Authentication. Definitions Identification - a claim about identity Identification - a claim about identity –Who or what I am (global or local) Authentication.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
WELCOME TO OUR READING ASSESSMENT PREP INFO PRESENTATION CONGRATULATIONS!!!
Use Your Illusion: Secure Authentication Usable Anywhere Eiji Hayashi Nicolas Christin Rachna Dhamija Adrian Perrig Carnegie Mellon CyLab Japan.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
CyLab Usable Privacy and Security Laboratory 1 Authentication, access control, and policy configuration Lorrie Faith Cranor October.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Installing software on personal computer
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Kok-Chie Daniel Pu - MSISPM. Wow... Daniel will be presenting a lecture on Graphical Passwords !!!
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Visual Authentication Mechanisms. Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.
Security in Operating Systems Cuiwei Zhao. Security in Operating System §Security breaches §Security goals §Protected objects of the general purpose operating.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Security CS Introduction to Operating Systems.
INTERNET SAFETY FOR KIDS
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Authentication and access control.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
SCSC 455 Computer Security Chapter 3 User Security.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
CSCE 201 Identification and Authentication Fall 2015.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
IS511 Introduction to Information Security Usable Security
3.6 Fundamentals of cyber security
Password Management Limit login attempts Encrypt your passwords
Use Your Illusion: Secure Authentication Usable Anywhere
Lesson 2: Epic Security Considerations
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Authentication

Definitions Identification - a claim about identity Identification - a claim about identity –Who or what I am (global or local) Authentication - confirming that claims are true Authentication - confirming that claims are true –I am who I say I am –I have a valid credential Authorization - granting permission based on a valid claim Authorization - granting permission based on a valid claim –Now that I have been validated, I am allowed to access certain resources or take certain actions Access control system - a system that authenticates users and gives them access to resources based on their authorizations Access control system - a system that authenticates users and gives them access to resources based on their authorizations –Includes or relies upon an authentication mechanism –May include the ability to grant course or fine-grained authorizations, revoke or delegate authorizations Slides modified from Lorrie Cranor, CMU

Building blocks of authentication Factors Factors –Something you know (or recognize) –Something you have –Something you are Mechanisms Mechanisms –Text-based passwords –Graphical passwords –Hardware tokens –Public key crypto protocols –Biometrics

Two factor systems Two factors are better than one Two factors are better than one –Especially two factors from different categories Question: What are some examples of two- factor authentication?

Evaluation Accessibility Accessibility Memorability Memorability –Depth of processing, retrieval, meaningfulness Security Security –Predictability, abundance, disclosure, crackability, confidentiality Cost Cost Environmental considerations Environmental considerations –Range of users, frequency of use, type of access, etc.

Typical password advice

Pick a hard to guess password Pick a hard to guess password Don’t use it anywhere else Don’t use it anywhere else Change it often Change it often Don’t write it down Don’t write it down –Do you? Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1

Problems with Passwords Selection Selection –Difficult to think of a good password –Passwords people think of first are easy to guess Memorability Memorability –Easy to forget passwords that aren’t frequently used –Difficult to remember “secure” passwords with a mix of upper & lower case letters, numbers, and special characters Reuse Reuse –Too many passwords to remember –A previously used password is memorable Sharing Sharing –Often unintentional through reuse –Systems aren’t designed to support the way people work together and share information

How Long does it take to Crack a Password? Brute force attack Brute force attack Assuming 100,000 encryption operations per second Assuming 100,000 encryption operations per second FIPS Password Usage FIPS Password Usage –3.3.1 Passwords shall have maximum lifetime of 1 year Password Length

The Password Quiz What is your score? What is your score? Do you agree with each piece of advice? Do you agree with each piece of advice? What is most common problem in the class? What is most common problem in the class? Any bad habits not addressed? Any bad habits not addressed?

Check your password Question: Why don’t all sites do this?

