Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey Shujun LiShujun Li, Harry ShumHarry Shum Visual Computing Group Microsoft.

Slides:



Advertisements
Similar presentations
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Advertisements

The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Lecture 6 User Authentication (cont)
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Trustworthy Computing in My Mind: A Case Study on Visual Password Shujun Li Visiting Student at VC Group, Microsoft Research Asia Institute of Image Processing.
3d ..
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Providing Trusted Paths Using Untrusted Components Andre L. M. dos Santos Georgia Institute of Technology
HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
1 Zaps and Apps Cynthia Dwork Microsoft Research Moni Naor Weizmann Institute of Science.
CAPTCHA Prabhakar Verma “08MC30”.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Security and Protection of Information, Brno Using quasigroups for secure encoding of file system Eliška Ochodková, Václav Snášel
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
CS CS 5150 Software Engineering Lecture 18 Security.
Company Confidential © 2008 Nokia V1-Filename.ppt / YYYY-MM-DD / Initials 1 Local Authentication for mobile devices Andreas Heiner.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
IMAGINATION: A Robust Image-based CAPTCHA Generation System Ritendra Datta, Jia Li, and James Z. Wang The Pennsylvania State University – University Park.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
G53SEC 1 Authentication and Identification Who? What? Where?
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
HumanAut (or SecHCI: Secure Human- Computer Identification System against Peeping Attacks) Shujun LI Xi’an Jiaotong Univ. Oct
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper) FC 2010 Toni Perković joint work with Mario Čagalj and Nitesh Saxena.
Breaking Undercover: Exploiting Design Flaws and
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
3D Password.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Sub-fields of computer science. Sub-fields of computer science.
Authentication Schemes for Session Passwords using Color and Images
Cryptographic Hash Functions Part I
A novel probabilistic language-based CAPTCHA system
Presentation transcript:

Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey Shujun LiShujun Li, Harry ShumHarry Shum Visual Computing Group Microsoft Research Asia Sep. 2002

Outline Introduction A User Study SecHCI: General Model SecHCI: A Comprehensive Survey SecHCI: Other Related Works Our Opinions

1. Introduction Outline Human-Computer Identification Problems of Widely-Used Fixed Passwords Yet Another Danger: Peeping Attack In the real world In the theoretical world Known Solutions to Peeping Attack

1.1 Human-Computer Identification Three Identifications Knowledge-based: What do you know? Fixed (textual/visual) password / PIN Pass-phase / Pass-algorithm / word-association Challenge-response identification protocol Zero-knowledge identification protocol Token-based: What do you have? Magnetic-striped card / Smart card Hand-held one-time password generator Biometrics-based: Who are you? Face / Fingerprint / Iris / …

1.1 Human-Computer Identification Three Identifications: Comparison Knowledge-based Fixed Password: Easily understood and widely accepted, but vulnerable to dictionary attack and replay attack Challenge-response protocol: Relatively complex but secure against replay attack Token-based More secure than fixed password You must physically have it / sensitive to loss Biometrics-based Always with you / minimal user efforts Performance is not really satisfactory / privacy involved

1.2 Problems of Fixed Password Dictionary attack: A troublesome paradox between security and usability Humans always select passwords from a dramatically small subset of the password space Too random or too long passwords are hard to remember for humans Compulsive password rules are useful to avoid problems, but users always try to circumvent the rules Partial solutions: Limitations still exist Pass-phrases / Pass-algorithms / Word associations / … Visual/graphical passwords

1.3 Peeping Attack In the Real World Your friends standing behind your shoulders can observe your password Your adversaries can install hidden cameras to steal your password Your adversaries can deploy malicious programs in your computer to get your password Powerful enemies can use TEMPEST (compromising emanations) devices to monitor your computer A lot of real stories on peeping attacks to banking cards (on ATMs) were reported by R. J. Anderson in 1994.

