Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Lecture 6 User Authentication (cont)
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Security-Authentication
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CS526: Information Security Chris Clifton October 16, 2003 Authentication.
BUSINESS B1 Information Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Cisco’s Secure Access Control Server (ACS)
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Technical Devices for Security Management Kathryn Hockman COSC 481.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Outline The basic authentication problem
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
Network Security Unit-VI
Authentication.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

csci5233 Computer Security1 Bishop: Chapter 12 Authentication

csci5233 Computer Security2 Outline Introduction Passwords-based authentication Challenge-response Other methods: –Biometrics-based authentication –Location-based authentication –Hybrid approach

csci5233 Computer Security3 Authentication Authentication: Binding of identity to the subject –Entity knows something Passwords, id numbers –Entity has something Badge, smart card –Entity is something Biometrics –Entity is someplace Source IP, restricted area terminal

csci5233 Computer Security4 Authentication Five components in an authentication system (AS) –A: set of authentication information used by the entity to prove its identify e.g., id/password –C: set of complementary information used by the AS to validate A e.g., passwords –F: set of complementation functions f : A → C Given a  A, generate appropriate c  C e.g., Given id & password, the AS retrieves the stored password.

csci5233 Computer Security5 Authentication (Cont.) –L: set of authentication functions l: A  C → { true, false } verify the entity ’ s identity e.g., Given the id/password provided by the entity, and the retrieved password, the AS compares the two passwords to determine if the entity should be authenticated. l in this case is the equivalent( ) function. –S: set of selection functions Enables the entity to generate/alter A and/or C e.g., mechanisms allowing a user to change its password (such as passwd in UNIX)

csci5233 Computer Security6 Passwords-based Authentication A password is information associated with an entity that confirms its identity. How can passwords be protected? A solution: one-way hashing A user’s password is encrypted and then stored. The stored password is never decrypted. It should be difficult for an attacker to revert the stored password to the plaintext password. A user A may try to guess the password of another user, B, and thus impersonate B. (next slide)

csci5233 Computer Security7 Passwords-based Authentication Impersonating by guessing passwords The goal: To find an a  A such that, for f  F, f(a) = c  C, and c is associated with an entity. General approaches 1.Hide enough information so that one of a, c, or f cannot be found. 2.Prevent access to the authentication functions L. 3.Other approaches? The 3-tries “principle”

csci5233 Computer Security8 Passwords-based Authentication A dictionary attack is the guessing of a password by repeated trial and error. The dictionary may be a set of strings in random order, or a set of strings in decreasing order of probability of selection. Type one dictionary attack: Given c  C and f  F, the attack takes each guess g and computes f(g) for each f  F. If f(g) corresponds to the c for the entity, then g authenticates the entity under f. Type 2 dictionary attack: Given l  L, the attack takes a guess g. If l returns true, given g, then g is the correct password.

csci5233 Computer Security9 Passwords-based Authentication Countering dictionary attack –The goal: To maximize the time needed to guess the password –Anderson’s Formula: P: The probability that an attacker guesses a password in a specified period of time G: The number of guesses that can be tested in one time unit T: The number of time units during which guessing occurs N: The number of possible passwords A generalized form of the formula: Examples: next slide

csci5233 Computer Security10 Passwords-based Authentication An example: –Let S be the length of the password. –Let A be the number of characters in the alphabet from which the characters of the password are drawn. Then N = A S. –Let E be the number of characters exchanged when logging in. –Let R be the number of bytes per minute that can be sent over a communication link. –Let G be the number of guesses per minute. Then G = R / E. –If the attack extends over M months, T = 30 x 24 x 60 x M. –Let P be the probability that the attack would succeed. Then

csci5233 Computer Security11 Passwords-based Authentication Analysis of the Anderson Formula: –The goal is to maximize the time needed for the attacker to guess the password (T). –That is, to decrease the chance that the attack may succeed (P). Approaches: –To increase N, the set of possible passwords –To decrease the time allowed to guess the passwords, that is, to reduce T –To decrease G Question: How can each of the approaches be implemented? See the 2 nd example on page 313.