Text-based passwords Random (system or user assigned) Random (system or user assigned) Mnemonic Mnemonic Challenge questions (semantic) Challenge questions (semantic) Anyone ever had a system assigned random password? Your experience? Anyone ever had a system assigned random password? Your experience?

Four Mnemonic Passwords First letter of each word (with punctuation) fsasya,oF Substitute numbers for words or similar-looking letters 4sa7ya,oF Substitute symbols for words or similar-looking letters F 4sasya,oF Four 4sa7ya,oF 4s&7ya,oF score score s andaand seven seven sseven yearsy ago a,, our oFathers F Source: Cynthia Kuo, SOUPS 2006

The Promise? Phrases help users incorporate different character classes in passwords Phrases help users incorporate different character classes in passwords –Easier to think of character-for-word substitutions Virtually infinite number of phrases Virtually infinite number of phrases Dictionaries do not contain mnemonics Dictionaries do not contain mnemonics Source: Cynthia Kuo, SOUPS 2006

Memorability of Password Study Goal Goal –examine effects of advice on password selection in real world Method: experiment Method: experiment independent variables? independent variables? Advice given Advice given Dependent variables? Dependent variables? Attacks, length, requests, memorability survey Attacks, length, requests, memorability survey

Study, cont. Conditions Conditions –Comparison –Control –Random password –Passphrase (mnemonic) Students randomly assigned Students randomly assigned Attacks performed one month later Attacks performed one month later Survey four months later Survey four months later

Results All conditions longer password than comparison group All conditions longer password than comparison group Random & passphrase conditions had significantly fewer successful attacks Random & passphrase conditions had significantly fewer successful attacks Requests for password the same Requests for password the same Random group kept written copy of password for much longer than others Random group kept written copy of password for much longer than others Non-compliance rate of 10% Non-compliance rate of 10% What are the implications? What are the strengths of the study? Weaknesses?

Source: Cynthia Kuo, SOUPS 2006 Mnemonic password evaluation Mnemonic passwords are not a panacea, but are an interesting option Mnemonic passwords are not a panacea, but are an interesting option –No comprehensive dictionary today May become more vulnerable in future May become more vulnerable in future –Users choose music lyrics, movies, literature, and television –Attackers incentivized to build dictionaries Publicly available phrases should be avoided! Publicly available phrases should be avoided! C. Kuo, S. Romanosky, and L. Cranor. Human Selection of Mnemonic Phrase-Based Passwords. In Proceedings of the 2006 Symposium On Usable Privacy and Security, July 2006, Pittsburgh, PA.

Password keeper software Run on PC or handheld Run on PC or handheld Only remember one password Only remember one password How many use one of these? How many use one of these? Advantages? Advantages? Disadvantages? Disadvantages?

“Forgotten password” mechanism password or magic URL to address on file password or magic URL to address on file Challenge questions Challenge questions Why not make this the normal way to access infrequently used sites? Why not make this the normal way to access infrequently used sites?

Challenge Questions Question and answer pairs Question and answer pairs Issues: Issues: –Privacy: asking for personal info –Security: how difficult are they to guess and observe? –Usability: answerable? how memorable? How repeatable? What challenge questions have you seen? Purpose?

Challenge questions How likely to be guessed? How likely to be guessed? How concerned should we be about How concerned should we be about –Shoulder surfing? –Time to enter answers? –A knowledgeable other person? –Privacy?

Graphical Passwords We are much better at remembering pictures than text We are much better at remembering pictures than text User enters password by clicking on on the screen User enters password by clicking on on the screen –Choosing correct set of images –Choosing regions in a particular image Potentially more difficult to attack (no dictionaries) Potentially more difficult to attack (no dictionaries) Anyone ever used one? Anyone ever used one?

Schemes Choose a series of images Choose a series of images –Random[1] –Passfaces[2] –Visual passwords (for mobile devices)[3] –Provide your own images 1.R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, W. Jansen, et al, "Picture Password: A Visual Login Technique for Mobile Devices," National Institute of Standards and Technology Interagency Report NISTIR 7030, 2003.

