Lecture 5 User Authentication modified from slides of Lawrie Brown.

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 3: User Authentication.
Lecture 6 User Authentication (cont)
Password Cracking Lesson 10. Why crack passwords?
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Authentication & Kerberos
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Information System Security, Intruders and password protection Presented by: Yanal Kilani Presented to: Dr. Lo’ai Tawalbeh Summer 2006.
Marjie Rodrigues
Security-Authentication
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Password Management. Password Protection Virtually all multiuser systems require that a user provide not only a name or identifier (ID) but also a password.
BUSINESS B1 Information Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Chapter 3 User Authentication 1. RFC 4949 RFC 4949 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.”
Chapter 3 User Authentication
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Authentication.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security: Principles and Practice
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

Lecture 5 User Authentication modified from slides of Lawrie Brown

RFC 2828: user authentication “The process of verifying an identity claimed by or for a system entity.”

Authentication Process fundamental building block and primary line of defense basis for access control and user accountability identification step – presenting an identifier to the security system verification step – presenting or generating authentication information that corroborates the binding between the entity and the identifier

User Authentication the four means of authenticating user identity are based on:

Password Authentication widely used line of defense against intruders – user provides name/login and password – system compares password with the one stored for that specified login the user ID: – determines that the user is authorized to access the system – determines the user’s privileges – is used in access control

electronic monitoring password guessing against single user Password Vulnerabilities offline dictionary attack specific account attack popular password attack workstation hijacking exploiting user mistakes exploiting multiple password use

Countermeasures controls to prevent unauthorized access to password file intrusion detection measures rapid reissuance of compromised passwords account lockout mechanisms policies to inhibit users from selecting common passwords training in and enforcement of password policies automatic workstation logout policies against similar passwords on network devices

Use of Hashed Passwords prevents duplicate passwords from being visible in the password file. greatly increases the difficulty of offline dictionary attacks. For a salt of length b bits, the number of possible passwords is increased by a factor of 2 b. becomes nearly impossible to find out whether a person with passwords on two or more systems has used the same password on all of them.

UNIX Implementation original scheme – up to eight printable characters in length – 12-bit salt used to modify DES encryption into a one-way hash function – zero value repeatedly encrypted 25 times – output translated to 11 character sequence now regarded as inadequate – still often required for compatibility with existing account management software or multivendor environments

Improved Implementations much stronger hash/salt schemes available for Unix recommended hash function is based on MD5 – salt of up to 48-bits – password length is unlimited – produces 128-bit hash – uses an inner loop with 1000 iterations to achieve slowdown OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt – most secure version of Unix hash/salt scheme – uses 128-bit salt to create 192-bit hash value

Password Cracking dictionary attacks – develop a large dictionary of possible passwords and try each against the password file – each password must be hashed using each salt value and then compared to stored hash values rainbow table attacks – pre-compute tables of hash values for all salts – a mammoth table of hash values – can be countered by using a sufficiently large salt value and a sufficiently large hash length

Observed Password Lengths Purdue University study on 54 systems and 7000 users

Passwords Cracked from a Sample Set of 13,797 Accounts Compiled 3M dictionary words and their variations. The more words that need to be tested for a match, the lower the cost/benefit ratio.

Password File Access Control can block offline guessing attacks by denying access to encrypted passwords make available only to privileged users shadow password file a separate file from the user IDs where the hashed passwords are kept vulnerabilities vulnerabilities weakness in the OS that allows access to the file accident with permissions making it readable users with same password on other systems access from backup media sniff passwords in network traffic

Lecture 6 User Authentication (cont) modified from slides of Lawrie Brown

Password Selection Techniques user is allowed to select their own password, however the system checks to see if the password is allowable, and if not, rejects it goal is to eliminate guessable passwords while allowing the user to select a password that is memorable system periodically runs its own password cracker to find guessable passwords users have trouble remembering them users can be told the importance of using hard to guess passwords and can be provided with guidelines for selecting strong passwords

