CS526: Information Security Chris Clifton October 16, 2003 Authentication.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

Access Control Methodologies
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer (and Network) Security Lecture 15 Jonathan Katz.
Chapter 5 Cryptography Protecting principals communication in systems.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
C. Edward Chow Presented by Mousa Alhazzazi C. Edward Chow Presented by Mousa Alhazzazi Design Principles for Secure.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Identity.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 23, 2003 Certificates, Authentication & Identity,
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Authentication What you know? What you have? What you are?
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Key management issues in PGP
Outline The basic authentication problem
Challenge/Response Authentication
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

CS526: Information Security Chris Clifton October 16, 2003 Authentication

CS526: Information Security Chris Clifton February 24, 2003 Authentication

3 What we have so far: Access control Given subjects S, objects O –What subject is allowed –what type of access –to what object Enough for a realistic system? –How do we know a request really is from s? –And the object accessed really is o? Next Topic: Authentication and Identity

4 What is Authentication? Authentication: Binding of identity to subject How do we do it? –Entity knows something Passwords, id numbers –Entity has something Badge, smart card –Entity is something Biometrics –Entity is someplace Source IP, restricted area terminal

CS526: Information Security Chris Clifton October 28, 2003 Authentication

6 Authentication System: Formal Definition A: set of authentication information –used by entities C: set of complementary information –used by system to validate authentication information F: Set of complementation functions –f : A → C –Generate appropriate c  C given a  A L: set of authentication functions –l: A  C → { true, false } –verify identity S: set of selection functions –s : ? → A –Generate/alter A and C

7 Authentication System (A, C, F, L, S, (f, l)) such that –– f  F,  l  L,  (f, l) in the system such that  a  A,  c  f(a)  C: –l–l(a, f(a)) → true –l–l(a, c) → false with high probability (Bad) example: plaintext passwords –A–A = C = alphabet* –f–f returns argument –l–l is string equivalence

8 Background: Cryptography Encryption system E k (s) –over all choices of k, should form uniform distribution –Thus “appears” independent of s Decryption: D k (E k (s)) = s Strength: Given E k (s), finding k or s difficult –Better: given s, E, E k (s), learning k hard –choosing k, computing D k, E k must be easy Public key: p, r such that D r (E p (s)) = s –Similar notions of strength

9 Authentication Systems: Passwords Information known to subject Complementation Function –Identity – requires that c be protected –One-way hash – function such that f(a) easy to compute f -1 (c) difficult to compute –Better ideas?

10 Attacks on Passwords Dictionary attack: Trial and error guessing –Type 1: attacker knows A, f, c –Type 2: attacker knows A, l –Difficulty based on |A|, time g to compute f or l Probability P of breaking in time T: P ≥ Tg/|A| Problem: often smaller in practice than in theory Password Selection –Random –Pronounceable nonsense –User selection Controls on allowable –Password checking, aging

CS526: Information Security Chris Clifton February 26, 2003 Authentication / Identity

12 Authentication Systems: Challenge-Response Pass algorithm –authenticator sends message m –subject responds with a(m) a is an encryption function In practice: key known only to subject What is the advantage over passwords? –Avoids “replay” attacks One-time password –a changes after use –Why is this challenge-response?

13 Attacks on Challenge-Response Type 1 attack –Attacker knows (space of) encryption function –Captures challenge and response –Learns encryption function / key –Can now properly respond to new challenge Solution: encrypt challenge –Use shared key to share session key –Session key encrypts challenge –Challenge thus indistinguishable from random data

14 Authentication Systems: Biometrics Used for human subject identification Based on physical characteristics that are tough to copy –fingerprint –voice patterns –iris/retina patterns –face recognition –keystroke interval/timing/pressure

15 Attacks on Biometrics Fake biometrics –fingerprint “mask” –copy keystroke pattern Fake the interaction between device and system –Replay attack Authenticate the authenticator! –Requires careful design of entire authentication system

16 Authentication Systems: Location Based on knowing physical location of subject Example: Secured area –Assumes separate authentication for subject to enter area –In practice: early implementation of challenge/response and biometrics What about generalizing this? –Assume subject allowed access from limited geographic area I can work from (near) home –Issue GPS Smart-Card –Authentication tests if smart-card generated signature within spatio/temporal constraints –Key: authorized locations known/approved in advance If I know I’ll be traveling, login from my office disabled!

