Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE.

Slides:



Advertisements
Similar presentations
1 CompChall: Addressing Password Guessing Attacks IAS, ITCC-2005, April 2005 CompChall: Addressing Password Guessing Attacks By Vipul Goyal OSP Global.
Advertisements

Lecture 5: Cryptographic Hashes
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Duress Detection for Authentication Attacks Against Multiple Administrators Emil Stefanov UC Berkeley Mikhail Atallah Purdue University.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CMSC 414 Computer (and Network) Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Authentication System
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Strong Password Protocols
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Chapter 6 Authenticating People
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Lecture 11: Strong Passwords
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Attacks Overview Nguyen Cao Dat 1. BK TP.HCM Outline  Cryptographic Attacks ▫ Frequency analysis ▫ Brute force attack ▫ Meet-in-the-middle attack ▫ Birthday.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Lecture 2: Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Cryptographic Hash Function
Cryptographic Hash Functions Part I
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Cryptography Lecture 10.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COEN 351 Authentication.
Presentation transcript:

Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE OF WILLIAM AND MARY

Knock Yourself Out(KYO)  Client-side password generator mechanism  Mitigates the risks of simultaneous breaches of clients and multiple servers  Allows short passwords and password reuse  User friendly!  Protects against  Password manager loss  Multiple, simultaneous disclosure of server database  Computationally unbounded adversaries

Authentication - Acceptable Risk  What is an “acceptable (individual) risk”?  Look at ATM cards: 4 digits(0-9), three attempts allowed  Probability to guess PIN correctly is  Reasonable Baseline Security  To break the scheme, attacker needs to steal ATM card(first factor), and guess the correct PIN(second factor)

Authentication – Security and Safety  Alice uses her PW p and PW manager/generator to create a secret A (Bob, p)  Security Threat : Adversary finds p or predicts A (Bob, p)  Safety Threat: Bob blocks Alice due to a wrong secret

Authentication – Security Threat Adversary might learn:  Up to N out of Bob, Carol or Dave: e.g. (virtual) server  Either PW manager: {stolen, lost} {computer, phone}  Or password p

Authentication – Security Threats: Guessing  Mallory tries to guess Alice’s PW, repeatedly.  To limit Mallory’s tries, Bob blocks Alice’s account once a critical limit of failed attempts is reached (e.g. three)

Authentication – Safety Threats: Input Error  Did Alice mistype her PW? Allowing Alice to retry is a  SAFETY MECHANISM(Check)  Does Mallory know the PW? Limiting Mallory’s tries is a  SECURITY MECHANISAM(Check)

KYO Safety check – Input Errors  KYO catches input errors client-site  Bob blocks Alice’s account immediately, once Mallory show a wrong password

KYO Safety check  Generic safety check: For some H, is H(p)=c  Q1: How “good” is the safety check?  Q2: What does an adversary learn through H,c?  (t is Token)

Q1: How good is the safety check?  Measure the probability that safety checks fails, assuming a wrong password P was entered:  If H is a randomly selected function, the probability is the same for every distribution of P.

Q1: How good is the safety check?

Q2: Adversary learning H,c

KYO – reusing passwords  Randomly choose functions F1 and F2  Secrets: s1 = F1(p) and s2 = F2(p)  What does an adversary learn about p and s1, given H, c, F1, F2, s2?

KYO – reusing passwords

KYO – managing passwords

 Renew Alice’s password p1:  Choose a new P2  Select F3, F4 with F3(p2) = s1(Bob), F4(p2) = s2(Carol)

KYO – managing passwords  Different password for Carol:  Choose a new p3  Choose H2, set c2 := H(p3)  Select F5

KYO – managing passwords  To merge passwords:  Dispose of H2, c2  Select F6

KYO: evaluation results – Theoretical results

 What the average user could get:  Florencio found 6-7 alphanum. Chars average (~40bit)  7 alphanum. Char withstand KYO loss and 1 breach

KYO: evaluation results – Theoretical results  The insafety vs insecurity trade-off for password length n bit and disgest length  Longer digests improve safety, but yield more info on the password.

From theory to practice  In analysis: functions are chosen uniformly at random  But descriptions of H,F is too large to store in practice  Use decent hash functions neither collision-resistance nor pseudorandomness required  H, F output are taken from a random subset of all functions.

Implementation and preliminary results

Questions  1. KYO is a () password generator mechanism that mitigate the risks of simultaneous breaches of clients and multiple servers.  2. What are two residual risks in KYO?  3. KYO does not rely on collision-resistant hash functions. Why?