Authentication. Most technical security safeguards have authentication as a precondition How to authenticate: LocationSomewhere you are BiometrieSomething.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
FIT3105 Smart card based authentication and identity management Lecture 4.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Security-Authentication
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Biometrics Authentication Technology
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
Lecture 7 Page 1 CS 236 Online Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Technical Devices for Security Management Kathryn Hockman COSC 481.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Challenge/Response Authentication
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Strong Password Authentication Protocols
Authentication Chapter 2.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Authentication

Most technical security safeguards have authentication as a precondition How to authenticate: LocationSomewhere you are BiometrieSomething you are Smart Card, TokenSomething you have Password, SecretsSomething you know

The authentication process Authentication Ask the user for credentials Verification Verify this credentials agains something previously known Authorization Mark the user as authenticated Commonly here also the AC rights are assigned

Password A secret (word) know by the user and the system

Password Username Some name under which the user is known to the system – hardly secret Secret Password The secret connected to the user name

Entropy for passwords Entropy represents the uncertainty of the password This represents how likely it is to guess the password The entropy is calculated from the reciprocal probability of each observed character in the password H = -Σ p i * ld p i

Good and bad passwords Linkable names (own, child's,...)‏ Linkable numbers (telephone, birthdays, …)‏ Related words (like the car -> Ferrari)‏ Common words from dictionaries Common patterns (qwerty, , …)‏ Fashion words Containing big an small letters Containing numbers and special characters > 8 characters Can be written fast First 3 prevent the search 4 is to prevent observation

Password verification Compatre the input with a stored value Passwords need to be stored Plain Encrypted One way Bi-directional Passwords need to be transfered Plain Encyrpted

Security of Passwords Security is based mainly on the user but also how it is implemented in the system Systems can implement additional functions to harden passwords

Attacks against passwordsystems Test all possible passwords Guess likely words – lexical attacks Social engineering Looking for the systems password list Attacking the authentication mechanism Ask the user

Ways to harden Limited number of tries Wrong inputs slow down the process Challenge Respond Authorize also the system Combining different systems Harden the process Require passwords with high entropy

One time passwords A password is only valid one‘s Technqiues Transaction numbers (TAN)‏ Hashed with time stamp

Cryptographic techniques Cryptography for authentication purpose Popular techniques Kerberos Certificates X.509 Challenge Respond Systems Problems Complex Infrastructure dependent

Security token Something you have Popular Representative Cryptographic Token SmartCards Problems Costly Technical Infrastructure

Smart Cards A card with a chip Not necessarily for authentication Different types ROM Cards EEPROM Cards Microprocessor cards

Smart cards Prominent Examples Bank cards Credit cards Mobile phone cards

Attacks against Smart cards Protocol attacks the communication between the smart card and the card reader Blocking signaling block Signals (for example erase signals Freeze or reset the card make the content of the RAM readable

Attacks against Smart cards Physical Probing reading data directly from the hardware Damage part of the chip for example the address counter Reverse engineering reveal the chip design and gain knowledge

Biometrics The security relies on the property of a human being Measuring some aspects of the human anatomy or physiology and compare it with previously recorded values Problems: Humans change over time

Concepts Physical DNA Face Fingerprint Iris Hand geometry Behavioral Voice Signature Verification

Conventional biometrics Face recognition - ID Cards The oldest and probably most accepted method Average security – result of studies Handwritten signatures Is in Europe highly accepted Good enough security

Fingerprints Look at the friction ridges that cover fingertips Branches and end points geometry – commonly 16 Pores of the skin Easy to deployed and relative limited resistance Problems There is a statistical probability of mismatch – the number of variation is limited Fingerprints are mostly „noisy“ Alteration is easy

Iris Scan Patterns in the Iris are recognized Iris codes provide the lowest false accept rates of any known system – US Study Problems Get people to put there eye into a scanner Systems might be ulnerable to simple photographies

Problems with biometrics Not exact enough False positives and Positive False are common Technical difficult The technology is new Privacy problems Sicknesses can be recognized Social problems Usage of system Revelation generates problems Data leak out incidentally When the use became widespread your data will be known by a lot of people

Singel Sign-on Only one sign-on for all applications Techniques Save password – but how Issue a ticket Trends Identity managment systems

26 Identity Management Types of IdM (Systems)‏ by user herself/himself supported by service providers Management of own identities: chosen identity (= Tier1) ‏ Type 3 by organisation Profiling: derived identity abstracted identity (= Tier 3) Type 2 by organisation Account Management: assigned identity (= Tier 2) ‏ Type 1  There are hybrid systems that combine characteristics

27 “Identity” is changing IT puts more HighTech on ID cards Biometrics to bind them closer to a human being Chips to add services (such as a PKI)‏ Profiles may make the „traditional“ ID concept obsolete People are represented not by numbers or ID keys any more but by data sets. Identities become “a fuzzy thing”. New IDs and ID management systems are coming up Mobile communication (GSM) has introduced a globally interoperable „ID token“: the Subscriber Identity Module Ebay lets people trade using Pseudonyms. Europe (the EU) consider joint ID and ID management systems European countries have different traditions on identity card use Compatibility of ID systems is not trivial Work on new standards for Identity management systems and entity authentication are initiated by ISO and ITU

28 Identity Concepts Partial Identities Illustrated AnonymityWorkPublicAuthority Health Care foreign languages education address capabilities salary name income credit cards tax status denomination account number birthdate marital status hobbies insurance nickname (dis)likes phone number health status blood group Shopping Leisure Identities Management

29 Changing borders of (partial) identities AnonymityWorkPublicAuthority Health Care foreign languages education address capabilities salary name income credit cards tax status denomination account number birthdate marital status hobbies insurance nickname (dis)likes phone number health status blood group Shopping Leisure Borders are blurring

30 Changing borders of (partial) identities (cont.)‏ AnonymityWorkPublicAuthority Health Care foreign languages education address capabilities salary name income credit cards tax status denomination account number birthdate marital status hobbies insurance nickname (dis)likes phone number health status blood group Shopping Leisure Communication and contacts

Questions ?