The Request for Better Measurement:

Slides:



Advertisements
Similar presentations
1 CompChall: Addressing Password Guessing Attacks IAS, ITCC-2005, April 2005 CompChall: Addressing Password Guessing Attacks By Vipul Goyal OSP Global.
Advertisements

1 東南技術學院九十二學年度第二學期 資工系第一次論文發表會 Analysis of an Improved Version of S/KEY One-Time Password Authentication Scheme Speaker: Maw-Jinn Tsaur
Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Biometry and Security: Secure Biometric Authentication for Weak Computational Devices Author: Zelenevskiy Vladimir Based on the research by M.J. Atallah.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
Cryptanalysis of Two Dynamic ID-based Authentication
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
CIST/ETRI/ISIT/KDDI/Kyusyu Univ./NICT Joint Research Workshop on Ubiquitous Network Security 2005 Verifier-Based Password-Authenticated Key Exchange Jeong.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Password-only Authenticated Key Agreement Protocols Based on Self-certified Approach Tzong-Chen Wu and Yen-Ching Lin Department of Information Management.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
CS457 Introduction to Information Security Systems
Outline The basic authentication problem
Intrusion Tolerant Architectures
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Identity-based deniable authentication protocol
Efficient CRT-Based RSA Cryptosystems
SPINS: Security Protocols for Sensor Networks
Recent Developments on Multimedia and Secure Networking Technologies
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Strong Password Authentication Protocols
A Framework of Remote Biometric Authentication on the Open Network
SPINS: Security Protocols for Sensor Networks
Key Management Network Systems Security
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Recent Developments on Multimedia and Secure Networking Technologies
Introduction to Cryptography
Source: Computer Networks Volume 149, 11 February 2019, Pages 29-42
II. REVIEW OF THE DAS ET AL. SCHEME
Source: Sensors, Volume 19, Issue 9 (May )
Privacy Protection for E-Health Systems by
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

The Request for Better Measurement: A Comparative Evaluation of 2FA Schemes Ding Wang, Qianchen Gu, Haibo Cheng and Ping Wang School of EECS, Peking University, Beijing, China ASIACCS 2016 June 2, Xi’an, China () wangdingg@mail.nankai.edu.cn Tel: +86 18511345776

Outline Introduction Preliminaries System architecture Adversary model Evaluation criteria A taxonomy of smart-card-loss attacks Attacks on representative schemes On Li et al.’s scheme On Kumari-Khan’s scheme On Odelu et al.’s scheme On Muhaya’s scheme Conclusion

Introduction User authentication User A process to verify whether someone is with the claimed identity. Basic techniques: (1) what a user knows, such as passwords, PINs; (2) what a user has, such as smart cards, tokens; (3) what a user is, such as fingerprints; User

Password-based authentication The most prevalent authentication method In the 2000s, it is widely believed that passwords will be replaced by some other techniques. Since 2010, there has been wide disillusionment. Today, we are faced with the same problem that confronted us twenty years ago.

Some inherent problems with passwords Selection of popular passwords how popular are our passwords? Password reuse In 2007, each user has about 6.5 passwords and 25 accounts .(According to Florencio et al., WWW 2007) Our 2015 survey: 9.74 unique passwords and 3.15 different types of passwords. Password creation using personal info Password leakage Server compromise (over 100 popular sites leaked last year Shoulder-surfing, Key-logging, malwares and Trojan horse ; )

How to enhance password-based authentication Two solutions Password + Token + TPAKE+ LRPS 1) Threshold PAKE to prevent sever-side leakage 2) leakage-resilient password systems (LRPS) to prevent user-side leakage At NDSS 2012, Yan et al. showed that LRPS is inherently infeasible without incorporating certain trusted devices.

Smart-card-based password authentication Essential aim: ensuring two-factor security

Not an easy task —— A history of “break-fix-break-fix”

Challenges (continue) Have to reconcile many design goals

Challenges (continue) Trade-offs Conflicts Security Performance Usability

Contributions of this paper We revisit 19 improvements over Xu et al.’s 2009 scheme and show most of them are lack of fair, thorough measurement. We show that some criteria in the evaluation metric are unworkable due to a number of ambiguities and redundancies. We show that there are at least 8 different types of strategies for smart-card-loss-attack. We provide an evaluation of 26 two-factor schemes based on the refined metric.

Outline Introduction System model, attacker model and metric A taxonomy of smart-card-loss attacks Attack on previous schemes Conclusion

System architecture User U is with a password and a smartcard. Serves S stores some info(no passwod) about U. Serves S may be with a public-private key pair (pk, sk). User U and serves S share some paramters through the smartcard.

Adversarial model powerful adversary (1) Have full control of the communication channel (2) May either (i) Obtain victim’s password , or (ii) Get access to victim’s smart card and breach it but not both i and ii to avoid trivial cases. (3) Enumerate offline all the items in the Cartesian product <10^12. (4) Learn victim’s identity when evaluating security. Note that, when evaluating privacy , victim’s identity is considered sensitive.

