1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.

Slides:



Advertisements
Similar presentations
Password Cracking Lesson 10. Why crack passwords?
Advertisements

CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Chapter 12: Authentication
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #11-1 Chapter 11: Authentication Basics Passwords Challenge-Response Biometrics.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #12-1 Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
1 Authentication CS461/ECE422 Fall Reading Chapter 12 from Computer Security Chapter 10 from Handbook of Applied Cryptography
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication CS461/ECE422 Spring Readings Chapter 3 from text Rainbow tables – Chapter 10 from Handbook.
CS526: Information Security Chris Clifton October 16, 2003 Authentication.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
CIS 450 – Network Security Chapter 8 – Password Security.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Lecture 11: Strong Passwords
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Slide #11-1 Chapter 11: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
G53SEC 1 Authentication and Identification Who? What? Where?
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication What you know? What you have? What you are?
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
SCSC 455 Computer Security Chapter 3 User Security.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #12-1 Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics.
Authentication CS461/ECE422.
Chapter 11: Authentication
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Authentication.
Chapter 11: Authentication
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
CSCI283 Fall 2008 GWU All slides from Bishop’s slide set
Computer Security Protection in general purpose Operating Systems
Chapter 11: Authentication
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

1 Chapter 11: Authentication Basics Passwords

2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What entity knows (eg. Password, SSN) –What entity has (eg. badge, smart card) –What entity is (eg. fingerprints, biometrics) –Where entity is (eg. In front of a particular terminal)

3 An example: –You know some password –The computer also knows it (could be the password itself or some post computation result) –A function maps your password to the stored information –Examine whether they match –You can also change the password

4 Authentication System Authentication system contains: (A, C, F, L, S) –A: information that proves identity (what you know) –C: information stored on computer and used to validate authentication information (what computer knows) –F: complementation function; f : A  C (function maps your knowledge to stored information) –L: functions that prove identity: A x C  {T, F} –S: functions enabling entity to create, alter information in A or C

5 Example Password system, with passwords stored in clear text –A: set of strings making up passwords All 8 character strings –C = A All 8 character strings –F: Mapping an input password to itself –L: single equality test function { eq } Input ?= stored password –S: function to set/change password

6 Passwords Based on what people know Sequence of characters –Examples: 10 digits, a string of letters, etc. –Generated randomly, by user, by computer with user input Algorithms –Examples: challenge-response, one-time passwords

7 Storage Password stored in cleartext –If password file compromised, all passwords revealed Encipher file –Need to have decipherment, encipherment keys in memory –If attackers get a hold of the keys, reduces to previous problem Store one-way hash of password –If file is read, attacker must still guess passwords or invert the hash

8 Salting Goal: mitigate dictionary attacks Problem: Say all passwords are 8-char long, the attacker can pre-compute hash values of all 8-char strings. Later when she/he gets the hash file, she/he can easily determine the string Method: –Introduce additional information so that it is very difficult for attackers to conduct pre-computation –Still very efficient for the system to authenticate a user –Example Use salt as first part of input to hash function

9 Anatomy of Attacking Goal: locate a  A such that: –For some f  F, f(a) = c  C –c is associated with entity Two ways to determine whether a meets these requirements: –Approach 1: if attacker knows function f, she/he can try as above E.g., attacker gets the file containing hashed passwords, she/he can start to hash all possible passwords –Approach 2: try to login by guessing a password

10 Preventing Attacks How to prevent this: –Hide one of a, f, or c Prevents attack from above Example: –You do not know the function f –You cannot get c –Block access to all l  L or result of l(a) Restrict the number of trying you can conduct in every unit time Prevent attacker from knowing if guess succeeded Prevent any logins to an account from a network

11 Dictionary Attacks Trial-and-error from a list of potential passwords –Off-line: know f and c, and repeatedly try different guesses g  A until the list is done or passwords guessed Examples: pre-compute the hash of possible password –On-line: have access to functions in L and try guesses g until some l(g) succeeds Examples: trying to log in by guessing a password

12 Guessing probability P: probability of guessing a password, –≥ tried password / total number of password Put it in a formula: –G: number of guesses tried in 1 time unit –T: number of time units –N: number of possible passwords (|A|) –Then P ≥ TG/N

13 Example Goal –Passwords drawn from a 96-char alphabet –Can test 10 4 guesses per second –Probability of a success to be 0.5 over a 365 day period –What is minimum password length? Solution –P >= GT/N GT/N = 0.5, G= 10 4, T=60 * 60 * 24 * 365, N= 96^length –N ≥ TG/P = (365  24  60  60)  10 4 /0.5 = 6.31  –Choose length such that 96^length ≥ N –So length ≥ 6, meaning passwords must be at least 6 chars long

14 Pronounceable Passwords Generate phonemes randomly –Phoneme is unit of sound, something easy to pronounce –Examples: helgoret, juttelon are; przbqxdfl, zxrptglfn are not –Remember the names of brands: Mazda, Toshiba, etc Problem: too few –For example, there are about 440 phonemes –If every phoneme contains 3 characters, then a 9-char password contains only 3 phonemes –Attacker needs to search only 440^3 = 85 million passwd Solution: key crunching –Run long key through hash function and convert to printable sequence –Use this sequence as password

15 Guessing Through L Cannot prevent these –Otherwise, legitimate users cannot log in Make them slow –Backoff –Disconnection –Disabling Be very careful with administrative accounts! Can be used to conduct DoS attacks –Jailing Allow in, but restrict activities

16 Password Aging Force users to change passwords after some time has expired –How do you force users not to re-use passwords? Record previous passwords Block changes for a period of time –Give users time to think of good passwords Don’t force them to change before they can log in Warn them of expiration days in advance

17

18 Key management in some UNIX systems –don't use the shadow passwordfiles –the passwords are stored encrypted in the file /etc/passwd –Format of the stored record Account; coded password data; homedir; Gigawalt; fURfuu4.4hY0U; /home/gigawalt

19

20 It becomes more difficult for attackers to try all possible password offline If an attacker gets the /etc/passwd file and knows all salt, then it is still ok to him/her Make the salt private: stored in a file with restricted access permissions Challenges –Keep the salt private –Maintain salt for users

21 Key Points Authentication is not cryptography –You have to consider system components Passwords are important –They provide a basis for most forms of authentication Protocols are important –They can make attacks harder Authentication methods can be combined