1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Lecture 6 User Authentication (cont)
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
CSC 474 Information Systems Security
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Authentication & Kerberos
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
FIT3105 Smart card based authentication and identity management Lecture 4.
Cryptography Basic (cont)
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security-Authentication
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
Computer encryption is… Based on the science of cryptography.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Lecture 11: Strong Passwords
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
11 Identification & ZKIP.  Introduction  Passwords  Challenge-Response  ZKIP 22.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Introduction to Information Security Lecture 6: Other Cryptographic Primitives
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
11 Identification & ZKIP.  Introduction  Passwords  Challenge-Response  ZKIP 22.
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Model Information Security Planning By Mohammed Ashfaq Ahmed.
Identification & ZKIP.
Authentication What you know? What you have? What you are?
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Technical Devices for Security Management Kathryn Hockman COSC 481.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer Communication & Networks
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
Operating Systems Concepts
Presentation transcript:

1 Lect. 20. Identification

2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob, that she is the real Alice. Authenticate an entity by presenting some identification information Should be secure against various attacks Through an interactive protocols using secret information  Message Authentication Show that a message was generated by an entity Using digital signature or MAC Authentication

3  Using Something Known Password, PIN  Using Something Possessed IC card, Hardware token  Using Something Inherent Biometrics Approach for Identification

4 MethodExamplesReliabilitySecurityCost What you Remember (know) Password Telephone # Reg. # M/L M (theft) L (imperso- nation) Cheap What you have Registered Seal Magnetic Card IC Card M L (theft) M (imperso- nation) Reason- able What you are Bio-metric (Fingerprint, Eye, DNA, face, Voice, etc) H H (theft) H (Imperso- nation) Expen- sive

5  Password-based scheme (weak authentication) –crypt passwd under UNIX –one-time password  Challenge-Response scheme (strong authentication) –Symmetric cryptosystem –MAC (keyed-hash) function –Asymmetric cryptosystem  Using Cryptographic Protocols –Fiat-Shamir identification protocol –Schnorr identification protocol, etc Approach for Identification

6 passwd, A passwd table A h(passwd) ProverVerifier passwd h = A y accept n reject Identification by Password Sniffing attack Replay attack - Static password

7 1. login ID 2. N 4. X N client Hash function f() pass-phrase S Initial Setup 3. compute f N (S) = X N Host compute f(S), f(f(S)),...., X 1,X 2,X 3,...,X N store X N+1 Hash function f() pass-phrase S 5. compute f(X N ) = X N+1 6. compare 7. store S/Key (One-Time Password System)

8 Identification using Biometric Trails

9 Biometric Recognition System

10 Fake Fingerprint

11 Applications