Evaluation metric Security goals Desirable features Performance Computation cost Communication cost Storage cost

Defects in the metric Ambiguities [Wang et al. IEEE TDSC’15] DA1: no password-related verifier table DA1-Weak, DA1-Strong DA2: freely user password choice DA2-Local-Insecure, DA2-Local-Secure , DA2-Interactive DA8: User anonymity DA8-Weak , DA8-Strong SR6 and other security requirements (discussed later

Defects in the metric(2) Redundancies DA4 SR6 DA3 SR9

Outline Introduction System model, attacker model and metric A taxonomy of smart-card-loss attacks Attack on previous schemes Conclusion

SR6: Resist smart-card-loss attack Explication SR6 relates to any attacker who has gained the victim’s smart card All the other 8 security requirements deal with an attacker without the victim’s smartcard. Classificaton Whether need to extract the card Whether need to return the card # of online interactions with the server

SR6: smart-card-loss attack (2) Highlights We, for the first time, show that there are at least 8 kinds of smart-card-loss-attacks. This also make the measurement of SR6 to be more fine-grained.

Outline Introduction System model, attacker model and metric A taxonomy of smart-card-loss attacks Attacks on representative schemes Conclusion

Notations and abbreviations

Revisting 19 improvements over Xu et al.’s scheme in 2009 Using Kumari-Khan’s scheme for presentation

Review of Kumari-Khan’s scheme the registration phase the login and verification phase the password update phase Yang, G., Wong, D., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. Int. J. Commun. Syst., 27(12):3939–3955, 2014.

Review of Kumari-Khan’s scheme (1/3) —— User registration phase Master secret p, q; Choose IDi;

Review of Kumari-Khan’s scheme (2/3) —— Login and verification phase

Review of Kumari-Khan’s scheme (3/3) —— Password Change phase Password can be locally changed There is explicit verification of the old pw Change password 27

Type-II smart-card-loss attack on Kumari-Khan’s scheme obtains {Bi , Fi} in Ui’s smart card Costs $30.56 and 16.47 hours by resorting to the Amazon EC2 C4.4X-large cloud computing service

Type-IV smart-card-loss attack on Kumari-Khan’s scheme obtains {Bi , h(.)} in Ui’s smart card Interceptes from public channel Costs $30.56 and 16.47 hours by resorting to the Amazon EC2 C4.4X-large cloud computing service

De-synchronization attack on Kumari-Khan’s scheme

Whether with formal proofs

Conclusion We, for the first time, provide a taxonomy of smart-card-loss attacks. We show that some critical criteria are unworkable due to a number of ambiguities and redundancies. We further propose viable fixes and refinements to make an through measurement possible. We provide a comparative evaluation of 26 two-factor schemes based on the refined metric, highlighting the design challenges and difficulties.

THANK YOU & QUESTIONS

A dilemma The password change attack is simple How to fix it is tricky The only assumption made about attacker is that she can get temporary access to the victim’s card. How to fix it is tricky Suppose an additional parameter is now stored in the card memory. Now, an offline guessing attack arises: Our solution make an acceptable trade-off

Effectiveness of our solution Theoretical results Empirical results Datasets — 32 million Rockyou passwords — 6.48 million CSDN passwords Metric: guessing entropy (GE)

Outline Introduction System model and adversary model Attacks on Yang et al.’s scheme Attack on Li et al.’s scheme Conclusion 图1 802.11i安全框架

Attacking Li et al.’s PSCAV Our attack on Yang et al.’s scheme Exploits a vulnerability in the password change phase Assumes the attacker has got the victim’s card Consequence: the card cannot be usable The following attack on Li et al.’s scheme Exploits a vulnerability in the login phase Assumes the attacker can control the communication channel Consequence: the card cannot be usable

Review of Li et al.’s PSCAV the registration phase the pre-computation phase the login and verification phase password change phase Li, X., Qiu, W., Zheng, D., Chen, K., Li, J.: Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2), 793–800 (2010)

Review of Wang’s scheme (1/2) —— User registration Master secret ; Choose

Review of Wang’s scheme(2/2) —— Login and verification phase

De-synchronization attack on Li et al.’s scheme

Discussions on countermeasures Attacking consequences — The card is completely unable Fixes D

Conclusion We introduce the concept of two-factor authentication, and elaborate on the challenges in designing this type of schemes. Two practical attacks are demonstrated on Hsieh-Leu’s scheme and Wang’s scheme, respectively. Two new security threats on two-factor authentication are highlighted: Password change attack De-synchronization attack

THANK YOU & QUESTIONS

Side-Channel Attack Side Channel Attacks

Various attacks … Offline password guessing attack Smart card loss attack Stolen verifier attack User impersonation attack Server masquerading attack Replay attack Parallel session attack Denial of service attack Password disclosure to server (Insider attack) Forward secrecy Key compromise impersonation attack Unknown key share attack …

Functionalities key agreement mutual authentication local password change user anonymity (initiator un-traceability) no verifier table support weak password non-tamper resistant smart cards repairability

Performance Computation complexity ( a big hill ) cryptographic operations are often computation-intensive, like modular exponentiation, modulo inversion, pairing … Storage cost ( not a big problem) Communication overhead (not a big problem)