0% found this document useful (0 votes)
30 views36 pages

Security Computing-4-Authentication

This document summarizes a lecture on authentication. It discusses concepts of authentication including passwords, biometrics, and electronic certificates. It describes different authentication factors like something you know (e.g. password), something you have (e.g. bank card), and something you are (e.g. fingerprint). Common authentication systems and methods like challenge-response, HTTP basic and digest authentication are explained. The document also covers password attacks and best practices for password security.

Uploaded by

mqarwa2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views36 pages

Security Computing-4-Authentication

This document summarizes a lecture on authentication. It discusses concepts of authentication including passwords, biometrics, and electronic certificates. It describes different authentication factors like something you know (e.g. password), something you have (e.g. bank card), and something you are (e.g. fingerprint). Common authentication systems and methods like challenge-response, HTTP basic and digest authentication are explained. The document also covers password attacks and best practices for password security.

Uploaded by

mqarwa2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Security in Computing &

Information Technology

Lecture 4
Authentication
Lecture Schedule
Foundations
1. Introduction
2. Security mechanisms, attack methods
Basic mechanisms
3. Elementary cryptography
4. Authentication
5. Access control
Major computing security areas
6. Operating systems
7. Databases
8. Networks
9. Web
10. Mobile computing
Applications
11. Social networks
SecComp Lecture 412. Internet banking 2
Lecture Topics

 Concept of authentication
 Passwords
 Biometrics
 Electronic certificates

SecComp Lecture 4 3
Identification
 Aim
 Establish the identity of
 a user
 a communicating peer (e.g. sender of an email)
 a process (who is running it)
 Problem
 Difficult to verify
 Physically not present
 Characteristics, attributes cannot be observed
 Even if established, may not be useful
 Solution: authentication
SecComp Lecture 4 4
Authentication
 Verifying that the user (peer, origin of document etc) is
who/what they claim to be
 Components
 User
 The person or process to be authenticated
 Server
 Authenticates the user for itself or for other services
 Can generate an authentication ticket as evidence to be
presented for obtaining services
 Forms
 Attribute verification
E.g. biometrics, passwords
 External affirmation
SecComp Lecture 4 E.g. certificates produced by authorities 5
Authentication Systems
 Requirement: protection against
 Impersonation of a user or a server
 Modification of data exchanged between user & server
 Replay of a previous authentication

 Basic example

Network Authentication
Network
Access Server
Server

Other hosts

SecComp Lecture 4 6
Mobile Phone Authentication
System Example

SecComp Lecture 4 7
Image source: Wangensteen, A.; Lunde, L.; Jorstad, I.; van Thanh, D.; A Generic Authentication System
Based on SIM,
Authentication Factors
 Main factors
 Proof by knowledge (something you know)
e.g. username & password
 Proof by possession (something you hold)
e.g. bank card
 Proof by property (who you are)
e.g. fingerprint
 Additional factors
Location (where you are)

 Activity (e.g. your signature)
 Multifactor authentication
More than one factor is needed
E.g. banking ATMs: possession (bankcard) + knowledge (PIN)
SecComp Lecture 4 8
Special Authentication Methods
 Mutual authentication
E.g.
 By communicating peers
 Server & user (in TLS/SSL)
 System & user
 Single sign-on (SSO, cascading authentication)
 Process: User is authenticated once, subsequent
authentications are re-using the result without user
interaction
 Method: Systems share the authentication
database or exchange security assertions

SecComp Lecture 4 9
Proof by Knowledge
Challenge-Response Methods
 Server presents a challenge to the user,
user answers the challenge
 If the answer is correct, the user is
authenticated
 Challenge types
Password
 Cryptographic methods
E.g. user has to encrypt or produce the hash of
the challenge

SecComp Lecture 4 10
Passwords
 Most commonly used authentication token
 Advantage: easy to replace if compromised
 Commonly exploited
 Method
 System stores password in hidden form
E.g. encrypted, or its hash value
 User enters password
 System computes the hidden form
 System compares the calculated value with the
stored one
 Match: authentication successful

 Error: authentication fails

SecComp Lecture 4 11
Password Transmission
 Some solutions forward the password in
plain form
 E.g. HTTP Basic, Telnet
 Reliable methods protect the password by
 forwarding a hash only: HTTP Digest
 encrypting the password: Kerberos
 encrypting the whole communication
channel: SSL/TLS/https, SSH

