Download presentation
Presentation is loading. Please wait.
Published byLeon Stewart Modified over 9 years ago
1
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia University
2
Outline What is an authentication protocol?
Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System
3
What are authentication protocols?
The different schemes used to grant or decline access to a place/location. Establish the identity of a person. Establish a communication securely
4
Outline What is an authentication protocol?
Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System
5
Password Authentication scheme
Most widely used authentication protocol Encryption and decryption of password are done using algorithms Symmetric and Asymmetric encrypting techniques
6
Performance of some algorithms
7
Advantages Disadvantages Least expensive authentication method to use.
No need to carry hardware device. User IDs and passwords can be changed at the user's choice. Disadvantages Not fully reliable when used for making financial transactions remotely, such as fund transfers and bill payments through an Internet banking channel. Security depends on the users' ability to maintain the user ID and password secret.
8
Outline What is an authentication protocol?
Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System
9
Token based Authentication (smart card)
Takes the form of ID cards e.g. student card, debit/credit cards, insurance cards gives access to Laboratories and other facilities on campus, ATMs and Library. Comes with single or multiple processors.
10
Advantages Disadvantages
More secure to use than the normal user ID or password. Difficult for non-authorized users to extract the private key when stored on a smart card. Disadvantages Requires users to carry a smart card. Need for regular renewals
11
Some brands of smart cards
12
Outline What is an authentication protocol?
Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System
13
Biometric Authentication Defines “who you are” not “what you have”
or “what you can remember”
14
Biological and behavioral characteristics
Finger prints Ridges and valleys Minutiae Face Hand/finger geometry Iris Voice
15
Definitions False Acceptance Rate (FAR): Probability that a biometric system falsely recognizes different characteristics as identical, thus failing to reject, for example, a potential intruder. False Rejection Rate (FRR): Probability that a biometric system falsely recognizes identical characteristics as being different, thus, for example refusing to accept an authorized person. False Match Rate (FMR): This indicates the proportion of persons who, when comparing characteristics, were falsely accepted.
16
Definitions continued…
False Non-Match Rate (FNMR): This indicates the proportion of persons who, when comparing characteristics, were falsely not accepted. Failure to Acquire (FTA): This is the attempts that were previously rejected due to a low quality of the image, this is also the proportion of times the biometric device fails to capture a sample when the biometric characteristic is presented to it. Failure to Enroll (FTE): This is a measure of the proportion of users that cannot be successfully enrolled in a biometric system
17
Performance of biometric systems
18
Efficiency in image capturing process.
19
Relationship between the False match rate and False non-match
Performance in terms of effectiveness Relationship between the False match rate and False non-match
20
Performance in terms of effectiveness
A comparison of the false accept rate and the false reject rate
21
Advantages Disadvantages
Can be used for accessing high-security systems and sites Different options are available, finger print, iris, voice, hand geometry, face. You do not need to carry any physical item. Disadvantages It could be expensive e.g cost of scanners, support and maintenance High deployment cost May not be suitable for mass-consumer deployment Performance is not 100%
22
Outline What is an authentication protocol?
Password Authentication Scheme Token Based Authentication (Smart card) Biometric Authentication Protocol Multiple Authentication System
23
Multiple authentication System
Having a combination of two or more authentication protocols ATM machine which makes use of both the smart card and also a pin for authentication.
24
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.