Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Authentication Protocols Rocky K. C. Chang 9 March 2007.

Similar presentations


Presentation on theme: "1 Authentication Protocols Rocky K. C. Chang 9 March 2007."— Presentation transcript:

1 1 Authentication Protocols Rocky K. C. Chang 9 March 2007

2 Rocky, K. C. Chang2

3 3 Outline  Authentication problems  Network-based authentication  Password-based authentication  Cryptographic authentication protocols (challenge and response) Secret key based Public key based  Needham-Schroeder public-key authentication protocol

4 Rocky, K. C. Chang4 The authentication problem  Authentication: The process of determining whether someone or something is, in fact, who or what it is declared to be. Binding of an identity to a subject.  Authentication protocols: Key establishment protocols, e.g., authenticated Diffie-Hellman. Entity authentication protocols, e.g., system login, which is the focus of this set of slides.

5 Rocky, K. C. Chang5 Information for authentication  What the entity knows (such as passwords or secret information)  What the entity has (such as a badge or card)  What the entity is (such as fingerprints or other biometrics)  Where the entity is (such as in front of a particular terminal)

6 Rocky, K. C. Chang6 The authentication process  The entire process consists of Obtaining the required authentication information (e.g., a hashed password) Analyzing the data (e.g., compare the received password with the stored password), and Determining if it is associated with the principal (e.g., confirmed if they are the same).

7 Rocky, K. C. Chang7 Classification of authentication problems  Authenticated subjects: humans vs machines  Authentication methods: address-based, password, or cryptographic.  Between two entities or with the help of at least a trusted third party  One-way vs mutual authentication

8 Rocky, K. C. Chang8 Address-based authentication  Assume that the identity of the source can be inferred from the (IP or MAC) address of the packet.  IP source address spoofing Receiving the response is generally tricky. Randomized source address selection  MAC source address spoofing Many people teach you how to do it. Detecting them in wireless networks

9 9 Password-based authentications

10 Rocky, K. C. Chang10 Basic password protocols  Authentication based on what the entity knows.  U sends her password to S. Vulnerability to eavesdropping, stolen password files, and easy-to-guess passwords  Protection of password files: In UNIX, one of 4,096 hash functions is used to a password into an 11-character string. A 2-character string identifying the hash function is prepended to the 11-character string.

11 Rocky, K. C. Chang11 Attacks on the basic protocol  On-line attack When the hash values are not available to an attacker. Defense: maximize the time to guess the password, exponential backoff, disconnection, disabling, and jailing.  Off-line attack (dictionary attack) Receive a copy of the hash value, and guess the password (at his leisure). Run through a list of likely possibilities, often a list of words from a dictionary Defense: append the password with a random string (salt) and hash the result. E.g.,  User IDSalt valuepassword hash  Alice13579hash(13579,password-alice)  Bob24680hash(24680,password-Bob)

12 Rocky, K. C. Chang12 Problems with passwords  One fundamental problem with passwords is that they are reusable. Attacker can reply a captured password. Force users to age their passwords?  An alternative is to authenticate in such a way that the transmitted password changes each time.  Let U and S agree on a secret function f. S sends a nonce N (the challenge) to U. U replies with f(N) (the response). S validates f(N) by computing it separately.  A nonce (timestamp, random number, etc) is a “ number used once ” ---non-repeating string freshly chosen by S.

13 Rocky, K. C. Chang13 One-time passwords  A one-time password is a password that is invalidated as soon as it is used.  The challenge-response mechanism uses one-time passwords.  The response is essentially the “password.” Every time the password is different (one-time password).  For example, U chooses an initial seed k, and the key generator computes h(k) = k 1, h(k 1 ) = k 2, …, h(k n-1 ) = k n, where h() is a one-way hash function. The passwords, in the order they are used, are p 1 = k n, p 2 = k n-1, …, p n = k 1.

14 Rocky, K. C. Chang14 Two-factor authentication  Hardware support for challenge-response procedures: A token that responds to a challenge. A temporal based token: displays a different number, e.g., every 60 seconds.  Two-factor authentication Authentication based on at least two authentication factors. E.g., the token value (what the entity has) and a password (what the entity knows)

15 15 Secret key based authentication

16 Rocky, K. C. Chang16 A simple, one-way authentication  Assume that S is authentic.  The server and Alice share a secret key k, and N is a nonce. The nonce is to deduce that Alice is live. The inclusion of S’s identity ensures that Alice has the knowledge of S as her entity peer.

17 Rocky, K. C. Chang17 A simple, mutual authentication protocol  Mutual authentication  2 x one-way authentication.  Alice and Bob share a secret key k.

18 Rocky, K. C. Chang18 Reduced to a 3-way protocol  Besides the reduction in the number of messages, what else is different?

19 Rocky, K. C. Chang19 A reflection attack by Eve  Assume that Eve can open multiple simultaneous sessions with Bob.

20 Rocky, K. C. Chang20 The key problems and solutions  The same key is used by the initiator and responder. Have them use different keys (maintain a pair of secret keys between two parties).  Improve the protocol resistance to attacks involving parallel sessions.  Have the initiator and responder draw from different sets of nonce.  Have the initiator to prove who she is before the responder’s.

21 Rocky, K. C. Chang21 Will the original 5-way protocol be subject to the reflection attack?

22 Rocky, K. C. Chang22 Will the original 5-way protocol be subject to the reflection attack?

23 Rocky, K. C. Chang23 Another solution  The main problem is that the encrypted elements in the second and three messages are the same. Have the responder influence on what she encrypts or hashes. A possible solution:

24 24 Public key based authentication

25 Rocky, K. C. Chang25 Public-key authentication  It is very difficult to build a provably secure authentication protocol based on symmetric cryptographic primitives.  It is not feasible to use secret-key authentication without a trusted third party.  The secret key has to be placed in both parties.

26 Rocky, K. C. Chang26 A simple, one-way authentication  Alice signs the challenge from S, and N S, N A are nonces picked by S and Alice, respectively.  It is important that Alice influences what she signs.

27 Rocky, K. C. Chang27 A simple, mutual authentication  Each side authenticates the other side by requesting for a correct digital signature.  Another implementation can have the challenger to encrypt a nonce.

28 Rocky, K. C. Chang28 A pitfall in this simple C-R protocol  Eve can impersonate Alice by having Alice’s help in signing Bob’s nonce.

29 Rocky, K. C. Chang29 The main problem is  The challenged party (Alice) has no influence on what she will sign. As a general principle, it is better if both parties have some influence over the quantity signed. Otherwise, the challenger can abuse this protocol to get a signature on any quantity she chooses.

30 Rocky, K. C. Chang30 An improved protocol  The signer includes her nonce into the message that she is going to sign.

31 Rocky, K. C. Chang31 Needham-Schroeder public-key authentication protocol  Kerberos is based on the improved Needham- Schroeder public-key authentication protocol.  The original protocol had security flaws.  Assume that both A and B have a pair of public and private keys. Denote A's public key by K a and the private key by K -1 a, and similarly for B.  We also write {m} K for message m encrypted with key K. Moreover N a and N b are nonces generated by A and B, respectively.  We have a trusted key server S.

32 Rocky, K. C. Chang32 The original protocol was a. A  S: A, B b. S  A: {K b, B} K -1 s c. A  B: {N a, A} K b d. B  S: B, A e. S  B: {K a, A} K -1 s f. B  A: {N a, N b } K a g. A  B: {N b } K b

33 Rocky, K. C. Chang33 Eve can impersonate Alice by i. (1) A  E: {N a, A} K e (A establishes a normal session with E.) ii. (1’) E  B: {N a, A} K b (E attempts to impersonate A when establishing a session with B.) iii. (2’) B  E: {N a, N b } K a (B's response to A intercepted by E.) iv. (2) E  A: {N a, N b } K a (E forwards B's response to A.) v. (3) A  E: {N b } K e (A's response to E) vi. (3’) E  B: {N b } K b (E's response to B, therefore successfully impersonating A)

34 Rocky, K. C. Chang34 A simple fix  Include B's identity in the response message. That is, the message (f) becomes B  A: {B, N a, N b } K a.  Therefore, the message (iii) in the attack becomes B  E: {B, N a, N b } K a.  In this case E cannot replay the message and send it to A, because A expects B's identity in the message.

35 Rocky, K. C. Chang35 Conclusions  Designing a secure and efficient authentication protocol turned out to be more difficult than people thought.  We have discussed the basic protocols based on password, secret-key, and public-key. We have not addressed the system with a trusted third party yet.  The result of authentication may also include an agreement of a secret key, i.e., authenticated key exchange (to be addressed later).

36 Rocky, K. C. Chang36 Acknowledgments  The notes are prepared mostly based on C. Kaufman, R. Perlman and M. Speciner, Network Security: Private Communication in a Public World, Second Edition, Prentice Hall PTR, 2002. Various articles


Download ppt "1 Authentication Protocols Rocky K. C. Chang 9 March 2007."

Similar presentations


Ads by Google