CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Lecture 6 User Authentication (cont)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Password Cracking Lesson 10. Why crack passwords?
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Methodologies
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
7-1 Last time Protection in General-Purpose Operating Systems History Separation vs. Sharing Segmentation and Paging Access Control Matrix Access Control.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
CS526Topic 7: User Authentication1 Information Security CS 526 Topic 7: User Authentication.
Intro To Secure Comm. Exercise 2. Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Online Security Tuesday April 8, 2003 Maxence Crossley.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Lecture 11: Strong Passwords
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CS526Topic 7: User Authentication1 Information Security CS 526 Topic 7: User Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
G53SEC 1 Authentication and Identification Who? What? Where?
Information Security CS 526
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Identification and Authentication
CS 465 PasswordS Last Updated: Nov 7, 2017.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication

CS426Fall 2010/Lecture 82 User Authentication Using a method to validate users who attempt to access a computer system or resources, to ensure they are authorized Types of user authentication –Something you know User accounts with passwords –Something you have Smart cards or other security tokens –Something you are Biometrics

CS426Fall 2010/Lecture 83 Scenarios Requiring Authentication Scenarios –Logging into a local computer –Logging into a computer remotely –Access web sites Potential vulnerabilities to consider when client authenticating server –channel between the client and the server –server compromise –client compromise –social engineering –weak passwords What are some threats?

CS426Fall 2010/Lecture 84 Threats to Passwords Online guessing attempts Offline dictionary attacks Login spoofing Shoulder surfing Social engineering –e.g., pretexting: creating and using an invented scenario (the pretext) to persuade a target to release information or perform an action and is usually done over the telephone

CS426Fall 2010/Lecture 85 Storing Passwords (UNIX Case Study) Old UNIX –The file /etc/passwd stores H(password) together with each user’s login name, user id, home directory, login shell, etc. –file must be world readable –Brute force attacks possible even if H is one-way how to brute-force when trying to obtain password of any account on a system with many accounts? New UNIX –H(password) stored in /etc/shadow, readable only by root

CS426Fall 2010/Lecture 86 Password Salts Store [r, H(password,r)] rather than H(password) –r is randomly chosen for each password –r is public –similar to Initial Vector in CBC & CTR modes Benefits –dictionary attacks much more difficult cost of attacking a single account remains the same –if two users happen to choose the same password, it doesn’t immediately show

CS426Fall 2010/Lecture 87 Mechanisms to Defend Against Dictionary and Guessing Attacks Protect stored passwords (use both cryptography & access control) Disable accounts with multiple failed attempts

CS426Fall 2010/Lecture 88 Mechanisms to Avoid Weak Passwords Allow long passphrases Randomly generate passwords Check the quality of user-selected passwords –use a number of rules –run dictionary attack tools Give user suggestions/guidelines in choosing passwords –e.g., think of a sentence and select letters from it, “It’s 12 noon and I am hungry” => “I’S12&IAH” –Using both letter, numbers, and special characters Mandate password expiration Things to remember: Usability issues

CS426Fall 2010/Lecture 89 Mechanisms to Defend Against Login Spoofing: Trusted Path Attacks: –write a program showing a login window on screen and record the passwords –put su in current directory Defense: Trusted Path –Mechanism that provides confidence that the user is communicating with what the real server (typically Trusted Computing Base in OSes) attackers can't intercept or modify whatever information is being communicated. defends attacks such as fake login programs –Example: Ctrl+Alt+Del for log in on Windows

CS426Fall 2010/Lecture 810 Defending Against Other Threats Use ideas from recent research: –graphical passwords, –combine with typing Go beyond passwords –security tokens –biometrics –2-factor authentication US Banks are required to use 2-factor authentication by end of 2006 for online banking

CS426Fall 2010/Lecture 811 Using Passwords Over Insecure Channel One-time passwords –Each password is used only once –Defend against passive adversaries who eavesdrop and later attempt to impersonate Challenge response –Send a response related to both the password and a challenge Zero knowledge proof of knowledge

CS426Fall 2010/Lecture 812 How to do One-Time Password Time-synchronized OTP Shared lists of one-time passwords Using a hash chain (Lamport) –h(s), h(h(s), h(h(h(s))), …, h 1000 (s) –use these values as passwords in reverse order

CS426Fall 2010/Lecture 813 Lamport’s One-Time Password: Details One-time setup: –A selects a value w, a hash function H(), and an integer t, computes w 0 = H t (w) and sends w 0 to B –B stores w 0 Protocol: to identify to B for the i th time, 1  i  t –A sends to B: A, i, w i = H t-i (w) –B checks i = i A, H(w i ) = w i-1 –if both holds, i A = i A +1

CS426Fall 2010/Lecture 814 Challenge-Response Protocols Goal: one entity authenticates to other entity proving the knowledge of a secret, ‘challenge’ Approach: Use time-variant parameters to prevent replay, interleaving attacks, provide uniqueness and timeliness –e.g., nounce (used only once), timestamps

CS426Fall 2010/Lecture 815 Challenge-response based on symmetric-key crypto Unilateral authentication, timestamp-based –A to B: MAC K (t A, B) Unilateral authentication, nounce-based –B to A: r B –A to B: MAC K (r B, B) Mutual authentication, nounce-based –B to A: r B –A to B: r A, MAC K (r A, r B, B) –B to A: MAC K (r B, r A )

CS426Fall 2010/Lecture 816 Issues to Consider in Password Systems Which types of attacks to defend against? –targeted attack on one account –attempt to penetrate any account on a system –attempt to penetrate any account on any system –service denial attack Whether to protect users against each other? Can users be trained? Will they follow the suggestions? Will the passwords be used in other systems? Whether the passwords will be used in a controlled environment?

CS426Fall 2010/Lecture 817 Readings for This Lecture Wikipedia Salt_(cryptography) Password cracking Trusted path One time password

CS426Fall 2010/Lecture 818 Coming Attractions … Unix Access Control