Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science ©2002-2004 Matt.

Slides:



Advertisements
Similar presentations
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Advertisements

COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #11-1 Chapter 11: Authentication Basics Passwords Challenge-Response Biometrics.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #12-1 Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
1 Authentication CS461/ECE422 Fall Reading Chapter 12 from Computer Security Chapter 10 from Handbook of Applied Cryptography
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Authentication Approaches over Internet Jia Li
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication CS461/ECE422 Spring Readings Chapter 3 from text Rainbow tables – Chapter 10 from Handbook.
CS526: Information Security Chris Clifton October 16, 2003 Authentication.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
CIS 450 – Network Security Chapter 8 – Password Security.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Lecture 11: Strong Passwords
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Slide #11-1 Chapter 11: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #12-1 Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
Chapter 11: Authentication
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Key Escrow Key escrow system allows authorized third party to recover key Useful when keys belong to roles, such as system operator, rather than individuals.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security: Art and Science, 2nd Edition
CSCI283 Fall 2008 GWU All slides from Bishop’s slide set
Computer Security Protection in general purpose Operating Systems
Chapter 11: Authentication
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt Bishop

Overview Basics Passwords Storage Selection Breaking them Other methods Multiple methods June 1, 2004 Computer Security: Art and Science © Matt BishopSlide #12-2

Basics Authentication: binding of identity to subject Identity is that of external entity (my identity, Matt, etc.) Subject is computer entity (process, etc.) Computer Security: Art and Science © Matt Bishop

Establishing Identity One or more of the following What entity knows (eg. password) What entity has (eg. badge, smart card) What entity is (eg. fingerprints, retinal characteristics) Where entity is (eg. In front of a particular terminal) Computer Security: Art and Science © Matt Bishop

Authentication process Obtain authorization information from an entity Analyze the data Determine if it is associated with that entity The computer must save some information about the entity A mechanism to manage this information is required Authentication system Computer Security: Art and Science © Matt Bishop

Authentication System (A, C, F, L, S) Authentication information(A) information that proves identity Complementary information(C) information stored on computer and used to validate authentication information Set of complementary functions (F) Generates the complementation information from the authentication information i.e. for f  F, f: A  C Set of authentication functions that verify identify functions(L) For l  L, l: A x C  { true, false } Set of selection functions (S) Enable entity to create, alter information in A or C Computer Security: Art and Science © Matt Bishop

Example Password system, with passwords stored on line in clear text A set of strings making up passwords C = A F - singleton set of identity function { I } L - single equality test function { eq } S - function to set/change password Computer Security: Art and Science © Matt Bishop

Passwords Information associated with an identity that confirms the entity’s identity. Authentication mechanism based on what people know User supplies known password, system validates it Computer Security: Art and Science © Matt Bishop

Passwords Sequence of characters Examples: 12 digits (password space = elements), a string of letters, etc. Generated randomly, by user, by computer with user input Sequence of words Examples: pass-phrases Algorithms Examples: challenge-response, one-time passwords Computer Security: Art and Science © Matt Bishop

Storage Store as cleartext If password file compromised, all passwords revealed Encipher file Need to have decipherment, encipherment keys in memory Reduces to previous problem Store one-way hash of password If file read, attacker must still guess passwords or invert the hash Computer Security: Art and Science © Matt Bishop

Example UNIX system standard hash function Hashes password into 11 char string using one of 4096 hash functions As authentication system: A = { strings of 8 chars or less } C = { 2 char hash id || 11 char hash } F = { 4096 versions of modified DES } L = { login, su, … } S = { passwd, nispasswd, passwd+, … } Computer Security: Art and Science © Matt Bishop

Anatomy of Attacking Goal : find a  A such that: For some f  F, f(a) = c  C c is associated with entity Two ways to determine whether a meets these requirements: Direct approach: as above Indirect approach: as l(a) succeeds iff f(a) = c  C for some c associated with an entity, compute l(a) Computer Security: Art and Science © Matt Bishop

Preventing Attacks How to prevent this: Method 1: Hide enough information such that one of a, f, or c cannot be found Prevents obvious attack from above Method 2: Prevent access to the authentication functions L. Block access to all l  L or result of l(a) Prevents attacker from knowing if guess succeeded Computer Security: Art and Science © Matt Bishop

Dictionary Attacks Trial-and-error from a list of potential passwords Off-line: know f and c’s, and repeatedly try different guesses g  A until the list is done or passwords guessed Examples: crack, john-the-rippercrack On-line: have access to functions in L and try guesses g until some l(g) succeeds Examples: trying to log in by guessing a password Dictionary (i.e. A) List of random strings Set of strings in decreasing order of probability of selection. Computer Security: Art and Science © Matt Bishop

Using Time Maximize the time the defender needs to determine the password Anderson’s formula: P probability of guessing a password in specified period of time G number of guesses tested in 1 time unit T number of time units during which guessing occurs N number of possible passwords (|A|) Then P ≥ TG/N Computer Security: Art and Science © Matt Bishop

Example Goal Passwords drawn from a 96-char alphabet Can test 10 4 guesses per second Probability of a success to be 0.5 over a 365 day period What is minimum password length? Solution N ≥ TG/P = (365  24  60  60)  10 4 /0.5 = 6.31  Choose s such that 96 s ≥ N So s ≥ 6, meaning passwords must be at least 6 chars long Computer Security: Art and Science © Matt Bishop