DATA & COMPUTER SECURITY (CSNB414) MODULE 5 AUTHENTICATION PROTOCOLS.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Computer Security Set of slides 5 Dr Alexei Vernitski.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Security-Authentication
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Chapter 31 Network Security
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
BUSINESS B1 Information Security.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
CIS 450 – Network Security Chapter 8 – Password Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
G53SEC 1 Authentication and Identification Who? What? Where?
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Digital Signatures, Message Digest and Authentication Week-9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Authentication What you know? What you have? What you are?
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Computer Communication & Networks
Cryptographic Hash Function
Network Security Unit-VI
Computer Security Protection in general purpose Operating Systems
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

DATA & COMPUTER SECURITY (CSNB414) MODULE 5 AUTHENTICATION PROTOCOLS

ThreatsSecurity GoalsSecurity Mechanisms EavesdroppingConfidentialityEncryption schemes Data modificationData Integrity, Data Origin Authentication Hash functions, digital signatures ImpersonationEntity Authentication Entity authentication protocols RepudiationNon-repudiationDigital signatures

Something to Ponder….. We ore often members to several institutions / organizations where we are identified by our respective IDs (e.g. IC & student matrix numbers, IDs etc.) Authentication methods are needed to ensure that a user is who he / she claimed to be. This is to ensure that security is well implemented to protect the respective assets (data, resources etc). Authentication can be carried out manually or automatically through computer systems. Automatic authentication pose threats from spoofing, eavesdropping, modification and masquerading.

Types of Authentications What the user ‘knows’ e.g. passwords, PINs, secret codes etc. What the user ‘possesses’ e.g. MyCard, Passport, smartcards, keys etc. ‘Characteristics’ of the user himself = biometrics e.g. behavioral traits like signature, voice etc. e.g. physical traits like thumbprint, face etc.

Threats to Password Authentication Due to user errors ~ user-chosen passwords are easy to be cracked e.g. birthdays, names, common words, favorite celebrities, club etc. ~ system generated passwords are often written down on papers, stored on PC, hp etc. ~ same passwords for several systems Due to system vulnerabilities ~ Trojan horse masquerade ~ inadequate / ineffective security measures to protect the password files e.g. plaintext system password list **Read text book page ** Untrustworthy employees

Tips for Password Selection Choose mixed types of characters Choose long passwords Avoid names / words Change passwords regularly Avoid using same passwords for different applications Do not disclose to others Do not write it down

Brute Force Vs. Dictionary Attacks Brute Force Attack An exhaustive attack on a password authentication system by trying out all possible combination of passwords. E.g. a password of letters A – Z (26 letters) of max 8 letters length. No of tries = …… ~ almost five millions Dictionary Attack An attack on a password authentication system by trying out all possible words, beginning with the one with the highest probability of being used

Brute Force Vs. Dictionary Attacks

Plaintext Passwords Vs. Encrypted / Hashed Passwords Plain text Encrypted / Hashedpassword file User key in password It is difficult to crack hashed password unless hash code is known!! System stores my_password User key in password System hash password System store F0C e.g. password = my_password e.g. hashed password = F0C

Verification Process of Hashed Passwords Example of available standards: MD4, MD5, SHA-0 System derive hashed reference password User key in password System hash password Input password == reference password? e.g. password = my_password e.g. hashed input password = F0C Access deniedAccess granted Yes No e.g. hashed reference password = F0C

Problem of Hashed Passwords What if ??? If a hacker knows Tom’s password & he discover Tom’s hashed password = Jerry’s hashed password Then he know Jerry’s password (&& THE HASH CODE TOO!!) **check MDcrack** Tom’s hashed password = Jerry’s hashed password = F0C Tom’s password = my_password Jerry’s password = my_password

Salted Hashed Passwords Solution : Add ‘salt’ to password to make it unique Salt = unique random code User key in password System add salt to password System hash salted password e.g. password = my_password e.g. salted password = my_passwordUNT1079 e.g. salted hashed password = Z0D System store Z0D and salt Therefore, Tom & Jerry will never have the same hashed password even if they use the same password

Biometrics Several types of biometrics are accurate (e.g. no 2 persons have the same DNA, iris or thumbprint pattern) Others not (e.g. twins may look alike) Accurate biometrics are hard to be fooled, assist in audit trail HOWEVER, issues of privacy intrusion Biometrics data may also be encrypted Biometrics identification Vs. Biometrics verification - Identification : 1 to many searches (only for very accurate biometrics, closest match) - Verification : 1 to 1 comparison (often require ID, either positive or negative verification result)

Biometrics Technologies

Biometrics Accuracy False Rejection Rate (FRR) The likelihood that a legitimate user is rejected by the system. False Acceptance Rate (FAR) The likelihood that an impostor is accepted by the system as a genuine user. Equal Error Rate (EER) The point at which FRR == FAR.

Biometrics Accuracy (cont.) FRR & FAR varies with the sensitivity threshold. FRR and FAR are related, where if one figure is improved, then the other deteriorates. How to set the sensitivity threshold? - Depends on system requirements e.g. A high security application does not tolerate any intruders, hence requiring low FAR. While a credit card verification system may require low FRR, in order to avoid its users being annoyed with a high frequency of rejection at counters. A national civilian applications would demand low FRR and low FAR to instil public trust and confidence. Biometrics products often specified by its EER. An ideal biometrics systems should produce 0%EER, however, this is often not realised.

