Download presentation
Presentation is loading. Please wait.
1
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004
2
2 Outline Authentication mechanisms Dictionary attacks Passwords Defense against attacks
3
3 Authentication Authentication is the binding of an identity to a subject How? what the subject knows what the subject has what the subject is where the subject is
4
4 Authentication Mechanisms (1/2) Set A of authentication information: specific information used to prove identity (belongs to subject) Set C of complementation information: system stores this to use for validation Set F of complementation functions: generate complementation information from authentication information f F, f: A C
5
5 Authentication Mechanisms (2/2) Set L of authentication functions: verify identity l L, l: A C { true, false } Set S of selection functions: enable a subject to create or alter the authentication and complementation information
6
6 Passwords A password is information associated with a user that confirms the user's identity Passwords may be generated by a system and given to users or selected by the users
7
7 Dictionary Attack Guess a password by repeated trial and error using a list of words (the dictionary) Type 1: complementation information C and complementation function f are known compute f(g) for each guess g look for match in C Type 2: use l(a, g) for each guess g
8
8 Bad Passwords (1/6) Many user-selected passwords are easy to guess via dictionary attack 1. Passwords based on account names 2. Passwords based on user names 3. Passwords based on computer names 4. Dictionary words 5. Reversed dictionary words 6. Dictionary words with some or all letters capitalized
9
9 Bad Passwords (2/6) 7. Reversed dictionary words with some or all letters capitalized 8. Dictionary words with arbitrary letters turned into control characters
10
10 Bad Passwords (3/6) 9. Dictionary words with any of the following changes: a) a -> 2 or 4 b) e -> 3 c) h -> 4 d) i -> 1 e) l -> 1 f) o -> 0 g) s -> 5 or $ h) z -> 5
11
11 Bad Passwords (4/6) 10. Conjugations or declensions of dictionary words 11. Patterns from the keyboard 12. Passwords shorter than 6 characters 13. Passwords containing only digits 14. Passwords containing only uppercase or lowercase letters, or letters and numbers, or letters and punctuation 15. Passwords that look like license plate numbers
12
12 Bad Passwords (5/6) 16. Acronyms or abbreviations 17. Passwords used in the past 18. Concatenations of dictionary words 19. Dictionary words preceded or followed by digits, punctuation marks, or spaces 20. Dictionary words with all vowels deleted 21. Dictionary words with white spaces deleted
13
13 Bad Passwords (6/6) 22. Passwords with too many characters in common with the previous (current) password
14
14 Good Passwords (1/2) at least one digit at least one letter at least one punctuation symbol
15
15 Good Passwords (2/2) Take a verse and select from it "Where were you when we were getting high?" -> wwywwwgh? Change repetition to count wwywwwgh? -> w2yw3gh?
16
16 Defensive Strategies Salting: change the complementation function based on the user Backoff: wait longer after each failed attempt Disconnection Disabling
17
17 Password Aging Require new password every N days Need to prevent "changing" to same password Could prevent reuse of a password for a fixed time period Need to give users notice before requiring a new password
18
18 Challenge Response System and user share a secret function f System sends random message m [challenge] User replies with f(m) [response]
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.