csci5233 Computer Security12 Passwords-based Authentication Password Selection –Random –Pronounceable nonsense –Use selection Controls on allowable –Password checking, aging

csci5233 Computer Security13 Outline

csci5233 Computer Security14 Challenge-Response The fundamental problem with passwords is that they are reusable. That is, a valid password may be replayed by an attacker. Solution? To associate a password with only one session A challenge-response AS is one in which the system S sends a random message m (the challenge) to a user U, and U replies with r = f(m). f( ) is a secret function agreed upon by both S and U. 1.U  request to connect  S 2.S  challenge (c)  U 3.U  response (r)  S // S validates r by determining whether r = f(c).

csci5233 Computer Security15 Challenge-Response A function f is called a pass algorithm, if f is the secret in a challenge-response AS. A sample pass algorithm: –Suppose f(c) = c c mod. –On November 12, 2004, when the AS sends c = 5 to U, U should return 1121 in order to be authenticated. Otherwise the authentication fails.

csci5233 Computer Security16 Challenge-Response One-Time Passwords A one-time password is a password that is invalidated as soon as it is used. A form of challenge-response authentication. The user and the AS agree on the mechanism of generating a sequence of passwords. Every time a password in the sequence is used, it is invalidated. The next time the user logs in, the next password in the sequence is used.

csci5233 Computer Security17 Challenge-Response Hardware-supported C/R authentication One or more hardware devices are used in the C/R validation procedure. Two forms 1.Tokens: A token is a device that provides mechanisms for hashing or enciphering information. a) AS  c  U b) U  c  token c) token  r  U d) U  r  AS 2.Time-based: A device, which is attached to a computer, displays a different number every 60 seconds. To log in, the user enters the number displayed on the device, followed by his/her password. e.g., RSA SecurID Card

csci5233 Computer Security18 Challenge-Response Advantages of hardware-supported authentication? –Two-factor authentication Links: –RSA SecurID Card (SD200): –RSA SecurID® Card Studio: –Authentication using RSA SecurID Card: More Information: –The Power Behind RSA SecurID® Two-factor User Authentication: RSA ACE/Server® (an RSA white paper) nator/search/xml.txt?query=RSA+SecurID+Card+&pr=default&order=r&cq=&id=3fb204b72 nator/search/xml.txt?query=RSA+SecurID+Card+&pr=default&order=r&cq=&id=3fb204b72

csci5233 Computer Security19 Challenge-Response Attacks on Challenge-Response Authentication –If the attacker have sufficient number of challenges (c) and the respective responses (r), he can try to deduce the encryption algorithm. –Example: the compromised Kerberos AS –A solution: encrypted key challenge [Bellovin/Merritt, 1992] Use shared key to share session key Session key encrypts challenge Challenge thus indistinguishable from random data

csci5233 Computer Security20 Outline

csci5233 Computer Security21 Biometrics-Based Authentication Automatic measurement of biological or behavioral features that identify a person Used for human subject identification Based on physical characteristics that are tough to copy –fingerprint –voice patterns –iris patterns / retina scans –face recognition –keystroke dynamics (interval, timing, pressure, duration, location, etc.) –Combined approach

csci5233 Computer Security22 Location-Based Authentication Location signature = unique location + unique time –Describes the physical location of an entity –Relies on GPS Location signature sensor (LSS) –A hardware device used by the user’s host to obtain a LS for the user –The LS is transmitted from the user site to the AS site for authentication. Attacks at location-based authentication Stolen LSS: impersonation attacks ? Intercepted LS: replay attacks ?

csci5233 Computer Security23 Location-Based Authentication Strengths of LBA: 1.Hardware-based authentication 2.A stolen LSS is useless. (True?) 3.The authentication can be done continuously. Any weakness ?

csci5233 Computer Security24 Hybrid Authentication The principle of multiple factors Examples: LSS + id/password Challenge/response + smart card What you are + what you have (examples?)

csci5233 Computer Security25 Summary Passwords-based authentication Challenge/Response Other methods: –Biometrics-based authentication –Location-based authentication –Hybrid approach

csci5233 Computer Security26 Next Chapter 14: Identity