Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 3: User Authentication.
Lecture 6 User Authentication (cont)
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Ola Flygt Växjö University, Sweden Intruders.
6/1/20151 Chapter 4 Authentication Methods and Protocols Stallings chapters 3,22.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Password Management. Password Protection Virtually all multiuser systems require that a user provide not only a name or identifier (ID) but also a password.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
CIS 450 – Network Security Chapter 8 – Password Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
G53SEC 1 Authentication and Identification Who? What? Where?
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Chapter 9 Intruders.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Authentication What you know? What you have? What you are?
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Chapter 3 User Authentication 1. RFC 4949 RFC 4949 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.”
Chapter 3 User Authentication
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Chapter 9 Intruders.
Chapter One: Mastering the Basics of Security
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Midterm Exam Review guide to be released in Blackboard on Tuesday.
Chapter 9 Intruders.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security: Principles and Practice
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication

User Authentication  fundamental security building block basis of access control & user accountability basis of access control & user accountability  is the process of verifying an identity claimed by or for a system entity  has two steps: identification - specify identifier identification - specify identifier verification - bind entity (person) and identifier verification - bind entity (person) and identifier  distinct from message authentication

Means of User Authentication  four means of authenticating user's identity  based one something the individual knows - e.g. password, PIN knows - e.g. password, PIN possesses - e.g. key, token, smartcard possesses - e.g. key, token, smartcard is (static biometrics) - e.g. fingerprint, retina is (static biometrics) - e.g. fingerprint, retina does (dynamic biometrics) - e.g. voice, sign does (dynamic biometrics) - e.g. voice, sign  can use alone or combined  all can provide user authentication  all have issues

Password Authentication  widely used user authentication method user provides name/login and password user provides name/login and password system compares password with that saved for specified login system compares password with that saved for specified login  authenticates ID of user logging and that the user is authorized to access system that the user is authorized to access system determines the user’s privileges determines the user’s privileges is used in discretionary access control is used in discretionary access control

Password Vulnerabilities  offline dictionary attack  specific account attack  popular password attack  password guessing against single user  workstation hijacking  exploiting user mistakes  exploiting multiple password use  electronic monitoring

Countermeasures  stop unauthorized access to password file  intrusion detection measures  account lockout mechanisms  policies against using common passwords but rather hard to guess passwords  training & enforcement of policies  automatic workstation logout  encrypted network links

Use of Hashed Passwords

UNIX Implementation  original scheme 8 character password form 56-bit key 8 character password form 56-bit key 12-bit salt used to modify DES encryption into a one-way hash function 12-bit salt used to modify DES encryption into a one-way hash function 0 value repeatedly encrypted 25 times 0 value repeatedly encrypted 25 times output translated to 11 character sequence output translated to 11 character sequence  now regarded as woefully insecure e.g. supercomputer, 50 million tests, 80 min e.g. supercomputer, 50 million tests, 80 min  sometimes still used for compatibility

Improved Implementations  have other, stronger, hash/salt variants  many systems now use MD5 with 48-bit salt with 48-bit salt password length is unlimited password length is unlimited is hashed with 1000 times inner loop is hashed with 1000 times inner loop produces 128-bit hash produces 128-bit hash  OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt uses 128-bit salt to create 192-bit hash value uses 128-bit salt to create 192-bit hash value

Password Cracking  dictionary attacks try each word then obvious variants in large dictionary against hash in password file try each word then obvious variants in large dictionary against hash in password file  rainbow table attacks precompute tables of hash values for all salts precompute tables of hash values for all salts a mammoth table of hash values a mammoth table of hash values e.g. 1.4GB table cracks 99.9% of alphanumeric Windows passwords in 13.8 secs e.g. 1.4GB table cracks 99.9% of alphanumeric Windows passwords in 13.8 secs not feasible if larger salt values used not feasible if larger salt values used

Password Choices  users may pick short passwords e.g. 3% were 3 chars or less, easily guessed e.g. 3% were 3 chars or less, easily guessed system can reject choices that are too short system can reject choices that are too short  users may pick guessable passwords so crackers use lists of likely passwords so crackers use lists of likely passwords e.g. one study of encrypted passwords guessed nearly 1/4 of them e.g. one study of encrypted passwords guessed nearly 1/4 of them would take about 1 hour on fastest systems to compute all variants, and only need 1 break! would take about 1 hour on fastest systems to compute all variants, and only need 1 break!

Password File Access Control  can block offline guessing attacks by denying access to encrypted passwords make available only to privileged users make available only to privileged users often using a separate shadow password file often using a separate shadow password file  still have vulnerabilities exploit O/S bug exploit O/S bug accident with permissions making it readable accident with permissions making it readable users with same password on other systems users with same password on other systems access from unprotected backup media access from unprotected backup media sniff passwords in unprotected network traffic sniff passwords in unprotected network traffic

Using Better Passwords  clearly have problems with passwords  goal to eliminate guessable passwords  whilst still easy for user to remember  techniques: user education user education computer-generated passwords computer-generated passwords reactive password checking reactive password checking proactive password checking proactive password checking

Proactive Password Checking  rule enforcement plus user advice, e.g. 8+ chars, upper/lower/numeric/punctuation 8+ chars, upper/lower/numeric/punctuation may not suffice may not suffice  password cracker time and space issues time and space issues  Markov Model generates guessable passwords generates guessable passwords hence reject any password it might generate hence reject any password it might generate  Bloom Filter use to build table based on dictionary using hashes use to build table based on dictionary using hashes check desired password against this table check desired password against this table

Token Authentication  object user possesses to authenticate, e.g. embossed card embossed card magnetic stripe card magnetic stripe card memory card memory card smartcard smartcard

Memory Card  store but do not process data  magnetic stripe card, e.g. bank card  electronic memory card  used alone for physical access  with password/PIN for computer use  drawbacks of memory cards include: need special reader need special reader loss of token issues loss of token issues user dissatisfaction user dissatisfaction

Smartcard  credit-card like  has own processor, memory, I/O ports wired or wireless access by reader wired or wireless access by reader may have crypto co-processor may have crypto co-processor ROM, EEPROM, RAM memory ROM, EEPROM, RAM memory  executes protocol to authenticate with reader/computer  also have USB dongles

Biometric Authentication  authenticate user based on one of their physical characteristics

Operation of a Biometric System

Biometric Accuracy  never get identical templates  problems of false match / false non-match

Biometric Accuracy  can plot characteristic curve  pick threshold balancing error rates

Remote User Authentication  authentication over network more complex problems of eavesdropping, replay problems of eavesdropping, replay  generally use challenge-response user sends identity user sends identity host responds with random number host responds with random number user computes f(r,h(P)) and sends back user computes f(r,h(P)) and sends back host compares value from user with own computed value, if match user authenticated host compares value from user with own computed value, if match user authenticated  protects against a number of attacks

Authentication Security Issues  client attacks  host attacks  eavesdropping  replay  trojan horse  denial-of-service

Practical Application

Case Study: ATM Security

Summary  introduced user authentication using passwords using passwords using tokens using tokens using biometrics using biometrics  remote user authentication issues  example application and case study