CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Lecture 6 User Authentication (cont)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
NS-H /11041 System Security. NS-H /11042 Authentication Verifying the identity of another entity Two interesting cases (for this class): –Computer.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Authentication Approaches over Internet Jia Li
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Lecture 11: Strong Passwords
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Lecture 6.1: Protocols - Authentication and Key Exchange I CS 436/636/736 Spring 2012 Nitesh Saxena.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Private key
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Outline The basic authentication problem
Password Management Limit login attempts Encrypt your passwords
CMSC 414 Computer and Network Security Lecture 15
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz

HW2  I plan to send vulnerability analyses to the attacked teams (unless you tell me otherwise)

HW3 review…

Password storage  In the clear…  Hash of password (done correctly) –Doesn’t always achieve anything! –Makes adversary’s job harder –Potentially protects users who choose good passwords  “Salt”-ed hash of password –Makes bulk dictionary attacks harder, but no harder to attack a particular password –Prevents using ‘rainbow tables’ generated in advance  Encrypted passwords? (What attack is this defending against?)  Centralized server stores password…

Centralized password storage  Authentication storage node –Central server stores password; servers request the password to authenticate user  Authentication facilitator node –Central server stores password; servers send information from user to be authenticated by the central server  Note that communication with the central server must be authenticated! –But can be authenticated using non-password mechanisms

“Do Strong Passwords Accomplish Anything?”

Basic points  Weak passwords suffice if account locking is used  Strong passwords are overly burdensome  Strong passwords do nothing to protect users from most common attacks: phishing or keylogging  Cost/benefit analysis –Are strong passwords worth the effort?

Typical user advice  Choose strong passwords  Change passwords frequently  Don’t write password down (including in your account…)

Attack taxonomy  Phishing  Keylogging  On-line password guessing for one userID  On-line password guessing for many userIDs  Off-line password guessing  Other –Social engineering –Password cached on machine

Attack taxonomy  Phishing/keylogging/other attacks unaffected by password strength  On-line attacks against one userID are preventable using moderate-strength passwords (next slide)  Off-line attacks are preventable by using a good protocol  Main advantage of strong passwords is for on-line attacks against many userIDs

On-line attacks against one user?  Assumptions –6-digit PIN –24-hour lockdown after 3 failed login attempts  Number of passwords an attacker can search in 10 years –3 * 365 * 10 ~ 10 4  Probability of success –10 4 /10 6 = 1%

On-line attacks against many users?  An attack on 10 6 users would likely succeed in breaking in to one of their accounts –Account locking has no effect!  Note that the number of password guesses depends on the number of users –N users => 3N password guesses per day (under previous assumptions)

On-line attacks against many users?  Useful to think in terms of the credential space of (userID, password) pairs –The adversary breaks-in if it guesses a valid credential  Say all 25-bit strings are valid userIDs (because userIDs issued sequentially) and 20-bit passwords are used –Size of credential space = 2 45 –Number of valid credentials = 2 20 –Success probability per attempt = –Expected attempts to success = 2 25

On-line attacks against many users?  Could decrease attacker’s success probability by making the space of legal userIDs more sparse!  We usually assume userIDs are public (e.g., sent in the clear during login)… –…but it would be hard for the attacker to collect very many userIDs

On-line attacks against multiple users?  Interesting distinction here –Users can write down their userIDs Protected against on-line attacks by moderate-strength password and account locking –Attacker can get the userID of any particular user –Attacker cannot (easily) get the userIDs of many users  Note that an attacker who can easily get many userIDs can perform a DoS attack on the site

On-line attacks against many users?  Preceding analysis assumes the adversary cannot distinguish an incorrect password guess from an incorrect guess of a userID –Be careful in what error messages are returned –Be careful of timing attacks

Forgotten passwords

 How to deal with users who forget their passwords?  Traditional approach: user physically requests password reset (after showing ID, etc.)  This does not work well over the web…

Forgotten passwords  Secret questions are often used  These are not very good! –33-39% of answers could be guessed by family members or close friends –20% of users could not remember their own answers!  Can be improved somewhat using multiple questions, and requiring a threshold of correct answers

Authentication tokens  RSA SecureID  PIN-protected memory card  Cryptographic smartcards –Aladdin eTokens  Smartphone –E.g., enter password to device  Still need a secure protocol!

Biometrics  How much entropy is there?  How private are they?  How reproducible are they?  Revocation?  Difficult to use securely –Errors –Non-uniform –Still need a secure protocol…

 How can you securely authenticate yourself to a remote server using your fingerprint?  Trivial solution: Biometric authentication Server User close? Completely vulnerable to eavesdropping!

Better(?) solution Server User A single-bit difference in the scanned fingerprint results in a failed authentication! H(, nonce) nonce h= H(, nonce) h= ?

Authentication using biometrics  There exist techniques for secure authentication using biometric data –Resilient to error! –Establish random, shared key  An active research area…

Basic authentication protocols…  Server stores H(pw); user sends pw –If pw is high-entropy, secure against server compromise but not eavesdropping –If pw is a password, not secure against server compromise or eavesdropping  Server stores pw, sends R; user sends F pw (R) –If pw is a high-entropy key, then this is secure against eavesdropping (but not server compromise) –If pw is a password, then this is insecure against an off- line dictionary attack

A public-key protocol  Server stores pk; user stores sk  Server sends R; user signs R –Using a secure signature scheme…  Is this secure against eavesdropping/server compromise? –What if we had used encryption instead?  Can we achieve security against eavesdropping and server compromise without public-key crypto?

Lamport’s protocol  Server stores H n (pw), sends n; user sends H n-1 (pw) –Server updates user’s entry…  Can also add “salt” to hash –Server sends salt to user as first flow –Allows user to use same password on different sites –Can use same password (but different salt) when password “expires” –Protects against pre-computation  Deployed as S/Key