CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Financial Services & Electronic Banking Ch PoB 2011.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Authentication: Overview
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
BIOMETRICS.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Network Security Unit-VI
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia University olaseind@mix.wvu.edu

Outline What is an authentication protocol? Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System

What are authentication protocols? The different schemes used to grant or decline access to a place/location. Establish the identity of a person. Establish a communication securely

Outline What is an authentication protocol? Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System

Password Authentication scheme Most widely used authentication protocol Encryption and decryption of password are done using algorithms Symmetric and Asymmetric encrypting techniques

Performance of some algorithms

Advantages Disadvantages Least expensive authentication method to use. No need to carry hardware device. User IDs and passwords can be changed at the user's choice. Disadvantages Not fully reliable when used for making financial transactions remotely, such as fund transfers and bill payments through an Internet banking channel. Security depends on the users' ability to maintain the user ID and password secret.

Outline What is an authentication protocol? Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System

Token based Authentication (smart card) Takes the form of ID cards e.g. student card, debit/credit cards, insurance cards gives access to Laboratories and other facilities on campus, ATMs and Library. Comes with single or multiple processors.

Advantages Disadvantages More secure to use than the normal user ID or password. Difficult for non-authorized users to extract the private key when stored on a smart card. Disadvantages Requires users to carry a smart card. Need for regular renewals

Some brands of smart cards

Outline What is an authentication protocol? Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System

Biometric Authentication Defines “who you are” not “what you have” or “what you can remember”

Biological and behavioral characteristics Finger prints Ridges and valleys Minutiae Face Hand/finger geometry Iris Voice

Definitions False Acceptance Rate (FAR): Probability that a biometric system falsely recognizes different characteristics as identical, thus failing to reject, for example, a potential intruder. False Rejection Rate (FRR): Probability that a biometric system falsely recognizes identical characteristics as being different, thus, for example refusing to accept an authorized person. False Match Rate (FMR): This indicates the proportion of persons who, when comparing characteristics, were falsely accepted.

Definitions continued… False Non-Match Rate (FNMR): This indicates the proportion of persons who, when comparing characteristics, were falsely not accepted. Failure to Acquire (FTA): This is the attempts that were previously rejected due to a low quality of the image, this is also the proportion of times the biometric device fails to capture a sample when the biometric characteristic is presented to it. Failure to Enroll (FTE): This is a measure of the proportion of users that cannot be successfully enrolled in a biometric system

Performance of biometric systems

Efficiency in image capturing process.

Relationship between the False match rate and False non-match Performance in terms of effectiveness Relationship between the False match rate and False non-match

Performance in terms of effectiveness A comparison of the false accept rate and the false reject rate

Advantages Disadvantages Can be used for accessing high-security systems and sites Different options are available, finger print, iris, voice, hand geometry, face. You do not need to carry any physical item. Disadvantages It could be expensive e.g cost of scanners, support and maintenance High deployment cost May not be suitable for mass-consumer deployment Performance is not 100%

Outline What is an authentication protocol? Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System

Multiple authentication System Having a combination of two or more authentication protocols ATM machine which makes use of both the smart card and also a pin for authentication.

Questions?