1.3 Peeping Attack In the Theoretical World SecHCI means such a human-computer identification by which one can successfully prove its identity without any auxiliary devices and via insecure communication channel. Two kinds of peeping attacks Passive peeping attack and Active peeping attack  In passive peeping attack, adversaries can only passively observe the identification procedure  In active peeping attack, adversaries can impose the verifiers Open peeping attack and Hidden peeping attack One more requirement Human sensitivity (consciousness) to faked verifiers

1.4 Solutions to Peeping Attack Non-SecHCI Displaying “******” on the screen instead of plain-password Shielding your input from malicious “eyes”. Visual shielding / TEMPEST shielding LVSVSS – a shielding based on visual cryptography One-time passwords Challenge-response protocols Biometrics?

1.4 Solutions to Peeping Attack SecHCI Matsumoto-Imai protocol proposed at EuroCrypt’91 Not secure enough, cryptanalyzed by C.-H. Wang et al. at EuroCrypt’95 Matsumoto protocols proposed at HCI International’95 and ACM CCS’96 Security against peeping attack is not strong Hopper-Blum protocols proposed at AsiaCrypt’2001 Security against peeping attack is acceptable, but the usability is not good. PhoneOIDs proposed by M. Blum (2001) All proposed PhoneOIDs have been known insure HumanAut Project supported by CMU (2002) One implementation of a variant of Hopper-Blum protocol in AsiaCrypt’2001 paper.

2. A User Study Goals and Brief Description Goals Investigate the users’ opinions on security and usability of human-computer identification system, especially fixed passwords and SecHCI Show the significance of peeping attack and SecHCI Confirm some principles in the design and implementation of human-computer identification systems Brief description A web site is constructed 18 questions are involved About 100 volunteers attended

2. A User Study 2.1 Investigation Results (1) Fixed passwords I Almost all users ever forgot their passwords Most users ever told other of their passwords Most users think security is more important than convenience (usability) after careful consideration Many users ever encountered hesitation when they set a new password Some users even have no really secret passwords Summary: for most users, security > usability, but they always forget this principle in the real world.

2. A User Study 2.1 Investigation Results (2) Fixed passwords II All users have two or more different passwords Most users have <=6 different passwords Most users use 6~10-length passwords Most users also think 6~10 is the best password length Most users think 15 (about) is the upper bound of the password length for all security applications Summary: for most users, 6~10-length passwords are good, and >16 length is unendurable.

2. A User Study 2.2 Investigation Results (3) Peeping attack Most users think peeping attack is a real danger in the security world, especially when their money and privacy is endangered. Most users will follows at least partial warns from security experts and technical news. Summary: the significance of peeping attack is confirmed, especially for electronic financial applications.

2. A User Study 2.2 Investigation Results (4) SecHCI Most users wish the identification procedure can be finished within 1 minute Most users think security and usability should be balanced in the design of secure human-computer identification Summary: a good SecHCI must balance security and usability, and the consuming time for one identification should be <= 1 minute.

3. SecHCI: General Model 3.1 Fundamentals SecHCI should be a challenge-response protocol with time-variant parameters like the following one. Define SecHCI as a HCIP – human-computer interactive protocol (H,C) with auxiliary input. The transcript between H and C is T(H(x), C(y)), and the output of the protocol is, which is in the set {accept, reject,  }, where  means H find C is a fake verifier.

3. SecHCI: General Model 3.2 What is SecHCI? Completeness A HCIP is complete if Pr[ =accept]  1-P c. Soundness A HCIP is sound if Pr[ =accept]  P s. ( , ,  )-Human-Only Executability (HOE) A HCIP is ( , ,  )-human-only executable if any T(H(x),C(y)) can be carried by (1-  ) population with the error probability , and can be finished within  seconds. A SecHCI is a HCIP satisfying completeness and soundness, and ( , ,  )-HOE with acceptable parameters.

3. SecHCI: General Model 3.3 Definitions of Security (p, k)-security against passive peeping attack AA Pr[ =accept]  p, where A denotes adversaries observe k random sampled identifications. (p, k)-security against active peeping attack AA Pr[ =accept]  p, where A denotes adversaries observe k chosen identifications. (q, k)-human sensitivity (consciousness) to fake verifiers A AA Pr[ =  ]  1-q, where C(z,A(T k (H(z),C(z)))) denotes the fake verifier by A.