17 Authentication vs. Identity Authentication: Binding of identity to subject –We know how –We’ve discussed subjects –But what precisely is identity? Principal: Unique Entity –Subject –Object Identity: Specifies a principal

18 Identity = Principal? Identity to Principal may be many-to-one –Given identity, know principal –Other direction unimportant? Examples: Unix –User identity –File identity IdentityPrincipal

19 What is a Principal? Entity –Subject –Object Also a set of entities –Think of subject as “power user”, not individual Examples: –Groups: defined collection of users with common privileges –Roles: membership tied to function

20 Representing Identity Randomly chosen: not useful to humans User-chosen: probably not unique –At least globally Hierarchical: Disambiguate based on levels –File systems –X.500: Distinguished Names /O=Purdue University/OU=Computer Sciences/CN=clifton –Aliases /O=Purdue University/OU=ITaP/CN=cclifton

21 Validating Identity Authentication: Does subject match purported identity? Problem: Does identity match principal? Solution: certificates –Certificate: Identity validated to belong to known principal –Certification Authority: Certificate Issuer Authentication Policy: describes authentication required to ensure principal correct Issuance policy: Who certificates will be issued to –CA is trusted

22 Certificate Implementation Is a certificate real? –Digital signatures –Certificate = Identity + E IssuerPrivateKey (Identity) Correct if Identity = D IssuerPublicKey (Signature) Can I trust it? –Hierarchy of issuers Certificate includes certificate of issuer chain –Higher levels place (contractual) conditions on lower level issuance Common issuance, authentication policy –Also solves uniqueness issue

23 Certificate Examples Verisign –Independently verifies identity of principal –Levels of certification address verified Name/address verified Legal identity verified –More common: corporate identity Is this really PayTuition.EDU I’m giving my bank account number to? PGP (Pretty Good Privacy): “Web of Trust” –Users verify/sign certificates of other users –Do I trust the signer? Or someone who signed their certificate?

CS526: Information Security Chris Clifton February 28, 2003 Identity

CS526: Information Security Chris Clifton October 30, 2003 Systems: Design Principles

26 Internet Identity Host Identity: Who is this on the network? Ethernet: MAC address –Guarantees uniqueness IP address: aaa.bbb.ccc.ddd –Provides hierarchy to ease location Domain Name Service –Human-recognizable name to IP –aliasing Issues: Spoofing –At any level, change mapping if identity to principal

27 Anonymity What if identity not needed? –Web browsing –Complaints about assignments Removing identity not as easy as it sounds –I can send without my userid –But it still traces back to my machine Solution: anonymizer –Strips identity from message –Replaces with (generated) id –Send to original destination –Response: map generated id back to original identity

28 Anonymity Problem: Anonymizer knows identity –C–Can it be trusted? –C–Courts say no! Solution: multiple anonymizers –O–Onion Routing –C–Crowds Anonymizer A Anonymizer B SenderReceiver E A (B) E B (Receiver) E R (message) E B (Receiver) E R (message)

29 Building Real Systems Theory allows formal proof of known security policies –For components –And collections of components What should the security policies be? Design principles: –Guiding standards that are relatively independent of policy

30 Principle of Least Privilege A subject should be given only those privileges needed to complete its task

31 Fail-Safe Defaults Unless a subject is given explicit access to an object, it should be denied access

32 Economy of Mechanism Security mechanisms should be as simple as possible –But no simpler

33 Complete Mediation All accesses to an object must be checked to ensure they are allowed

34 Open Design Security of a mechanism should not depend on secrecy of the design/implementation

35 Separation of Privilege A system should not grant permission based on a single condition

36 Least Common Mechanism Mechanisms used to access resources should not be shared

37 Psychological Acceptability Security mechanisms should not make the resource more difficult to access than if security mechanisms were not present