Identification and Authentication

Slides:



Advertisements
Similar presentations
1 Identification Who are you? How do I know you are who you say you are?
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Lecture 6 User Authentication (cont)
Password Cracking Lesson 10. Why crack passwords?
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Methodologies
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Cryptography and Network Security Chapter 20 Intruders
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Host and Application Security Lesson 8: You are you… mostly.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
INTRO TO COMPUTER SECURITY LECTURE 4 IDENTIFICATION AND AUTHENTICATION M M Waseem Iqbal
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Challenge/Response Authentication
Key management issues in PGP
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter One: Mastering the Basics of Security
Challenge/Response Authentication
Cryptographic Hash Function
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Outline What does the OS protect? Authentication for operating systems
Password Cracking Lesson 10.
Authentication.
Network Security Unit-VI
Outline What does the OS protect? Authentication for operating systems
Authentication.
Authentication and Identification
Lesson 16-Windows NT Security Issues
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Computer Security Authentication
CS703 - Advanced Operating Systems
Computer Security Protection in general purpose Operating Systems
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Identification and Authentication

Identification and Authentication When you log on to computer you enter your username and password. The first step is called identification : you announce who you are, the second step is called authentication you prove that you are who claim to be. Identification: recognizing your identity (e.g. By checking your username). Authentication: verifying that you are really who claim to be (e.g. By checking your password). Here, we are only concerned with ‘entity authentication’: the process of verifying the identity claimed by some system entity. Why do we need identification and authentication? Access control decisions. Auditing (i.e. accountability).

Username and Password How does it work? Prevent or delay further login attempts after a certain failed-login threshold has been reached. Lock the screen or close the session automatically if the machine is idle for too long. Repeated authentication. Most computer systems use identification and authentication through usernames and passwords as their first line of defence. Widely accepted, not too difficult to implement Can be expensive to manage password securely Obtaining a valid password is a common attack

Username and Password An attacker may: Intercept the password at the time a new user account is created. Try to guess the password. Obtain the password via phishing, spoofing, keyloggers, etc. Compromise the password file, or try social engineering.

Bootstrapping Password Protection Passwords are meant to be secrets shared between the user and the system authenticating her/him. So, how to bootstrap the system so that the password is delivered ‘only’ to the legitimate user? User could be sked to come to an office and collect their password personally. The password could be conveyed by email , mail, phone or enter by the user on a web page. Same dilemma with password resetting. Recommendation : Do not give the password to the caller but call back an authorized phone number Request confirmation on a different channel to active user account. Send mail by courier with personal delivery

Guessing Password Choosing Passwords is a critical security issue you have to keeping probability of guessing to minimum. An attacker may follow two basic guessing strategies: Exhaustive search – brute force Intelligent search – words associated with user, common passwords, or dictionary attack Defences : Change default password. Password length. Password format: mix upper and lower case and include numerical and other symbol;(The password space is |A|n , where n is the password length and |A| is the size of the character set) Avoid obvious passwords.

Guessing Password Password security helpers: Password checkers: use tool that check passwords against some dictionary of weak passwods. Password generators: Software tools to produce secure (random, often pronounceable) passwords Password aging: Force users to change password at regular intervals Limit login attempts: Either hard limit (three attempts), or delay after failed attempt Users are unlikely to memories long and complicated passwords. Similar considerations apply when passwords are changed very frequently. People are best at memorising passwords they use regularly. So, there is a trade-off that must be managed.

Phishing, Spoofing, and Social Engineering Identification and authentication through username and password provide ‘unilateral authentication’. Spoofing Attack: the attacker runs a program that presents a fake login screen on a machine and leaves the machine. Can be confronted by: Displaying the number of failed logins since last session. Trusted Path (e.g. MS Windows secure attention sequence CTRL+ALT+DEL). Mutual Authentication. Phishing Attack: ask users for their password under some false pretence. Social Engineering Attack : more successful when they better understand the psyche of the target.

Password Cashing Beyond spoofing attack, attacker may have another way to ‘find’ password. Password temporarily stored (buffer, cache, web page) Beyond control of user Sometimes for too long Example of early banking system and web cache when using the back button. Close application but don’t end browser session.