Schemes Click on regions of image Click on regions of image –Blonder’s original idea: click on predefined regions [1] –Passlogix – click on items in order [2] –Passpoints – click on any point in order [3] 1.G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, S. Wiedenbeck, et al. "Authentication using graphical passwords: Basic results," in Human-Computer Interaction International (HCII 2005). Las Vegas, NV, 2005.

Schemes Freeform Freeform –Draw-a-Secret (DAS) I. Jermyn, et al. "The Design and Analysis of GraphicalPasswords," in Proceedings of the 8th USENIX SecuritySymposium, –Signature drawing

Theoretical Comparisons Advantages: Advantages: –As memorable or more than text –As large a password space as text passwords –Attack needs to generate mouse output –Less vulnerable to dictionary attacks –More difficult to share Disadvantages Disadvantages –Time consuming –More storage and communication requirements –Shoulder surfing an issue –Potential interference if becomes widespread See a nice discussion in: Suo and Zhu. “Graphical Passwords: A Survey,” in the Proceedings of the 21 st Annual Computer Security Applications Conference, December 2005.

How do they really compare? Many studies of various schemes… Many studies of various schemes… Faces vs. Story Faces vs. Story –Method: experiment independent – participant race and sex, faces or story independent – participant race and sex, faces or story Dependent – types of items chosen, liklihood of attack Dependent – types of items chosen, liklihood of attack –Real passwords – used to access grades, etc. –Also gathered survey responses –Results: we are highly predictable, particularly for faces we are highly predictable, particularly for faces Attacker could have succeeded with 1 or 2 guesses for 10% of males! Attacker could have succeeded with 1 or 2 guesses for 10% of males! –Implications?

Other examples Passpoints predictable too! Passpoints predictable too! Can predict or discover hot spots to launch attacks. Can predict or discover hot spots to launch attacks. Julie Thorpe and P.C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords, in Proceedings of 16 th USENIX Security Symposium, 2007.

Other uses of images CAPTCHA – differentiate between humans and computers CAPTCHA – differentiate between humans and computers –Use computer generated image to guarantee interaction coming from a human –An AI-hard problem Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford. “CAPTCHA: Using Hard AI Problems for Security,” In Advances in Cryptology, Eurocrypt 2003.

More food for thought How concerned should we be about the weakest link/worse case user? How concerned should we be about the weakest link/worse case user? –Do we need 100% compliance for good passwords? How do we achieve? What do you think of “bugmenot” What do you think of “bugmenot”bugmenot Is it possible to have authorization without identification? Is it possible to have authorization without identification?

Project Groups 3 groups of 4, 1 group of 3 3 groups of 4, 1 group of 3 Form your group by the END of class next week Form your group by the END of class next week Preliminary user study of privacy or security application, mechanism, or concerns Preliminary user study of privacy or security application, mechanism, or concerns Deliverables: Deliverables: –Idea –Initial plan 5 points –Plan 20 points –Report 20 points –Presentation 5 points

Project Ideas Start with a question or problem… Start with a question or problem… –Why don’t more people encrypt their s? –How well does product X work for task Y? –What personal information do people expect to be protected? Flip through chapters in the book & papers Flip through chapters in the book & papers –Follow up on existing study Examine your own product/research/idea Examine your own product/research/idea Examine something you currently find frustrating, interesting, etc. Examine something you currently find frustrating, interesting, etc.

Ideas?

A Look Ahead Next week: User studies Next week: User studies –pay attention to the method of study in your readings –ALSO: observation assignment Two weeks – rest of authentication Two weeks – rest of authentication –ALSO: project ideas due

Next week’s assignment Observe people using technology Observe people using technology –Public place, observe long enough for multiple users –Take notes on what you see Think about privacy and security, but observe and note everything Think about privacy and security, but observe and note everything –Write up a few paragraphs describing your observations Don’t forget IRB certification Don’t forget IRB certification