Presented by Sharan Dhanala

Slides:



Advertisements
Similar presentations
1 CompChall: Addressing Password Guessing Attacks IAS, ITCC-2005, April 2005 CompChall: Addressing Password Guessing Attacks By Vipul Goyal OSP Global.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Operating System Security
Anonymity without Sacrificing Performance Enhanced Nymble System with Distributed Architecture CS 858 Project Presentation Omid Ardakanian * Nam Pham *
Use of a One-Way Hash without a Salt
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks Marten van Dijk, Jonathan Rhodes, Luis Sarmenta Srini Devadas MIT Computer.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
presenter : Eirini Aikaterini Degleri , 2735
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Intro To Encryption Exercise Problem What may be the problem with a central KDC?
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptanalysis of Two Dynamic ID-based Authentication
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Lecture 11: Strong Passwords
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Honey Encryption: Security Beyond the Brute-Force Bound
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Presented by Abhijit Mondal Haritabh Singh Suman Mondal
Private key
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Innovative Intrusion-Resilient, DDoS-Resistant Authentication System (IDAS) System Yanjun Zhao.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
KERBEROS SYSTEM Kumar Madugula.
Honeywords: Making Passwords-Cracking Detectable Ari Jules, Ronald L. Rivest Presented by: Karthik Padullaparty | kpad470 October 14, Karthik Padullaparty.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
ICS 454 Principles of Cryptography
Lesson 16-Windows NT Security Issues
ICS 454 Principles of Cryptography
KERBEROS.
Exercise: Hashing, Password security, And File Integrity
Presentation transcript:

Presented by Sharan Dhanala Honeywords: Making Password-Cracking Detectable Randy Acheson, Joshua Allard, and Andrew Han Ari Juels, and Ronald L. Rivest. “Honeywords: Making password-cracking detectable.” In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS), pp. 145-160. ACM, 2013. Presented by Sharan Dhanala

Paper Summary The authors propose a method for improving the security of password hashing - Honeywords. The authors discuss about Honeywords design principle. The authors propose various honeywords generation methods. The authors also give an overview on the attacks on honeywords generation methods. Verification: How does the check whether a submitted password P’ is the true password Pi? How is index i verified without storing i alongside passwords? I am going to discuss about this aspect.

Motivation “The motivation of this paper is that the hashes are frequently inadequate protection for the passwords themselves; hash functions can be inverted on weak passwords, and most passwords are pretty weak.”

Honeywords: Verification Honeywords and true password are placed into a list of Sweetwords, in a random order. Exactly one of these Sweetwords is equal to the password Pi which is the true password. Honeychecker verifies the index of user’s password. Computer system Alice: P1 P2 P3 P4 … Pi Pn Honeychecker Alice: i

Honeywords: Honeychecker “We assume that the system may incorporate an auxiliary secure server called the “honeychecker” to assist with the use of honeywords”. Set: i, j Sets c(i) to have value j Check: i, j Checks that c(i) = j Honeychecker can be anything-background service or isolated DB or a server at remote secure location. Computer system Alice: Pi=P1 P2 P3 P4 … Pi Pn Honeychecker Alice: i Pi TRUE/FALSE i

Honeywords: Attacks on honeychecker Requests and updates sent to the honeycheckers need to be authenticated. Replies from honeychecker should be authenticated. If the communications between computer system and honeychecker is disabled by adversary then system goes into failover mode. Computer system Alice: Pi=P1 P2 P3 P4 … Pi Pn Honeychecker Alice: i Pi TRUE/FALSE i

Advantages of the design Benefits of distributed security. “A distributed security system aims to protect secrets even when an adversary compromises some of its systems or software.” The authors mention that it will be harder to compromise when the resources are diversified. Honeychecker is input only, simple and realistic to build. “The honeychecker can be configured to manage only a minimal amount of secret state.” Honeychecker can be offline- login is still possible with the exception of verification.

Disadvantages of the design Storage overhead Using honeyword generation approach, system needs to store k-1 more passwords for each user account. Thus for a system storing n users accounts, needs to store n × (k-1) extra information which magnifies the storage cost. Issue related to Multiple System Vulnerability If a user uses same password in two (or more) different systems (where systems are using same honeyword generation algorithm) and an adversary gets access to both the systems, then Multiple System Vulnerability may occur. Issue related to DoS resistivity If adversary can guess the honeywords while he/she knows the original password of user, then adversary can intentionally submit honeyword to generate a false negative feedback signal by the “honeychecker".

Conclusion Discussed about the honeywords design principle aspect. Discussed about the advantages and disadvantages of the design. The idea behind honeywords is to not stop the adversary from brute-force the password file but instead implement a way to detect that an adversary has logged in.