3. SecHCI: General Model 3.4 Security in the Real World Basic Attacks Random response attack (soundness) Brute force (exhaustive) attack Dictionary attack Peeping Attacks Store-and-replay attack Intelligent off-line password attack  Differential attack / Deduction-based attack / Intersecting attack Multi-onlooker peeping attack Advanced Attacks Partially-known password attack Malicious administrator attack Denial-of-Logon attack

4. A Comprehensive Survey 4.1 Matsumoto-Imai Protocol Matsumoto-Imai protocol [EuroCrypt’91] An simple example to show the basic idea:  ={1,2,…,9,0},  ={1,2,…,8} , the password is  ={1,2,4,6} ,  ={1,2,3,4} , W=3124. Assume  =#(  )=8 and =#(  )=4, the challenge q is a bijection from  to , and the response is a  -length word a=(a 1,…,a  ) whose characters are all in . The accepted responses should satisfy the following requirement: extract all characters in q and also in , and record their order in q to compose a list f=(f 1,…,f ), then  i=1~, a f(i) =W(i).

4. A Comprehensive Survey 4.1 Matsumoto-Imai Protocol Security problems Only one observation is enough to know . This protocol cannot resist “replay challenge attack” (an active peeping attack). Only several observations is needed to decrypt  and then find W. [C.-H. Wang et al. EuroCrypt’95] In passive peeping attack, the number of observations is also rather small. C.-H. Wang et al. proposed a modified version, but whose usability is too poor.

4. A Comprehensive Survey 4.2 Matsumoto Protocols Matsumoto Protocol 0 [ACM CCS’96] F s is a finite field of order s. The password is u vectors k 1 ~k u, where k i is v- dimensional vector in F s v. The challenge is a non-zero v-dimensional vector q i in F s v -{0}; the response a i is a element in F s. If  i=1~u, a i =q i  k i, the user is accepted. Matsumoto Protocol 1 and 2 [ACM CCS’96] Non-essential variants of Protocol 0.

4. A Comprehensive Survey 4.2 Matsumoto Protocols Usability Issues Protocol 1 can make implementations easier. Protocol 2 can provide a better trade-off between security and usability. Some graphical implementations of Protocol 1 and 2 are given in Matsumoto’s paper. Security Issues To break the password, only O(u) observations are needed for both passive and active peeping attack.

4. A Comprehensive Survey 4.3 Hopper-Blum Protocols Hopper-Blum Protocol 1 [AsiaCrypt’2001] The password is a (0,1)-vector x  {0,1} n whose weight is k. The challenge is also a (0,1)-vector c  {0,1} n. The response r is 0 or 1. For total m challenge, if r=c  x holds for at least (1-  )m challenges, the user is accepted.

4. A Comprehensive Survey 4.3 Hopper-Blum Protocols Security Issues Hopper-Blum Protocol 1 cannot resist replay challenge attack (active peeping attack). Some Errors and More Problems The result of Theorem 1 is wrong. The masquerading probability of random response attack is slightly overestimated. Paradox exists between security and usability, especially on the value of k.

4. A Comprehensive Survey 4.3 Hopper-Blum Protocols Hopper-Blum Protocol 2 [AsiaCrypt’2001] Basically, Protocol 2 is similar to Protocol 1 with two chief modifications. Modification 1: the response is calculated with sum of k mins. Modification 2: the linear error-correcting mechanism is introduced to avoid malicious change of legal challenges.

4. A Comprehensive Survey 4.3 Hopper-Blum Protocols Merits Protocol 2 can resist active peeping attack. Protocol 2 has 0.1-human sensitive to fake verifiers. Problems Usability of Protocol 2 is even more poor than Protocol 1. Some problems in Protocol 1 still exist in Protocol 2.

4. A Comprehensive Survey 4.4 An image-based SecHCI, n images are involved and n/2 images compose the password. A non-essential variant of Hopper-Blum Protocol 1. The challenge is always a vector with fixed weight. Usability is poor when n is too large. Pass-Rules You can freely change all n images. Then you can use some meaningful features of the n/2 pass-images to remember so many pictures.

