Outline User authentication

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Outline User authentication
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Outline User authentication –Password authentication, salt –Challenge-response authentication protocols –Biometrics –Token-based authentication Authentication.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Authentication Digital Signature Key distribution.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Outline User authentication
Outline User authentication –Password authentication, salt –Challenge-response authentication protocols –Biometrics –Token-based authentication Authentication.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Network Security understand principles of network security:
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Outline User authentication –Password authentication, salt –Challenge-response authentication protocols –Biometrics –Token-based authentication Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Hashes and Message Digest Hash is also called message digest One-way function: d=h(m) but no h’(d)=m –Cannot find the message given a digest Cannot find.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Password Authentication J. Mitchell CS 259. Password fileUser exrygbzyf kgnosfix ggjoklbsz … kiwifruit hash function.
Security-Authentication
Objectives Understand the challenge-response authentication protocol and its attacks Understand the basic mechanisms of trusted intermediaries for distributed.
Chapter 31 Network Security
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Lecture 11: Strong Passwords
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
Computer and Network Security - Message Digests, Kerberos, PKI –
Authentication What you know? What you have? What you are?
Chapter 10: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality” m authentication.
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Network Security7-1 Chapter 7: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Outline User authentication
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Protocol ap1.0: Alice says “I am Alice”
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Outline User authentication Password authentication, salt Challenge-Response Biometrics Token-based authentication Authentication in distributed systems (multi service providers/domains) Single sign-on, Microsoft Passport Trusted Intermediaries

Password authentication Basic idea User has a secret password System checks password to authenticate user Issues How is password stored? How does system check password? How easy is it to guess a password? Difficult to keep password file secret, so best if it is hard to guess password even if you have the password file

Basic password scheme User Password file kiwifruit exrygbzyf kgnosfix ggjoklbsz … hash function

Basic password scheme Hash function h : strings  strings Given h(password), hard to find password No known algorithm better than trial and error User password stored as h(password) When user enters password System computes h(password) Compares with entry in password file No passwords stored on disk

Unix password system Hash function is 25xDES 25 rounds of DES-variant encryptions Password file is publicly readable Other information in password file … Any user can try “dictionary attack” User looks at password file Computes hash(word) for every word in dictionary “Salt” makes dictionary attack harder R.H. Morris and K. Thompson, Password security: a case history, Communications of the ACM, November 1979

Salt Password line Compare Salt Input Constant, A 64-bit block of 0 walt:fURfuu4.4hY0U:129:129:Belgers:/home/walt:/bin/csh Compare Salt Input Key Constant, A 64-bit block of 0 account:coded password data:uid:gid:GCOS-field:homedir:shell Ciphertext 25x DES Plaintext When password is set, salt is chosen randomly 12-bit salt slows dictionary attack by factor of 212

Dictionary Attack – some numbers Typical password dictionary 1,000,000 entries of common passwords people's names, common pet names, and ordinary words. Suppose you generate and analyze 10 guesses per second This may be reasonable for a web site; offline is much faster Dictionary attack in at most 100,000 seconds = 28 hours, or 14 hours on average If passwords were random Assume six-character password Upper- and lowercase letters, digits, 32 punctuation characters 689,869,781,056 password combinations. Exhaustive search requires 1,093 years on average

Challenge-response Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” “I am Alice” Failure scenario??

Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” in a network, Bob can not “see” Alice, so Trudy simply declares herself to be Alice “I am Alice”

Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address “I am Alice” Alice’s IP address Failure scenario??

Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Trudy can create a packet “spoofing” Alice’s address “I am Alice” Alice’s IP address

Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. “I’m Alice” Alice’s IP addr password Failure scenario?? OK Alice’s IP addr

Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. Alice’s IP addr Alice’s password “I’m Alice” playback attack: Trudy records Alice’s packet and later plays it back to Bob OK Alice’s IP addr “I’m Alice” Alice’s IP addr password

Authentication: yet another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. “I’m Alice” Alice’s IP addr encrypted password Failure scenario?? OK Alice’s IP addr

Authentication: another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. Alice’s IP addr encryppted password “I’m Alice” record and playback still works! OK Alice’s IP addr “I’m Alice” Alice’s IP addr encrypted password

Authentication: yet another try Goal: avoid playback attack Nonce: number (R) used only once –in-a-lifetime ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alice must return R, encrypted with shared secret key “I am Alice” R K (R) A-B Alice is live, and only Alice knows key to encrypt nonce, so it must be Alice! Failures, drawbacks?

