Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Keystroke Dynamics Jacob Wise and Chong Gu. Introduction ● People have “unique” typing patterns – “Unique” in the same way that fingerprints aren't proven.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
Cryptography and Network Security Chapter 3
T. E. Potok - University of Tennessee Software Engineering Dr. Thomas E. Potok Adjunct Professor UT Research Staff Member ORNL.
Block Ciphers and the Data Encryption Standard
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
More MR Fingerprinting
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Biometrics: Voice Recognition
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Authentication Approaches over Internet Jia Li
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Pseudo-Random Functions 1/22 Encryption as Permutation Assume cryptosystem correct and P = C If x  x’ then E K (x)  E K (x’) So, no y is hit by more.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
CSCI 5857: Encoding and Encryption
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Cryptography Team Presentation 2
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
Test Drivers and Stubs More Unit Testing Test Drivers and Stubs CEN 5076 Class 11 – 11/14.
File Storage Organization The majority of space on a device is reserved for the storage of files. When files are created and modified physical blocks are.
Attacks Overview Nguyen Cao Dat 1. BK TP.HCM Outline  Cryptographic Attacks ▫ Frequency analysis ▫ Brute force attack ▫ Meet-in-the-middle attack ▫ Birthday.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
PRESENTATION ON BIOMETRICS
Authentication What you know? What you have? What you are?
Learning and Acting with Bayes Nets Chapter 20.. Page 2 === A Network and a Training Data.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Keystroke Dynamics By Hafez Barghouthi.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Outline The basic authentication problem
Authentication and Account Management
Dynamical Statistical Shape Priors for Level Set Based Tracking
Dynamic Authentication of Typing Patterns
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Cryptography Lecture 5.
Presentation transcript:

Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004

Outline Speech-Generated Cryptographic Keys Password Hardening Based on Keystroke Dynamics Other new ideas for non-text passwords based on behavioral biometric features

Key Generation Based on repeatable behavioral biometric characteristics  timing  force of keystrokes  voice frequencies Aims to achieve two goals  Breaking passwords will be no easier  For some or most, breaking them will be harder

Speech-Generated Keys – Monrose & Reiter System initialization  Generate key K  Generate 2m shares of K using generalized secret sharing scheme, with m a system param  Shares arranged within an m x 2 table such that K can be reconstructed from any set of m shares consisting of one share from each row m K 2

Twist on traditional secret sharing Traditional defense: attacker will not possess enough shares to reconstruct the secret In this case, an attacker would have all shares if he had access to the physical device Requirement change: that the attacker will not be able to find a sufficient set of valid shares in the table (make an exhaustive search computationally difficult)

Speech-Generated Keys – Monrose & Reiter My voice is my passport. Verify me? (photo from Gathering behavioral measurements  User utters passphrase  System performs front-end signal processing and records measurements about voice features

Signal processing User utterance sampled at predefined sampling rate Minimum sampling rate on Compaq IPAQ: 32 kHz Reduce computational and storage cost by down sampling to 8 kHz (sufficient to accurately capture signal) – throw 3 of 4 samples away

Signal processing Signal then broken down and cleaned up  Sample must be clean so as to be an accurate representation of user’s voice  Arranged into frames – 12-dimensional vectors of reals  Background noise removed by calculating avg. noise in white space in the sample and subtracting it from entire length of sample  Sample data converted to bit sequence called a feature descriptor; used to regenerate key

Gathering behavioral statistics System measures m behavioral features of a user’s utterance Array of measurements concatenated into a bit string for each login attempt

Gathering behavioral statistics For each successful login attempt, the system updates the history of feature descriptors (consistent behavioral features)

Distinguishing features Security depends upon number of distinguishing features of voice A feature b ai (a the account, i the feature) is a distinguishing feature if  T i > avg(b ai ) - k stddev(b ai ) or  T i < avg(b ai ) - k stddev(b ai )

Going back to the 2 x m table… Elements of table not consistently accessed are randomly perturbed Correct user should not encounter perturbed (invalid) elements in table The more often the user logs in, the stronger the system becomes

Empirical results For an implementation in which the table was also encrypted with a password – makes a dictionary attack against the password up to 2^15 times more difficult

Password hardening based on keystroke dynamics Very similar concept – system begins as secure as a traditional password system and begins perturbing values in secret- sharing table that are not repeated consistently

Potential problems Painful to change password, if security greater than traditional systems is essential – cost associated with retraining the system In keystroke system, some degree of inference can be made about keystroke dynamics if password is known, and vice versa Not ideal for users who use different keyboards Security determined by degree of uniqueness of user’s voice or typing style

Is it accurate enough? Bergadano, Gunetti, and Picardi think not  Inherent variability in most behavioral biometric identifiers is too great  Propose using much longer samples and generating key based on duration of digraphs and trigraphs (sets of two and three consecutive letters)  Not an appropriate substitute for traditional password systems  Greater inherent variability with longer samples?

For more information  Free demo