Two types of authentication protocols: User authentication Data authentication (we just focus on user authentication) User authentication protocol is a protocol to authenticate a user. Usually user authentication is realized by the use of password. Authentication Protocol

UAP1: Password-based protocol The problem arised when an Eve can read and store the H(P) that goes along the network. She can use the stored H(P) for later sessions, acting like a legitimate Alice. This is called a REPLAY ATTACK. AliceServer [PT]: “I want to log on. I am Alice101” [PT]: “Give me your credential” H(Password A ) Compar e H(P) H(P) Yes No Access is granted Access is denied Status of access Figure A

Explanation on password-based authentication This is the scenario: Alice wants to gain access to a particular server and for this purpose she registers her userID and password at the server. The server will compute the hash of Alice’ password and store both Alice’ userID and hashed password in its repository. Now Alice wants to log on to a server, and she sends a message something like this: ‘I want to logon and my userID is Alice101’ Alice also compute the hash of her password and sends this together with her userID to the server. The server would compare the userID and password hash sent by Alice and userID and password hash in its repository. If they are matched, then the server will grant an access to Alice. Otherwise, the access is denied

This scenario/protocol seems to work well. Alice can authenticate herself to the server using the hash of her password. INote: remember that hash function produces unique message digests (or hash values) to different messages. Therefore message_A will have message_digest_A, and message_B will have message_digest_B, where message_A≠ message_B and message_digest_A ≠ message_digest_B. If message_digest_A = message_digest_B, therefore we say that this is a collision. However, this is not a good protocol because an Eve can do a replay attack. Password-based authentication

Replay attack Definition: is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it. Figure A shows that an Eve (or intruder) has no difficulty to steal the network packet that contains the Alice’ hashed password. She can uses the network packet to gain access to a server at later time without Alice knowing it, masquerading as if she is a real Alice. In this case, the server would not know that this is not Alice since the comparison of hashed passwords gives a match.

Reminder… As you can see here, it is very easy for an attacker to guess or discover your password, IF your password is an English word. As explained in a lecture, they have a so called ‘rainbow table’ which lists all the English words together with its hash value. Finding the password based on the dictionary table is called a dictionary attack. Therefore it is VERY essential to ensure that you create a strong password that conforms to the password criteria listed in the previous slide.

UAP2: Stronger protocol: Challenge- Response Protocol AliceServer [PT]: “I want to log on. I am Alice101” Challenge :a Nonce Comp -are H(P) Yes No Access is granted Access is denied E(H(P))H(P) H(P)||Nonce Figure B Response: append hashed password with a nonce

This is the scenario: Alice wants to gain access to a particular server and for this purpose she registers her userID and password at the server. The server will generate a list of Nonce. It also computes the hash of Alice’ password, append the hashed password with a Nonce and store both Alice’ userID, and her appended hashed password and Nonce in its repository. Challenge-Response Protocol (cont..)

Now Alice wants to log on to a server, and she sends a message something like this: ‘I want to logon and my userID is Alice101’ The server then gives Alice the first Nonce. Alice will append this Nonce together with her hashed password. Alice then send the appended hashed password to the server. The server would compare the userID and appended hashed password sent by Alice and userID and appended hashed password in its repository. If they are matched, then the server will grant an access to Alice. Otherwise, the access is denied Challenge-Response Protocol (cont..)

In this protocol, there is no point of an Eve to store the network packet that contains Alice encrypted hashed password. She cannot re-use this packet for future access because the Nonce used for each session will be different. Therefore the network packet will also be different for each session. Challenge-Response Protocol (cont..)

Nonce Definition: is a random number and can only be used once. The size would depend on the system administrator.

For Challenge-Response protocol, you may encounter (in your readings from the book or internet) a few ways of sending the challenge and response. Some say: Encrypt the hashed password with the nonce, or Hash the nonce with the password together. Using timestamping All of those are accepted provided that the main goal in this protocol is to avoid the eve from replaying the same network packet for illegal access. Challenge-Response Protocol (cont..)

If you don’t like the idea of password-based Challenge- Response protocol, we have another protocol that avoids the use of password. It is called a Key-based Challenge-Response Protocol.

UAP3: Key-Based Challenge-Response Protocol Alice Server [PT]: ‘I want to log on and I am Alice101’ Challenge: E[Nonce] KpubA D Response: Message||Nonce K privA

In this scenario, the protocol avoids using a password to authenticate auser. First, Alice sends a message to the server saying that she wants to log on to it. The server will then issue a Nonce, encrypted using Alice’ public key K pubA, and send the encrypted Nonce to Alice. Upon receiving, Alice decrypts the ciphertext using her private key, K privA and obtain the Nonce. Alice sends back the message appended with a Nonce to the server. With this, the server knows that the person who it sends the Nonce to is Alice, because only Alice can decrypt the Nonce and return it back to the server. This is what we call as, a challenge-response protocol, as a way to authenticate a user. Key-Based Challenge-Response Protocol

DATA & COMPUTER SECURITY (CSNB414) MODULE 5 --END--