Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

Sri Lanka Institute of Information Technology
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
FIT3105 Smart card based authentication and identity management Lecture 4.
DIGITAL SIGNATURES Fred Piper & Mert Özarar Codes & Ciphers Ltd 12 Duncan Road Richmond Surrey TW9 2JD Information Security Group Royal Holloway, University.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Programming Satan’s Computer
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Information Security for Managers (Master MIS)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.
Cryptography, Authentication and Digital Signatures
Information Systems Security
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Kerberos Guilin Wang School of Computer Science 03 Dec
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Intro to Cryptography Lesson Introduction
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
1 Serbia 2003 INTRODUCTION to CRYPTOGRAPHY Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9 2JD ENGLAND Royal Holloway, University of.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Policies and Security for Internet Access
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Web Applications Security Cryptography 1
Outline The basic authentication problem
Crypto in information security
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Chapter 4 Cryptography / Encryption
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation Attacks Fred Piper

Crete Outline Information security User recognition –Use of passwords/PINs/cryptogrphic keys –Use of ‘tokens’ Phishing Protection against man-in-the-middle attacks Multi factor or multi channel? The use of mobile phones as a ‘token’ for user recognition?

Crete What is Information Security? Some features include: Confidentiality – Protecting information from unauthorised disclosure Integrity – Protecting information from unauthorised modification, and ensuring that information can be relied upon and is accurate and complete Availability – Ensuring information is available to authorised users when they need it

Crete Defences and Attacks Defences: Introduce security mechanism to protect data –Technical –Procedural –Contractual Introduce strong authentication mechanism Attacks: Break the technical security mechanism Impersonate an authorised entity by breaking procedural mechanism

Crete User Recognition (1) 3 factors: 1) Something you know (Password/PIN/Cryptographic Key) 2) Something you own (Token) 3) Personal characteristic (Biometrics) NOTE: Usually one-way authentication Tokens and biometrics often require ‘readers’ ‘Danger’ of false ‘readers’ Cost issues

Crete User Recognition (2) Many systems rely on more than 1 factor For multi-factor systems compromise of 1 factor should not enable impersonation The PIN/magnetic stripe card for ATM networks is an example of a 2-factor system where each individual factor is ‘weak’

Crete Something You Know Password PIN Cryptographic key Obvious observations: –A PIN is a password with limited alphabet –A cryptographic key may be regarded as a (secret) password which the user may use but probably not know –Policies for the management of PINs and Passwords are inconsistent

Crete Password Policy It is often recommended that: Users should adopt a large alphabet (at least alpha- numeric with upper and lower case letters) Passwords should be long (at least 8 characters?) Passwords should be randomly generated Passwords should be different for each system Passwords should be changed frequently Passwords should not be written down

Crete PINs Personal identification number Usually 4 digits (sometimes 6) –Reason: users will not be able to remember longer PINs! NOTE: This is inconsistent with general password policy. Undoubtedly a weak password

Crete Cryptographic Keys It is the use of a cryptographic key, rather than revealing its value, that identifies a user

Crete Cipher System Cryptogram c Encryption Key Encryption Algorithm Message m Decryption Algorithm Decryption Key Message m Interceptor Key establishment channel (secure)

Crete Two Types of Cipher System Conventional or Symmetric –Decryption Key easily obtained from Encryption Key Public or Asymmetric –Computationally infeasible to determine Decryption Key from Encryption Key

Crete Keys as Identifiers Asymmetric System –Use of the private key acts as an identifier to ‘everyone’ Symmetric System –Use of a key identifies users only to those (trusted) people who share that key NOTE: If an asymmetric system is used, an impersonator may either 1. obtain the use of the user’s private key 2. substitute their public key for that of the user

Crete Authentication Using Smart Tokens Static Password Tokens –Owner authenticates himself to token –Token identified owner to system Dynamic Password Tokens –Token generates new password –(Owner activates token with PIN) –Owner enters ID plus dynamic password –System knows which dynamic password to accept Challenge-Response Tokens –System generates challenges –Owner activates token with PIN and enters challenge –Token generates response (probably challenge encrypted with key that is unique to token) –System knows which response to accept

Crete Dynamic Passwords User’s password changes frequently (possibly at each log-in) Change influenced by at least one of: Secret information known to user Intelligent device which is unique to user

Crete Challenge/Response for Dynamic Password Given an unpredictable challenge, user’s token produces a response which is: Appropriate to the challenge Dependent on a user’s token Dependent on user’s knowledge

Crete The Challenge / Response Principle for hand-held token Key Random number ChallengePIN-Controlled A A Response A - encrypt or OWF Y/N = ? HOST USER

Crete Impersonation Attacks 1-way authentication –Steal and/or copy token –Guess or ‘observe’ password/PIN/cryptographic key –Con the user into divulging password/PIN eg phishing –Gain access to device using key 2-way authentication –Man-in-the-middle

Crete Phishing Attacks (1) Social engineering Attacker discovers secret ‘information known’ Banking customers have been ‘prime’ targets via messages and fake websites

Crete Phishing Attacks (2) Countermeasures User education/awareness Use of 2 or 3 factor systems so that compromise of 1 factor has limited impact

Crete Identification over the Internet Many applications use 2-factor systems that allow ‘card not present’ transactions Effectively a physical token is replaced by a virtual token which is nothing more than a card number This is a 1-factor system In Singapore the FA mandates use of genuine 2-factor authentication In UK banks are starting to issue customers with Chip and PIN ‘readers’

Crete Phishing Browsers starting to try to detect fake websites –Google Safe Browsing for Firefox browser –Microsoft’s Internet Explorer 7 Anti-Phishing War Group (APWG) –Forum to discuss phishing issues and share best practices –

Crete Phishing Attacks Summary Enable attacks to discover secret ‘information known’ ‘Best’ countermeasure is user education/awareness Effectiveness of attack decreases for 2 or 3 factor systems Use of conventional 2 or 3 factors often expensive and needs special hardware Introduction of ‘one-time’ PINs such as ITANs for some German e-banking systems helps

Crete D-H Man-in-the-Middle Attack B Fraudster F The Fraudster has agreed keys with both A and B A and B believe they have agreed a common key A F’s public key B’s public key A’s public key

Crete Protection Against Man-in-the-Middle Attack Rely on TTP to establish key management infrastructure (eg PKI) Use second (independent) communications channel to confirm key between A and B (Over) Simple Example: –D-H protocol establishes 1024 shared bits –AES key is 128 bits from agreed positions –Users exchange different 32-bit sequences from the 1024 bits over second (possibly insecure) channel

Crete OOB (Out of Band) Authentication Requirement A user claims an identity over a computer network Host wants to use a second channel to confirm it is the genuine user Neither party is willing to pay for ‘extra hardware’

Crete Use of Two Channels Prior to PK crypto, most cryptographic systems needed a second (secure) channel for initial key establishment One motivation for introduction of PK crypto

Crete OOB Communications Symmetric cryptography –Use secure second channel to enable secure communications over an insecure primary channel Authentication –Use second (possibly insecure) channel to confirm that the communications over the primary channel are secure NOTE: In this context an insecure channel is one where interception is possible.

Crete Communications How does ‘token’ communicate with host: One channel or two channel system? One-way or two-way authentication? What is the interface? –The user? –A reader that is part of the network? –Other?

Crete Mobile Phones There is a move towards systems where the mobile phone is ‘something you own’ No reader required No extra cost (in the sense that most people have them) Use their own channel Security implications?

Crete Question Are there situations where using the mobile phone as a token in a 2-factor system and using a second communication channel can decrease the chance of successful impersonation attacks?