Proactive Password Checking rule enforcement – specific rules that passwords must adhere to password cracker – compile a large dictionary of passwords not to use Bloom filter – used to build a table based on dictionary using hashes – check desired password against this table

Types of Cards Used as Tokens

Memory Cards can store but do not process data the most common is the magnetic stripe card can include an internal electronic memory can be used alone for physical access – hotel room, ATM provides significantly greater security when combined with a password or PIN drawbacks of memory cards include: – requires a special reader – loss of token – user dissatisfaction

Smartcard physical characteristics: – include an embedded microprocessor – a smart token that looks like a bank card – can look like calculators, keys, small portable objects interface: – manual interfaces include a keypad and display for interaction – electronic interfaces communicate with a compatible reader/writer authentication protocol: – static, dynamic password generator and challenge-response

The smart card chip is embedded into the plastic card and is not visible. The dimensions conform to ISO standard Smart Card Dimensions

Communication Initialization between a Smart Card and a Reader

Biometric Authentication attempts to authenticate an individual based on – unique physical characteristics – pattern recognition technically complex and expensive – compared to passwords and tokens physical characteristics used include: facial characteristics fingerprints hand geometry retinal pattern iris signature voice

Cost Versus Accuracy

Operation of a Biometric System A Generic Biometric System Enrollment creates an association between a user and the user’s biometric characteristics. Depending on the application, user authentication either involves verifying that a claimed user is the actual user or identifying an unknown user.

Biometric Accuracy

Biometric Measurement Operating

Actual Biometric Measurement Operating Characteristic Curve s

Remote User Authentication authentication over a network, the Internet, or a communications link is more complex – additional security threats such as: eavesdropping, capturing a password, replaying an authentication sequence that has been observed generally rely on some form of a challenge- response protocol to counter threats

Password Protocol Example of a challenge-response protocol user transmits identity to remote host host generates a random number (nonce) nonce is returned to the user host stores a hash code of the password function in which the password hash is one of the arguments use of a random number helps defend against an adversary capturing the user’s transmission

Token Protocol Example of a token protocol user transmits identity to the remote host host returns a random number and identifiers token either stores a static passcode or generates a one- time random passcode user activates passcode by entering a password password is shared between the user and token and does not involve the remote host

Static Biometric Protocol Example of a static biometric protocol user transmits an ID to the host host responds with a random number and the identifier for an encryption client system controls biometric device on user side host decrypts incoming message and compares these to locally stored values host provides authentication by comparing the incoming device ID to a list of registered devices at the host database

Dynamic Biometric Protocol Example of a dynamic biometric protocol host provides a random sequence and a random number as a challenge sequence challenge is a sequence of numbers, characters, or words user at client end must then vocalize, type, or write the sequence to generate a biometric signal the client side encrypts the biometric signal and the random number host decrypts message and generates a comparison

eavesdropping adversary attempts to learn the password by some sort of attack that involves the physical proximity of user and adversary host attacks directed at the user file at the host where passwords, token passcodes, or biometric templates are stored replay adversary repeats a previously captured user response client attacks adversary attempts to achieve user authentication without access to the remote host or the intervening communications path Trojan horse an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric denial-of-service attempts to disable a user authentication service by flooding the service with numerous authentication attempts

Potential Attacks, Susceptible Authenticators, and Typical Defenses

Practical Application: Iris Biometric System

Case Study: ATM Security Problems

Summary means of authenticating a user’s identity – something the individual knows, possesses, is, does vulnerability of passwords – offline dictionary attack – specific account attack – popular password attack – password guessing against single user – workstation hijacking – exploiting user mistakes – exploiting multiple password use – electronic monitoring – hashed password and salt value – password file access control password selection strategies – user education – computer generated passwords – reactive password checking – proactive password checking – Bloom filter token based authentication – memory cards – smart cards biometric authentication remote user authentication – password protocol – token protocol – static biometric protocol – dynamic biometric protocol