Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Use Your Illusion: Secure Authentication Usable Anywhere Eiji Hayashi Nicolas Christin Rachna Dhamija Adrian Perrig Carnegie Mellon CyLab Japan.
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in.
Chapter 3 Passwords Principals Authenticate to systems.
Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Human Computable Passwords
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
Authentication Approaches over Internet Jia Li
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
E XPLORING USABILITY EFFECTS OF INCREASING SECURITY IN CLICK - BASED GRAPHICAL PASSWORDS Elizabeth StobertElizabeth Stobert, Alain Forget, Sonia Chiasson,
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
CIS 450 – Network Security Chapter 8 – Password Security.
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Visual Authentication Mechanisms. Rationale “Human memory for images is better than for words” Human memory for faces in particular is extremely good.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3D Password.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Challenge/Response Authentication
Towards Human Computable Passwords
Authentication Schemes for Session Passwords using Color and Images
Use Your Illusion: Secure Authentication Usable Anywhere
REU Summer Research in Computer Security
Dynamic Authentication of Typing Patterns
Exercise: Hashing, Password security, And File Integrity
COEN 351 Authentication.
Presentation transcript:

Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004

Talk Outline  Machines Authenticating Users –Déjà Vu User Study- Using Images for Authentication  Users Authenticating Remote Servers –Interfaces for website authentication

Password Usability and Security  Simple and meaningful passwords - Memorable, but easier to guess  Complex passwords - Strong, but hard to remember  Advantages of passwords –Cheap and easy to implement –We develop muscle memory

Previous Solutions  Stronger password hashing & storage  Proactive password cracking  Enforce system policies  Better user education and training –Significant non compliance rate by users We try to address the fundamental problem: Recall is hard

Picture recognition is easier  Humans have a vast memory for pictures –2560 photos for a few seconds: 90% recognition [Standing, Conezio, Haber] –10,000 photos: 66% recognition after 2 days [Standing] –200 random photos: >90% after 1-3 months [Weinshal/Kirkpatrik, CHI2004]  Fractions of a second is enough to remember  Picture recognition is easier than verbal recognition  Picture recognition is easier than picture recall –Harder to recall semantics or to redraw picture –But picture recall is better than verbal recall

Déjà Vu Design Goals  Base security on human strengths Recognition over recall  Prevent weak passwords  Prevent password sharing  No biometrics or tokens

Authentication through Images  Choose image portfolio  Challenge set = portfolio + decoys  Photos and Random Art

Random Art Algorithm: seed -> pseudo-random number generator-> random expression tree maps pixels to RGB -> random art

Choose Image Portfolio

Portfolio Training

Challenge

Portfolio Creation Screen

Login Screen

Attacks  Brute Force –optimal portfolio and challenge depends on security –5 image portfolio/25 challenge set = 53,130 combinations  Measures against shoulder surfers: –hide image selection –distort images  Measures against Intersection Attack: –Always show same challenge set –Multi-stage authentication

Experiment Design  Target population = general computer users 20 participants (11 males + 9 females, expert/novice) Initialization PIN (4 digits) Password (6 char.) Art portfolio (5/100) Photo portfolio (5/100) Login PIN Password Art (5/25) Photo (5/25)  Repeat login after one week  Task order randomized  Portfolio creation- same images but random order  Portfolio login- random images and random order

Task Completion Time Unlimited time & attempts Does not include failed logins

Error Rate Session 1: no unrecoverable errors made with portfolios Session 2: significantly less failed logins with portfolios (all users remembered 4/5 images on first attempt)

More Results  It’s easier than it looks  Text vs. image portfolios –Passwords/PINS faster to create & login –Users reported that photos easier than PINs –More users forgot their user names than portfolios!  Art vs. photos –Photos easier to remember, but easier to guess Gender, race, interests were a factor in choice –People choose similar photos; art is individual –Art descriptions vary, hard to describe How hard are they to communicate? Spouse-proof?

Conclusions in this study  Recognition-based authentication –More reliable long term than passwords, PINs –Easier, more pleasant to use –Random Art portfolios are harder to predict than passwords or real images  Applications –Where text input is hard, limited observation (e.g., ATM, PDA, pen-based devices) –Infrequently used high availability passwords

Future Work  Long term studies –Frequency of use –Multiple portfolios and changes –Portfolio communication & prediction study –Cued recall of text passwords  Image Generation & Distortion –Image generation and distortion techniques –What is the space of images are distinguishable, memorable?  Strengthen against attack, improve login times, allow non- perfect probabilistic recognition

Talk Outline  Machines Authenticating Users –Déjà Vu User Study  Users Authenticating Remote Servers –Interfaces for website authentication

Challenge