Protection the Password File To verify user’s identity , the system compare the password entered by the user against a value stored in the password file. The password can be intercepted: By a keylogger. In transit. Password file might be compromised or modified. To protect the password file, we could use: Cryptographic Protection. Access Control enforced by OS. A combination of both.

Protection the Password File For cryptographic protection we don’t need an encryption algorithm. A one way function will do the job ( given x it is easy to compute f(x) , but given f(x) it is hard to compute x ). One way function have been used to protect stored passwords. Off-line dictionary attack. (Unix crypt(3), 25 repeated DES encryption of all-zero blocks and the password is the key ─ performance trade-off).

Protection the Password File Access Control can be set that only privileged users may have write access to the password file. What about read access? Examples: 1. In UNIX, /etc/passwd is world-readable. The /etc/passwd file is a text file with one record per line, each describing a user account. khaled10:x:1001:1000:Khaled Abdullah,Riyadh,khaled10@imamu.edu.sa:/home/khaled10:/bin/sh 2. Shadow file /etc/shadow is a system file in which encryption user password are stored. 3. Password Salting: is a way of making password hashing more secure by adding a random string of characters to passwords before their hash is calculated, which makes them harder to reverse. 4. In Windows NT, password file is accessible, but it is written using proprietary binary format (Security by obscurity).

Single Sign On The user is authenticated only once within a single working session. You enter your password once. The system may store this password and whenever you have to authenticate your self again , the system will take the password and do the job for you. SSO raises new security concerns , how do you protect the stored password? The system needs your password in clear.

Alternative Approaches As a user, you can be authenticated on the basis of: Something You Know. Something You Hold. Who You Are. What You Do. Where You Are.

Something You Know The user has to know some ‘secret’ to be authenticated such as password,PIN,etc. There is no way to telling the difference between the legitimate user and an intruder who has obtained the user’s password.

Something You Hold The user has to present a ‘physical token’ to be authenticated such as key, card, smartcard, ID tag, mobile phone, etc. Can be stolen or lost so anybody who is in possession of the token has the same rights as the legitimate owner. To increase security , physical tokens are often used in combination with something you know or they contain information identifying the legitimate user such as photo.

Who You Are Biometrics (i.e. your physical characteristics) such as face, fingerprints, iris patterns, hand geometry, voice, etc. Biometrics can be used for either: Identification: a 1:n comparison that tries to identify the user from a database of n persons. Authentication: a 1:1 comparison that checks whether there is a matching for given user. Consider fingerprints as an example. Enrolment : collect samples, extract minutiae (or biometric features), create reference templates and store them. FER (failure-to-enrol rate): gives the frequency with which the system fails to enroll a user. Matching algorithm: measures similarity between reference template and current template. False positive ─ security problem. False negative ─ availability problem.

Who You Are False Match Rate (FMR) = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑠𝑢𝑐𝑐𝑒𝑠𝑠𝑓𝑢𝑙 𝑓𝑎𝑙𝑠𝑒 𝑚𝑎𝑡𝑐ℎ𝑒𝑠 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑡𝑡𝑒𝑚𝑝𝑡𝑒𝑑 𝑓𝑎𝑙𝑠𝑒 𝑚𝑎𝑡𝑐ℎ𝑒𝑠 False Non-Match Rate (FNMR) = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑒𝑗𝑒𝑐𝑡𝑒𝑑 𝑔𝑒𝑛𝑢𝑖𝑛𝑒 𝑚𝑎𝑡𝑐ℎ𝑒𝑠 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑡𝑡𝑒𝑚𝑝𝑡𝑒𝑑 𝑔𝑒𝑛𝑢𝑖𝑛𝑒 𝑚𝑎𝑡𝑐ℎ𝑒𝑠 The probabilities of these two failures decide the quality of the biometric system Best state-of-art fingerprint recognition schemes have an EER of about 1-2%

What You Do Behavioural and usage patterns such as Hand-written signatures, writing speed, writing pressure, keyboard typing, etc. The system has to set up so that false positive and false negative are reduced to level acceptable for the intended application.

Where You Are Location. Specific lab, specific machine, specific country, GPS location, etc.

Reading “Computer Security ”, 3rd edition by Dieter Gollmann. Wiley, March, 2011. Chapter 4