第十章 1 Chapter 10 Authentication of People. 第十章 2 Introduction This chapter deals with password-related issues like how to force users to choose unguessable.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Methodologies
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
7-1 Last time Protection in General-Purpose Operating Systems History Separation vs. Sharing Segmentation and Paging Access Control Matrix Access Control.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
NS-H /11041 System Security. NS-H /11042 Authentication Verifying the identity of another entity Two interesting cases (for this class): –Computer.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Security-Authentication
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
CIS 450 – Network Security Chapter 8 – Password Security.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
COEN 250 Authentication. Between human and machine Between machine and machine.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Lecture 11: Strong Passwords
Access Control Identification and Authentication.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Security CS Introduction to Operating Systems.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 7 Page 1 CS 236 Online Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
SCSC 455 Computer Security Chapter 3 User Security.
Private key
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Information Systems Design and Development Security Precautions Computing Science.
Understanding Security Policies Lesson 3. Objectives.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Challenge/Response Authentication
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
Presentation transcript:

第十章 1 Chapter 10 Authentication of People

第十章 2 Introduction This chapter deals with password-related issues like how to force users to choose unguessable passwords, how to store password information securely at the system being logged into and how to avoid divulging information to eavesdroppers. The two most important capabilities are the ability to store a high-quality cryptographic key and the ability to perform cryptographic operations.

第十章 3 Introduction (cont.) For user authentication, three kinds of approaches exist: Knowledge-based authentication What you know (passwords, PINs) Token-based authentication What you have (ID cards, Smart Cards) Biometric authentication What you are (voiceprint identification, retinal scanners).

第十章 Passwords There are a lot of problems with using passwords for authentication: 1. An eavesdropper might see the password when Alice is using it to login in. 2. An intruder might read the file where the computer stores password information. 3. Alice’s password might be easy to guess by someone making direct login attempts to the computer.

第十章 Passwords 4. Alice’s password may be crackable by an off-line computer search, given information such as a recognizable quantity encrypted with the password. 5. In attempting to force users to choose unguessable passwords, the system might become so inconvenient that it becomes unusable, or users might resort to writing password down.

第十章 On-line password guessing Type passwords at the system that is going to verify the password. One attractive mechanism for preventing password guessing is to keep track of the number of consecutive incorrect passwords for an account and when the number exceeds a threshold, “lock” the account and refuse access. Another approach to slow down a guesser is to only allow a limited number of account/password guesses per connection attempt.

第十章 On-line password guessing By auditing invalid password attempts, a system manager can be alerted to the fact that an attempt is being made to penetrate the system. A method for distributing the detective work is for systems to report to users when they log in the time of their previous login and the number of unsuccessful password attempts since the last successful login.

第十章 On-line password guessing A better approach is to let users choose “good” password. Password complexity criteria (Microsoft ® Windows ® Server 2003 family) Is at least 7 characters long. Does not contain your User Name, Real Name, or Company Name. Does not contain a complete dictionary word. Is significantly different from previous passwords. Contains characters from each of the following groups:  uppercase letters  lowercase letters  numerals  symbols found on the keyboard.

第十章 Off-line password guessing Password file The system simply stores passwords insecure The system stores cryptographic hash of the password Attacker guesses a password and verify whether you got it right by hashing it and comparing it to the stolen password file. An attacker with a file full of hashed passwords might hash all the words in a dictionary and check to see whether any of the passwords match any of the stored hashed values.

第十章 Off-line password guessing When disclosure of whole files full of hashed passwords is a concern, another useful technique is to apply salt. When a user chooses a password, the system chooses a random number (the salt). It then stores both the salt and a hash of the combination of the salt and the password. Hash(salt | password )

第十章 Off-line password guessing Another technique is to encrypt the password file. This does not eliminate the problem of keeping passwords secret; it just reduces it to the problem of protecting the key that decrypts the password file.

第十章 How big should a secret be? How big a space must a secret be chosen in order to be secure? To thwart an on-line attack: The secret does not have to be chosen from a large space, because the intruder is detected after a small number of guesses. To thwart an off-line attack: The secret must be chosen from a much larger space.

第十章 Eavesdropping The lowest-tech form of eavesdropping is to watch as someone types a password. Of course, it’s easier to watch the screen than fingers. Most systems have the sophistication to not display passwords. A more high-tech method is to place a wiretap on the communications line and watch all the password go by Software-based keystroke logs Can be covertly installed on PC Hardware logging Can be embedded in keyboards or cables.

第十章 Eavesdropping One-time passwords: The user and the system have a list of valid passwords, but each one is only valid once. Periodically, the user must get a new list from the from the system administrator. This mechanism is nearly impervious to eavesdropping.

第十章 Passwords and careless users Passwords are particularly easy to abuse. The solutions is to educate users on the importance of security.

第十章 Using a password in multiple places One of the tough trade-offs: users use the same password in multiple places keep their passwords different for different system Using different passwords is more secure because if one password is compromised it only gives away the user’s rights on a single system. However, users sometimes need to write passwords down in order to remember more than one password.

第十章 Requiring frequent password changes The idea behind frequent password changes is that if someone does learn your password, it will only be useful until it next changes. This protection may not be worth much if a lot of damage can be done in a short time. User sometimes write passwords down and less likely to give much thought or creativity to choosing them.

第十章 A login Trojan Horse to Capture passwords The Trojan horse program logs the name and password to a file before the program terminates in some way designed to minimize suspicion. One most systems, there is some way to interrupt running programs. Training users to enter the interrupt key sequence before logging in would then thwart such Trojan horses. For example, in newer Windows systems require the user to type Ctrl-Alt-Delete as part of the login sequence.

第十章 A login Trojan Horse to Capture passwords Even if the Trojan horse program can do the login prompt exactly, it might not be able to exactly duplicate the way the system behaves after a user logs in. This will make an alert user suspicious. Having a message displayed at login telling users the number of unsuccessful login attempts to the account since the last successful attempt

第十章 Non-Login use of passwords Some systems permit password protection on individual files. A user could specially protect certain files so that someone learning the user’s login password still couldn't get at those files. Applications could require their own authentication of a user before permitting access to certain databases.

第十章 Initial password distribution A secure method for the initial distribution of passwords is for the user to appear at the terminal of the system administrator and authentication by whatever means humans use to authenticate (driver’s license, student ID…). The system administrator then sets up all the particulars of the account for the user except the password and then lets the user choose a password.

第十章 Initial password distribution This method has two drawbacks: It may be inconvenient for the user to meet the system administrator. It’s a little scary to let this new user type to this highly privileged terminal session while the system administrator discreetly looks away. A skilled user could probably do substantial damage in a short time.

第十章 Initial password distribution Another variant on this theme is for the system administrator to create the account and an initial strong password, give it to the user, and instruct the user to use the password only for an initial login and then change it to something more easily remembered.

第十章 Authentication token Authentication token: A physical device that a person carries around and uses in authenticating. There are several forms of authentication token in use today.

第十章 Authentication token Magnetic strip card advantages: Passwords are not trivial to reproduce Easy to hold a larger secret disadvantages: Use of these tokens requires custom hardware on every access device. Token can be lost or stolen.

第十章 Authentication token Smart card: about the size of a credit card but with an embedded CPU and memory. When inserted in a smart card reader, the card carries on a conversation with the device. There are various forms of smart cards: Pin protected memory card Cryptographic challenge/response cards Cryptographic calculator

第十章 Authentication token PIN protected memory card There is information in the memory of the card that can only be read after a PIN is input to the card. Usually, after some number of wrong PIN guesses, the card “locks” itself and will not give the information to anyone. The stolen card is useless without the PIN.

第十章 Authentication token Cryptographic challenge/response cards There is a cryptographic key in memory. The card is willing to encrypt and decrypt using the key but will not reveal the key even after the PIN is entered. A computer that knows the key in the card can authenticate the user by creating a random challenge and “challenging” the card to encrypt or decrypt it.

第十章 Authentication token Cryptographic calculator (readerless smart card) It performs cryptographic calculations using a key that it will not disclose. It requires no electrical connection to the terminal. It has a display and usually a keyboard. Advantage: they can be sued from ordinary terminals with no special hardware.

第十章 Physical access A low-tech way of performing user authentication is to have human guards do it “at the door”. For example, many bank transactions can only be initialed at tellers’ terminals inside the bank.

第十章 Biometric Technology available today includes: Retinal scanner Fingerprint readers Face recognition Iris scanner Handprint readers Voiceprints Keystroke timing Signatures