4. A Comprehensive Survey 4.4 PhoneOIDs is “challenge-response protocols for use over the phone”, which means SecHCI protocols of two parties with limited computation capabilities. Many PhoneOIDs have been proposed, but all are insecure.

5. Other Related Works 5.1 Visual/Graphical Passwords Selective pictures based passwords Passface TM : In each round, select your pass-face from 9 candidate faces. Déjà Vu: Select m portfolio images from n candidate images. Point-and-click passwords PassPic: Click your pass-positions with your pass-order Graphical Password Windows in Passlogix v-GO TM SSO: Click several things to construct your password. Drawing-based passwords Draw-a-Secret (DAS): Draw your pass-strokes on a m  n grid.

5. Other Related Works 5.2 CAPTCHAs CAPTCHA stands for “Completely Automated Public Turing Test to Tell Computers and Humans Apart”, also called Reverse Turing Test by some researchers. The chief application of CAPTCHA is to foil malicious online robots, and can also be used to relax the security against random response attack in SecHCI protocols. The first paper on CAPTCHA occurred in 1996 (by M. Naor). The first implementation of CAPTCHA is designed in The initial booming of interests on CAPTCHAs is promoted by the occurrence of Gimpy, a CAPTCHA designed by M. Blum et al. at CMU in Now a CAPTCHA project is supported by Aladdin Center of CMU.

5. Other Related Works 5.2 CAPTCHAs Distorted texts based CAPTCHAs Another Gimpy-like Pessimal print Visual pattern based CAPTCHAs Image based CAPTCHAs CAPTCHAs based on image search problem More image processing techniques can be used to distort involved images

5. Other Related Works 5.2 CAPTCHAs Sound/Speech based CAPTCHAs Text-only CAPTCHAs Impossibility of text-only CAPTCHAs under six assumptions “Find the Bogus Word” Chinese CAPTCHAs?

5. Other Related Works 5.3 More Topics on HIPs HIP means “Human Interactive Proof”, which covers many topics, such as SecHCI protocol, CAPTCHA, and visual/graphical password. There is a HIP project at Aladdin Center of CMU to support research and product transfer of theoretical results.

5. Other Related Works 5.3 More Topics on HIPs Formal Studies on Security and Complexity of HIPs Computer Vision and HIPs Biometrics Visual Cryptography Human-Error-Tolerant Passwords (or Fuzzy Commitment) Other Sides?

5. Other Related Works 5.4 ZK Identification Protocol Many Zero-Knowledge based identification protocols have been proposed. The basic idea used in ZK protocols may be useful for the design of SecHCI protocols. The general model of ZK identification protocols: 1) P=>V: a public (random) witness; 2) V=>P: a (random) challenge; 3) P=>V: a response (dependent on the witness and the challenge).

6. Our Opinion on SecHCI 6.1 A Comparison By security against passive peeping attack Matsumoto-Imai Protocol < Matsumoto Protocols < Hopper-Blum Protocol 2 < Hopper-Blum Protocol 1; By security against active peeping attack Matsumoto-Imai Protocol < Matsumoto Protocols < Hopper-Blum Protocol 1 < Hopper-Blum Protocol 2; By usability Hopper-Blum Protocol 2 < Matsumoto-Imai Protocol < (0,1)-version of Hopper-Blum Protocol 1  decimal version of Hopper-Blum Protocol 1  Matsumoto Protocols.

6. Our Opinion on SecHCI 6.2 Our Opinion Three principles Intentional errors Redundancies Balance Two desired requirements The password length <= 16 The identification time <= 1 minute.

6. Our Opinion on SecHCI 6.3 A Prototype Protocol Following our opinions on SecHCI, we can give a prototype protocol as follows The password is a (0,1)-vector x  {0,1} n whose weight is k. The challenge is 2m (0,1)-vectors c 1,…,c 2m {0,1} n. The response is 2m bits r 1,…r 2m. If  i=1~m, (r 2i-1 -c 2i-1  x)+(r 2i -c 2i  x)=1 (mod 2), then the user is accepted. Such a protocol may be OK as a new solution of SecHCI.

Thanks for watching!