Authentication: ap5.0 ap4.0 doesn’t protect against server database reading can we authenticate using public key techniques? ap5.0: use nonce, public key cryptography “I am Alice” Bob computes R (K (R)) = R A - K + K (R) A - and knows only Alice could have the private key, that encrypted R such that (K (R)) = R A - K +

Biometrics Use a person’s physical characteristics Advantages fingerprint, voice, face, keyboard timing, … Advantages Cannot be disclosed, lost, forgotten Disadvantages Cost, installation, maintenance Reliability of comparison algorithms False positive: Allow access to unauthorized person False negative: Disallow access to authorized person Privacy? If forged, how do you revoke?

Biometrics Common uses Specialized situations, physical security Combine Multiple biometrics Biometric and PIN Biometric and token

Token-based authentication Smart Card With embedded CPU and memory Various forms PIN protected memory card Enter PIN to get the password Cryptographic challenge/response cards A cryptographic key in memory Computer create a random challenge Enter PIN to encrypt/decrypt the challenge w/ the card Cryptographic Calculator No electronic connection to the terminal

Smart Card Example Initial data Time Challenge Time function Some complications Initial data shared with server Need to set this up securely Shared database for many sites Clock skew

Outline User authentication Authentication in distributed systems Password authentication, salt Challenge-Response Biometrics Token-based authentication Authentication in distributed systems Single sign-on, Microsoft Passport Trusted Intermediaries

Single sign-on systems e.g. Securant, Netegrity, Oblix LAN Rules Database user name, password, other auth Authentication Application Server Advantages User signs on once No need for authentication at multiple sites, applications Can set central authorization policy for the enterprise

Microsoft Passport Launched 1999 Claim > 200 million accounts in 2002 Over 3.5 billion authentications each month Log in to many websites using one account Used by MS services Hotmail, MSN Messenger or MSN subscriptions; also Radio Shack, etc. Hotmail or MSN users automatically have Microsoft Passport accounts set up Passport may continue to evolve; bugs have been uncovered www.networkmagazine.com/article/NMG20020304S0003

Four parts of Passport account Passport Unique Identifier (PUID) Assigned to the user when he or she sets up the account User profile, required to set up account Phone number or Hotmail or MSN.com e-mail address Also name, ZIP code, state, or country, … Credential information E-mail address or phone number Minimum six-character password or PIN Four-digit security key, used for a second level of authentication on sites requiring stronger sign-in credentials Wallet Passport-based application at passport.com domain E-commerce sites with Express Purchase function use wallet information rather than prompt the user to type in data

Passport log-in Use both symmetric and asymmetric cipher. The Passport server encrypts the first two cookies with the unique key it shares with BuyStuff.com. Passport's own key encrypts the third cookie, which participating sites can't read.

Trusted Intermediaries Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC) acting as intermediary between entities Public key problem: When Alice obtains Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: trusted certification authority (CA)

Key Distribution Center (KDC) Alice, Bob need shared symmetric key. KDC: server shares different secret key with each registered user (many users) Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for communicating with KDC. KDC KB-KDC KP-KDC KA-KDC KX-KDC KP-KDC KY-KDC KZ-KDC KA-KDC KB-KDC

Key Distribution Center (KDC) Q: How does KDC allow Bob, Alice to determine shared symmetric secret key to communicate with each other? KDC generates R1 KA-KDC(A,B) KA-KDC(R1, KB-KDC(A,R1) ) Alice knows R1 Bob knows to use R1 to communicate with Alice KB-KDC(A,R1) Alice and Bob communicate: using R1 as session key for shared symmetric encryption

Certification Authorities Certification authority (CA): binds public key to particular entity, E. E (person, router) registers its public key with CA. E provides “proof of identity” to CA. CA creates certificate binding E to its public key. certificate containing E’s public key digitally signed by CA – CA says “this is E’s public key” K B + digital signature (encrypt) Bob’s public key K B + CA private key certificate for Bob’s public key, signed by CA - Bob’s identifying information K CA

Certification Authorities When Alice wants Bob’s public key: gets Bob’s certificate (Bob or elsewhere). apply CA’s public key to Bob’s certificate, get Bob’s public key K B + digital signature (decrypt) Bob’s public key K B + CA public key + K CA

Single KDC/CA Problems Solutions: break into multiple domains Single administration trusted by all principals Single point of failure Scalability Solutions: break into multiple domains Each domain has a trusted administration

Multiple KDC/CA Domains Secret keys: KDCs share pairwise key topology of KDC: tree with shortcuts Public keys: cross-certification of CAs example: Alice with CAA, Boris with CAB Alice gets CAB’s certificate (public key p1), signed by CAA Alice gets Boris’ certificate (its public key p2), signed by CAB (p1)

Backup Slides

Advantages of salt Without salt With salt Same hash functions on all machines Compute hash of all common strings once Compare hash file with all known password files With salt One password hashed 212 different ways Precompute hash file? Need much larger file to cover all common strings Dictionary attack on known password file For each salt found in file, try all common strings