely synchronized Authenticating device identifiers must not be recycled on a short-term basis

Challenge Handshake Authentication Protocol (CHAP) PPP mechanism used by an authenticator to authenticate a peer Uses an encrypted challenge-and-response sequence

CHAP Challenge-and-Response Sequence

CHAP Security Benefits Multiple authentication sequences throughout Network layer protocol session  Limit time of exposure to any single attack Variable challenge values and changing identifiers  Provide protection against playback attacks

CHAP Security Issues Passwords should not be the same in both directions Not all implementations of CHAP terminate the link when authentication process fails, but instead limit traffic to a subset of Network layer protocols  Possible for users to update passwords

Mutual Authentication Process by which each party in an electronic communication verifies the identity of the other party

Digital Certificates Electronic means of verifying identity of an individual/organization Digital signature  Piece of data that claims that a specific, named individual wrote or agreed to the contents of an electronic document to which the signature is attached

Electronic Encryption and Decryption Concepts Encryption  Converts plain text message into secret message Decryption  Converts secret message into plain text message Symmetric cipher  Uses only one key Asymmetric cipher  Uses a key pair (private key and public key) continued…

Electronic Encryption and Decryption Concepts Certificate authority (CA)  Trusted, third-party entity that verifies the actual identity of an organization/individual before providing a digital certificate Nonrepudiation  Practice of using a trusted, third-party entity to verify the authenticity of a party who sends a message

How Much Trust Should One Place in a CA? Reputable CAs have several levels of authentication that they issue based on the amount of data collected from applicants Example: VeriSign

Quick Quiz The only part of authentication that should be kept secret is the user’s password. (T/F) Name three of the five rules for safeguarding passwords Kerberos provides security even the user’s password is compromised. (T/F) What additional server is needed in a Kerberos system where multiple servers and services are available? What must occur in order for a client to use a service running in a realm other than its own?

Security Tokens Authentication devices assigned to specific user Small, credit card-sized physical devices Incorporate two-factor authentication methods Utilize base keys that are much stronger than short, simple passwords a person can remember

Types of Security Tokens Passive  Act as a storage device for the base key Active  Do not emit, or otherwise share, base tokens  Actively create another form of a base key or encrypted form of a base key that is not subject to attack by sniffing and replay  Can provide variable outputs in various circumstances

One-Time Passwords Used only once for limited period of time; then is no longer valid Uses shared keys and challenge-and-response systems, which do not require that the secret be transmitted or revealed Strategies for generating one-time passwords  Counter-based tokens  Clock-based tokens

Biometrics Biometric authentication  Uses measurements of physical or behavioral characteristics of an individual  Generally considered most accurate of all authentication methods  Traditionally used in highly secure areas  Expensive

How Biometric Authentication Works 1.Biometric is scanned after identity is verified 2.Biometric information is analyzed and put into an electronic template 3.Template is stored in a repository 4.To gain access, biometric is scanned again 5.Computer analyzes biometric data and compares it to data in template 6.If data from scan matches data in template, person is allowed access 7.Keep a record, following AAA model

False Positives and False Negatives False positive  Occurrence of an unauthorized person being authenticated by a biometric authentication process False negative  Occurrence of an authorized person not being authenticated by a biometric authentication process when they are who they claim to be

Different Kinds of Biometrics Physical characteristics  Fingerprints  Hand geometry  Retinal scanning  Iris scanning  Facial scanning Behavioral characteristics  Handwritten signatures  Voice

Fingerprint Biometrics

Hand Geometry Authentication

Retinal Scanning

Iris Scanning

Signature Verification

General Trends in Biometrics Authenticating large numbers of people over a short period of time (eg, smart cards) Gaining remote access to controlled areas

Multifactor Authentication Identity of individual is verified using at least two of the three factors of authentication  Something you know (eg, password)  Something you have (eg, smart card)  Something about you (eg, biometrics)

Chapter Summary Authentication techniques  Usernames and passwords  Kerberos  CHAP  Mutual authentication  Digital certificates  Tokens  Biometrics  Multifactor authentication

Discussion An organization, such as a bank might use two levels of authentication, granting multiple levels of access to bank resources. Which types of authentication might such an organization use to achieve this? Authentication techniques Usernames and passwords  A comprehensive look at biometrics:  For more about a complete digital certificate provider:  A white paper on digital certificates: