AIT 682: Network and Systems Security

Similar documents
Authentication. Identification. AIT 682: Network and Systems Security

CSC 474 Network Security. Authentication. Identification

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

CSCI 667: Concepts of Computer Security

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

CSC 405 Introduction to Computer Security

CNT4406/5412 Network Security

Authentication Objectives People Authentication I

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

CSE 565 Computer Security Fall 2018

User Authentication. Modified By: Dr. Ramzi Saifan

Lecture 3 - Passwords and Authentication

User Authentication. Modified By: Dr. Ramzi Saifan

CS530 Authentication

Lecture 3 - Passwords and Authentication

5. Authentication Contents

HOST Authentication Overview ECE 525

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Passwords. EJ Jung. slide 1

Lecture 9 User Authentication

Computer Security 3/20/18

Lecture Notes for Chapter 3 System Security

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Lecture 14 Passwords and Authentication

Identification Schemes

Computer Security: Principles and Practice

Authentication. Overview of Authentication systems. IT352 Network Security Najwa AlGhamdi

User Authentication Protocols Week 7

CPSC 467b: Cryptography and Computer Security

AIT 682: Network and Systems Security

Authentication. Chapter 2

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

===============================================================================

Chapter 3: User Authentication

Web Security, Summer Term 2012

Web Security, Summer Term 2012

User Authentication Protocols

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Authentication Methods

Intruders, Human Identification and Authentication, Web Authentication

Information Security CS 526

COMPUTER NETWORK SECURITY

Online Banking Security

CPSC 467: Cryptography and Computer Security

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)

Information Security & Privacy

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Password. authentication through passwords

Network Security and Cryptography. December Sample Exam Marking Scheme

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2

One-Time-Password-Authenticated Key Exchange

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Information Security CS 526

HY-457 Information Systems Security

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CS System Security Mid-Semester Review

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)

ID protocols. Overview. Dan Boneh

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 19

TPM v.s. Embedded Board. James Y

Authentication Technology Alternatives. Mark G. McGovern Chief Technologist Smart Cards, Crypto, Stego, PKI Lockheed Martin

Lecture 9. Authentication & Key Distribution

Distributed Systems. Lecture 14: Security. Distributed Systems 1

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

Distributed Systems. Lecture 14: Security. 5 March,

Authentication CS 136 Computer Security Peter Reiher January 22, 2008

Overview of Authentication Systems

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 13

CIS 6930/4930 Computer and Network Security. Final exam review

Syllabus: The syllabus is broadly structured as follows:

In this unit we are continuing our discussion of IT security measures.

Secure hashing, authen/ca/on

Authentication. Steven M. Bellovin January 31,

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Integrated Access Management Solutions. Access Televentures

Introduction and Overview. Why CSCI 454/554?

Computer Security 4/12/19

Unit-VI. User Authentication Mechanisms.

CS 161 Computer Security

(2½ hours) Total Marks: 75

Authentication. Steven M. Bellovin September 26,

Authentication Handshakes

Access Controls. CISSP Guide to Security Essentials Chapter 2

Operating Systems Security: User Authentication

Security: Focus of Control. Authentication

MODULE NO.28: Password Cracking

Overview. Terminology. Password Storage

Software Vulnerability Assessment & Secure Storage

Authentication systems. Authentication methodologies. User authentication. Authentication systems (auth - april 2011)

Security and Authentication

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Security: Focus of Control

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Transcription:

AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun

Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to prove his/her identity to another entity (e.g., a system, a device). Message authentication Verify that a message has not been altered without proper authorization. A related concept identification 2

Identification Identification is a process through which one ascertains the identity of another person or entity. Authentication and identification are different. Identification requires that the verifier check the information presented against all the entities it knows about, Authentication requires that the information be checked for a single, previously identified, entity. Identification must, by definition, uniquely identify a given entity, Authentication does not necessarily require uniqueness. 3

Authentication Mechanisms Password-based authentication Use a secret quantity (the password) that the prover states to prove he/she knows it. Threat: password guessing/dictionary attack Alice I m Alice, the password is fiddlesticks Computer System 4

Authentication Mechanisms (Cont d) Address-based authentication Assume the identity of the source can be inferred based on the network address from which packets arrive. Adopted early in UNIX and VMS Berkeley rtools (rsh, rlogin, etc) /etc/hosts.equiv file List of computers Per user.rhosts file List of <computer, account> Threat Spoof of network address Not authentication of source addresses 5

Authentication Mechanisms (Cont d) Cryptographic authentication protocols Basic idea: A prover proves some information by performing a cryptographic operation on a quantity that the verifier supplies. Usually reduced to the knowledge of a secret value A symmetric key The private key of a public/private key pair 6

AIT 682: Network and Systems Security Topic 6.1 User Authentication

Authentication and Identity What is identity? which characteristics uniquely identifies a person? do we care if identity is unique? Authentication: verify a user s identity a supplicant wishes to authenticate a verifier performs the authentication What s relationship of identity to role, or job function? 8

User Authentication Can Be Based On 1. What the user knows passwords, personal informa7on, a key, a credit card number, etc. 2. What the user is Physical characteris7cs: fingerprints, voiceprint, signature dynamics, iris paaern, DNA, etc. 3. What the user has in their possession smart card, (physical) key, smartphone, USB token 4. Where the user is or can be reached email address, IP address, 5. Who the user knows? Which of the above is best? Best in what way? 9

Crypto-Based Authentication Basic idea: user performs a requested cryptographic operation on a value (a challenge) that the verifier supplies Usually based on knowledge of a key (secret key or private key) Examples: RSA, zero knowledge proofs, We ll look at such protocols in more detail next time 10

Address-Based User Authentication Associates identity with network address or email address used by many web services Several early OS functions and tools worked this way Benefits? Problems? 11

Password Authentication

Password-Based User Authentication User demonstrates knowledge of a secret value to authenticate most common method of user authentication response challenge Threats to password-based authentication? 13

Some Issues for Password Systems A password should be easy to remember but hard to guess that s difficult to achieve! Some questions what makes a good password? where is the password stored, and in what form? how is knowledge of the password verified? 14

Password Storage Storing unencrypted passwords in a file is high risk compromising the file system compromises all the stored passwords Better idea: use the password to compute a one-way function (e.g., a hash, an encryption), and store the output of the one-way function When user inputs the requested password 1. compute its one-way function 2. compare with the stored value 15

Attacks on Passwords Suppose passwords could be up to 9 characters long This would produce 10 18 possible passwords; 320,000 years to try them all at 10 million a second! Unfortunately, not all passwords are equally likely to be used 16

Example of a Study In a sample of over 3000 passwords: 500 were easily guessed versions of dictionary words or first name / last name 86% of passwords were easily guessed Length in characters 1 2 3 4 5 6 Number of passwords 15 72 464 477 706 605 (lower case only) 17

Pet names Common Password Choices Common names Common words Dates Variations of above (backwards, append a few digits, etc.) 18

Dictionary Attacks Attack 1 (online): Create a dictionary of common words and names and their simple transformations Use these to guess the password Eagle Wine Rose Eagle Yes! Dictionary 19

Dictionary Attacks (Cont d) Attack 2 (offline): Usually F is public and so is the password file In Unix, F is crypt, and the password file is /etc/passwd. Compute F(word) for each word in the dictionary A match gives the password Eagle Wine Rose Dictionary F(Eagle)=XkPT TdWx% XkPT KYEN Password file 20

Dictionary Attacks (Cont d) Attack 3 (offline): To speed up search, pre-compute F(dictionary) A simple look up gives the password Eagle Wine Rose F XkPT %$DVC #AED! Look up TdWx% XkPT KYEN Dictionary Pre-computed Dictionary Password file 21

Password Salt To make the dictionary attack a bit more difficult Salt is a n-bit number between 0 and 2 n Derived from, for example, the system clock and the process identifier 22

Password Salt (Cont d) Storing the passwords Password + Salt F F(Password + Salt) Password file Username, Salt, F(Password + Salt) 23

Password Salt (Cont d) Verifying the passwords Password + Salt F Fetch Salt according to username F(Password + Salt) Compare Password file Username, Salt, F(Password + Salt) 24

Attack 1? Without Salt With Salt Does Password Salt Help? Eagle Wine Rose A word Yes/No Dictionary 25

Attack 2? Without Salt With Salt Does Password Salt Help? Eagle Wine Rose Dictionary F TdWx% XkPT KYEN Password file 26

Attack 3? Does Password Salt Help? Without Salt With Salt (or change periodically?) Eagle Wine F %$DVC XkPT Look up TdWx% XkPT Y Rose #AED! KYEN Dictionary Pre-computed Dictionary Password file 27

Example: Unix Passwords Keyed password hashes are stored, with two-character (16 bit) salt prepended password file is publicly readable Users with identical passwords but different salt values will have different hash values 28

Password Guidelines For Users 1. Initial passwords are system-generated, have to be changed by user on first login 2. User must change passwords periodically 3. Passwords vulnerable to a dictionary attack are rejected 4. User should not use same password on multiple sites 5. Be careful to choose the security problems and answers to recover your password 6. Etc. 29

Technical Other Password Attacks eavesdropping on traffic that may contain unencrypted passwords (especially keystroke logging) Trojan horse password entry programs man-in-the-middle network attack Social careless password handling or sharing phishing 30

The S/Key Protocol

Using Disposable Passwords Simple idea: generate a long list of passwords, use each only one time attacker gains little/no advantage by eavesdropping on password protocol, or cracking one password Disadvantages storage overhead users would have to memorize lots of passwords! Alternative: the S/Key protocol based on use of one-way (e.g. hash) function 32

S/Key Password Generation 1. Alice selects a password x 2. Alice specifies n, the number of passwords to generate 3. Alice s computer then generates a sequence of passwords x 1 = H(x) x 2 = H(x 1 ) x n = H(x n-1 ) x x (Password) H H H H x1 x2 x3 x4 33

Generation (cont d) 4. Alice communicates (securely) to a server the last value in the sequence: x n Key feature: no one knowing x i can easily find an x i-1 such that H(x i-1 ) = x i only Alice possesses that information 34

Authentication Using S/Key Assuming server is in possession of x i Server i Alice x i-1 verifies H(x i-1 ) = x i Is dictionary attack still possible? 35

Limitations Value of n limits number of passwords need to periodically regenerate a new chain of passwords Does not authenticate server! Example attack: 1. real server sends i to fake server, which is masquerading as Alice 2. fake server sends i to Alice, who responds with x i-1 3. fake server then presents x i-1 to real server 36

Biometrics

Biometrics Relies upon physical characteristics of people to authenticate them Desired qualities 1. uniquely identifying 2. very difficult to forge / mimic 3. highly accurate, does not vary 4. easy to scan or collect 5. fast to measure / compare 6. inexpensive to implement Which of these are concerns for passwords? 38

Assessment Convenient for users (e.g., you always have your fingerprints, never have to remember them), but potentially troubling sacrifice of private information new wounds on your fingers no technique yet has all the desired properties 39

Example Biometric Technologies Signature / penmanship / typing style Fingerprints Palm geometry Retina scan Iris scan Face recognition Voice recognition 40

The Scorecard From One Study 41

Multifactor Authentication If one characteristic is pretty good, two or more characteristics should be better? Suppose true positive rate was AND of the two, and false positive rate was OR of the two TP = TP1 * TP2 FP = 1 - (1-FP1)*(1-FP2) Alternative: combine a biometric technique with passwords 42

Authentication Hardware (Tokens)

Tokens A token is a physical device that can be interfaced to the computer, and carries identifying information Types passive tokens just store information active tokens have processors and can perform cryptographic operations Examples cards with magnetic strips smart cards USB storage devices RFID tags 44

Design Issues for Tokens Cost Size Capabilities Robustness Resistance to tampering Usefulness if stolen / lost 45

An Example: Time Synchronized Tokens The token contains: internal clock display a secret key Token computes a one-way function of current time+key, and displays that this value changes about once per minute User reads this value and types it in to authenticate to the server requires that server and token time stays synchronized 46

One-time Password on Smartphone Integrate physical tokens into smartphone Requirements: Security Malicious mobile OS cannot compromise the keying material in the one-time password (OTP) generator It cannot read the OTP Reliability OTP works even if mobile OS crashes Trusted inputs (e.g., clock time) for the OTP generator Trusted display 47

TrustZone-based Solution ARM TrustZone Technology Two isolated execution environments Mobile OS cannot access the disk, memory, CPU states of the OTP generator. A secure clock for OTP generator A self-contained display and touchscreen. 48

Another Example: Alladin etoken API / standards Security Algorithms Power source LCD Data retention PKCS#11 v2.01, CAPI (Microsoft Crypto API), Siemens/Infineon APDU commands, PC/SC, X.509 v3 certificate storage, SSL v3, IPSec/IKE RSA 1024-bit / 2048-bit*, DES, 3DES, SHA1 Battery, 5 year lifetime 6 characters 10 years 49

Summary 1. Passwords are by far the most widely used form of authentication, despite numerous problems 2. Biometrics hold promise but are expensive, inconvenient, and compromise privacy 3. Two factor authentication is commonly used for higher security 4. One-time passwords (S/Key) are attractive, especially if combined with hardware 50