HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
 Secure Authentication Using Biometric Data Karen Cui.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Authentication Approaches over Internet Jia Li
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
G53SEC 1 Authentication and Identification Who? What? Where?
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
HumanAut (or SecHCI: Secure Human- Computer Identification System against Peeping Attacks) Shujun LI Xi’an Jiaotong Univ. Oct
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Computer Security Set of slides 8 Dr Alexei Vernitski.
3D Password.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Challenge/Response Authentication
Authentication Schemes for Session Passwords using Color and Images
Coexistence Among Cryptography and Noisy Data Theory and Applications
Challenge/Response Authentication
Authentication.
Human Computable Passwords
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University

What is HumanAUT? HumanAUT stands for Human AUThentication Authentication: proving your identity (logging in) to a third party Protocols for a human to authenticate to a computer/ATM/etc. With a few twists…

A hypothetical environment Assume you are a: Naked person In a glass house With an insecure terminal Or you have lost your luggage, or had your wallet stolen, etc. How do you authenticate yourself? HumanAUT attempts to solve this

A hypothetical environment You Adversaries MP3 server

Motivation: conventional authentication methods Many authentication methods are currently in use Passwords, PIN numbers, smart cards, tokens, biometrics Each one of these has problems!

Conventional authentication – problems (1) Passwords can be snooped / key- logged / sniffed / surveilled / cracked / intercepted / guessed / dumpster dived / etc. PIN numbers are short and often easy to guess (birthdays), susceptible to “shoulder surfing”

Conventional authentication – problems (2) Hardware is expensive and relies on physical mechanisms, which can be stolen Biometrics are also expensive, and not as secure as we thought Gelatin fingers (Matsumoto ‘02) Able to reconstruct sample images from face recognition template (Adler ’03)

Conventional authentication – problems (3) Once someone steals your smart card or lifts fingerprints, it is very expensive or impossible to change your secret – single use access methods are better One-time passwords are very inefficient though – ideally, want reusable challenge-response system

Challenge-response Computer asks a series of questions If answered correctly, user is authenticated, otherwise they are locked out Think of “Password: ” prompt as challenge, password as response But with different questions and answers each time

HumanAUT HumanAUT is a challenge-response scheme with a shared secret between the human, who answers challenges using the secret, and the computer, which generates a unique random challenge on demand, where the correct response depends on the shared secret

Goals Secure No one else can authenticate themselves, even after observing successful authentications Human executable People have to do it in their heads – no hardware or other aids

Definitions (1) Authentication protocol Two sets of instructions, H (human) and C (computer), with a shared secret s C generates random challenges for H to respond to, and decides to accept or reject based on H’s response If H and C are using the same s, C accepts with high probability, otherwise rejects with high probability. Assume presence of adversary A

Definitions (2) Passive adversaries Observes authentications, then tries to authenticate Active adversaries May construct messages and present them to H Note that if A can intercept a challenge, have H respond, and then present that to C (man-in-the-middle attack), no protocol can be secure!

Definitions (3) A protocol is: (p, k) secure if, for polynomial-time adversary A observing k authentications, P(C accepts A) < p (p, q, k) detecting if it is (p, k) secure and if H can detect invalid challenges with probability > 1-q

Previous work - Matsumoto Matsumoto has come up with many schemes First was based on hiding a secret string among random characters, in positions dependent on the challenge Later broken, proposed new schemes

Previous work - Matsumoto Including map-based scheme

Previous work - Déjà Vu Perrig created Déjà Vu, a graphical recognition based system Based on recognition of images, not recall of secret key Requires large amount of graphical overhead – creation, storage, presentation Only good as memory aid – no real security guarantees as implemented

Previous work - Blum Mapping from letters  digits Challenge is an English string, response is a string of digits, each letter in the challenge corresponds to one digit in the response Letters transformed into digits and arithmetic manipulation performed with them s = mapping, arithmetic function

Previous work – Hopper (1) Created many of the useful definitions Scheme of filling a large grid with blank spaces and numbers, s = location of numbers to add together, H responds with that sum mod 10 However, grid has to have 1000 digits, H searches for 19 of them

Previous work – Hopper (2) Learning parity with noise: s = n-bit vector, challenge is c = n-bit vector, response is c  s Authenticate of correct exactly k out of m times – introduces noise factor (errors), essentially makes it hard to find a good data set to work with LPN is NP-Hard

Previous work – Hopper (3) Came up with methods for ensuring randomness in incorrect answers Also came up with ways to detect invalid challenges – all challenges must satisfy certain properties, or else H responds randomly, this prevents active A from creating arbitrary challenges

Previous work – Li (1) Presents two components of a secure authentication scheme “Twins” – essentially LPN with superfluous noise “Foxtail” – feed the unique response into a many-to-one function, so that the attacker doesn’t know what the actual response is. No evidence this is any more secure

Previous work – Li (2) Very elaborate demo scheme on the web, combines several schemes (mostly modified Déjà Vu and foxtailing) Takes a very long time to authenticate, especially with the recommended security parameters

Linear congruency Based on Manuel’s scheme, uses mapping from letters  digits Challenge is English word (or string) = a 1 a 2 …a n x = sum of all letters in challenge b 1 = n, b i = r i-1 r i = a i *x + b i Response = r 1 ||r 2 ||…||r n Averages 40 seconds per response

Grid / matrix Large grid of letters, each one maps to a digit via previously mentioned letter mapping s = location of digits to add together, or rules to find locations that depend on content of grid H responds with sum mod 10, response time a lot faster (20 x 20 grid ~ 4 seconds)

Visual map Similar to Matsumoto’s map scheme Numbers (letters) at certain locations in mock city layout are added together mod 10 Can (like most visual schemes) be made to detect if C or A generated the challenge Easy to memorize and execute, but can these locations be the same each time?

Two subsets (Avrim) Challenge is n-bit vector, s = two subsets of size log(n) (based on position in vector) r 1 = mode of first subset r 2 = sum of second subset Response = r 1  r 2 Can be given over the phone – no terminal required Problem: generalize to mod 10 or 100

Possible attacks Replaying same attack to H multiple times to defeat LPN Using differential cryptanalysis techniques – must have detection of invalid challenges Man-in-the-middle attack – very hard to solve

Questions (1) How many bits per response? Security vs. response time How sure do we want to be? Probability of A succeeding on random guesses is generally exponentially small Number of responses required depends on range of responses: ASCII char ~ 6.5 bits, digit ~ 3.3 bits

Questions (2) How long can it take? HCI issue – what are people willing to do to increase security? How much can people remember? What if they choose the secret? Can they be trained to remember more? How quickly and accurately can people do math? Psychological limits of ~90% of people

Questions (3) What are people good at doing? Visual recognition is easy AES K seems to be hard… How big should s be? How much is needed to guarantee H is who he says he is? How often should s change?

Current considerations Focusing on problems that machine learning people find to be difficult (Avrim) LPN is NP-Hard, should that be a requirement? Combining different schemes

Current directions Design of new protocols and combining existing ones to increase security and human executability Visual map + two subsets with LPN Proving security bounds on response functions Ways to make it easy for people to make letter mappings

Any questions?