Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé

Slides:



Advertisements
Similar presentations
Securing Passwords against Dictionary Attacks
Advertisements

Lecture 6 User Authentication (cont)
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Authentication Approaches over Internet Jia Li
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
CS526: Information Security Chris Clifton October 16, 2003 Authentication.
Time-Memory tradeoffs in password cracking 1. Basic Attacks Dictionary attack: –What if password is chosen well? Brute Force (online version): –Try all.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Databases and security continued CMSC 461 Michael Wilson.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Lecture 11: Strong Passwords
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Slide #11-1 Chapter 11: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
CSCE 522 Identification and Authentication
Authentication CS461/ECE422.
Outline The basic authentication problem
CSCE 522 Identification and Authentication
Authentication and Account Management
Password Management Limit login attempts Encrypt your passwords
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
CS 465 PasswordS Last Updated: Nov 7, 2017.
CSCI283 Fall 2008 GWU All slides from Bishop’s slide set
Exercise: Hashing, Password security, And File Integrity
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
Chapter 11: Authentication
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé Arizona State University http://adamdoupe.com

Authentication vs. Authorization Who are you? Authorization What can you do?

Authentication Terms Principal Identity Subject Authentication Unique entity Identity Specifies a principal Internal representation of an entity Subject Acts on behalf of an entity Authentication Binding an identity to a subject

Authentication Mechanisms What you know What you possess What you are Where you are

Authentication System (A, C, F, L, S) A authentication information that proves identity C complementary information stored on a computer and used to validate authentication information F complementation functions for f ∈ F , f : A -> C L authentication functions that verifies identity for l ∈ L , l : A x C -> {True, False} S selection functions enabling entity to create or alter information in A or C

Password System Passwords stored in plaintext Authentication System A set of string that can be used for password C = A F singleton set of complementation function { f} L single equality test operation { eq } S function to set/change password

UNIX Standard Hash Function A = { strings of 8 chars or less } C = { 2 char hash id || 11 char hash } F = { 4096 versions of modified DES } L = { login, su, … } S = { passwd, nispasswd, passwd+, …}

UNIX Standard Hash Function external entities service provider S: create a password alice :: password A F: generate an encrypted password principal (alice) L: A x C  {True, False} F(password) = y5SfcRm53cpiE ? alice:y5SfcRm53cpiE:12:23:Alice User:/bin/sh C

High-Level Attacking Authentication Attacker’s Goal Find a ∈ A s.t. For some f ∈ F, f(a) = c ∈ C c is associated with entity Direct approach Attacker has a c, find a f(a) = c Attacker does not have c, find a, l(f, a) = True

Preventing Attacks Hide one of a, f, or c Can we hide L? Prevents some types of attacks Unix/Linux shadow password files Can we hide L? Prevents attacker from knowing if guess succeeded Preventing any network-based logins or restrict logins to only IP address

Password-based Authentication Most common Passwords are the worst form of authentication ... except for all those other forms that have been tried from time to time. Paraphrasing Winston Churchill Several problems Inherent vulnerabilities easy to guess easy to snoop easy to lose no control on sharing social engineering Practical vulnerabilities Visible over insecure distributed and networked systems Susceptible to replay attacks Password reuse Requires proactive management

Dictionary Attack General attack for all password-based authentication Try to use each word in the dictionary or word file w, compute f(w), check f(w) == c Is it possible to search all possible passwords? Easy to search all likely passwords!

Dictionary Attack Offline Online Know f and c, repeatedly try different guesses crack, john-the-ripper Online Have access to functions in L and try guesses until l(g) succeeds Logging into a website guessing a password

Countering Password Guessing Deny access to C (complementary information) All guesses must be online Hard to guarantee Add delay to L when incorrect Many systems do this Increase time to compute f(a) Use a different hashing function

Rainbow Tables Essentially precompute the size of some key space Why not just store key and hash? Rainbow tables allow a tradeoff between time to crack and space required Space requirements are large MD5 1-8 character alphanumeric 127GB MD5 1-9 character alphanumeric 690GB

Salts Add a random value, salt, to each password before it is hashed salt is public and know Therefore, each password hash is unique Essentially selecting a different f for every user

“Slow” Hashes Controllable work factor bcrypt scrypt Stored with the salt and hash bcrypt Designed to be a slow hash Used on submission server Computing hash takes 300ms on server scrypt Designed to take memory to perform hash

Password Reuse How many passwords do you have? For what service? Are they all equally secure? What happens if one of your passwords is leaked? 3.5B Yahoo (2013) 412M Adult Friend Finder (2016) 152M Adobe (2013) 145M eBay (2014)

Adobe Breach https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/

Adobe Breach https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/

Password Managers Keep track of passwords and generate random passwords per website Encrypted/locked with a “master” password Who do you trust? Many options LastPass 1Password KeePass …

Password Recovery What happens when you forget your password? Completely locked out of account? Most work by sending email to your registered email account with a link to reset your password Is this secure? What does this mean about the security of your inbox?

Two-Factor Authentication Two things required for authentication Based on the authentication categories Google authenticator DuoSecurity (ASU uses this)

CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Is CAPTCHA authentication? How to break CAPTCHA?

Additional Authentication Mechanisms Token-based authentication Google 2FA Hardware token Address-based authentication Restrict access to VPN or server based on IP address Location-based authentication Unlocking car only when “close” Biometrics-based authentication Fingerprint readers Voice recognition Face recognition

Authentication Research Continuous authentication Continuously verify the user Replacing passwords FIDO Access/authentication delegation OAuth 2.0 ASU online services