SecComp Lecture 4 12
HTTP Authentication

Basic authentication Digest authentication


Features Features
 Not secure  More secure
Password is Only the digest
forwarded in plain (hash) is forwarded
form (not  Supported by most (but
encrypted) not all) browsers
 No logout – the browser
needs to ‘forget’ the
information
SecComp Lecture 4 13
HTTP Authentication (Apache)
 Basic authentication
 Create a password file
htpasswd -c my_dir/passwords user1
 Configuration file: .htaccess
AuthType Basic
AuthName “Display this message”
AuthUserFile my_dir/passwords
Require user user1 user2

 Digest authentication
 Create a password file
htdigest -c my_dir/passwords user1
 Configuration file: .htaccess
AuthType Digest
AuthName "Private"
AuthDigestFile my_dir/passwords
SecComp Lecture 4
Require user user2 user3 14
Password Attacks
 Password spoofing (phishing)
 Screen imitates a real input page to collect
authentication information
 Key logging
 Compromising the password file
 Adding or modifying entries in the password file

 Password guessing
 Intuitively
 Date-of-birth, friend’s name …
 Dictionary attack: test every word of a dictionary
The attacker needs the password hiding algorithm (encryption
key, hash)
SecComp Lecture 4
 Exhaustive search (brute force) 15
Password Protection Methods
 Password strength
 Should
 be hard to guess

 be long

 mix upper, lower case letters, numbers and non-


alphanumerical symbols
 Password ageing
 Passwords should be regularly updated
 Password generation
 Sounds good, but generated passwords are hard to
remember
 Protective measures against attacks
 Exponential backoff: increasing waiting time after every
failed attempt
 Blacklisting: locking the account after a certain number
of consecutive incorrect guesses
SecComp Lecture 4 Reverse Turing test: asking the user to perform a task 16

only a human can do (tell humans and computers apart)


Password Management
Do
 Sending passwords to users should be done via secure
channels
 Use different channels (e.g. phone, SMS) to activate an
account/password
 Use one-time passwords that the user has to update at first
login
 Identify the user before communicating password (e.g. call
back an authorised phone number)
 Re-setting passwords also needs care
Although users are less likely to tolerate delays
Don’t do
 Difficult passwords are written down, or replaced with easy
ones
 Some very common passwords: 123456, Password, abc123
SecComp Lecture 4 17
Password Reset
 People forget passwords (esp. difficult
ones)
 Systems usually offer a challenge question
to avoid cumbersome procedures for
password reset
 Problems
 Typical system questions are limited
Make of your first car, name of your pet etc
 Answers can be guessed
Ford/Holden, most popular pet names available
online…
 People lie to improve security – then forget
SecComp Lecture 4 18
Password Crackers
 Numerous tools are available
 Cain and Abel (Windows)
 John the Ripper (Unix)
 Airsnort (Wireless networks)
 Some are free, others are commercial “password
recovery tools/services”
 Difficulties
 Passwords are usually encrypted with one-way
functions (hard to reverse)
Solution: Crackers encrypt the guess and compare
the result
 Doesn’t work with one-time passwords

SecComp Lecture 4 19
One-Time Passwords (OTP)
 Valid for a single session or transaction
Re-playing attacks do not work
 Delivery method
 Via different channel
E.g. using a separate device, printed on paper, etc
 Generating methods
 Time-synchronised
 A piece of hardware (‘token’) generates the

password
 Difficulties

 The token needs an accurate clock synchronised with the


server’s clock
SecComp Lecture 4  The algorithm must tolerate limited clock drift 20
One-Time Passwords (Continued)
 Generating methods (cont)
 Mathematical algorithms
 Each password is generated from the previous one
by calculating the hash (MD5 etc) of the previous
one
X1 = H (S)
X2 = H (X1) = H (H (S)) Calculate Use

Xi = H (Xi-1)
 Passwords are used one at a time, working backward
through the list
 An eavesdropper can learn Xi and consequently all
subsequent (already used) passwords, but cannot
guess the previous one in the list due to one-way
SecComp Lecture 4 hashing 21
Proof by Possession
 User has a token to prove authenticity
 Bankcard
 Most common, used in everyday banking
 USB memory key
 Software can turn an ordinary memory
stick to a key
 Subscriber identification module (SIM
card)
 Essential part of GSM mobile phones
 Specific hardware: SecurID
SecComp Lecture 4
 Client & server clocks need to be 22
synchronised
Proof by Property
 Problems
 Can be used for authenticating human users
only
 Has to be
 easy to measure: e.g. hand / eye properties
 acceptable in form: non-intrusive
 Biometrics
 Physiological (Face, fingerprint, hand, eye –
retina print) commercially available
 Behavioural (Signature, voice, keystroke
dynamics) used mainly as an additional
SecComp Lecture 4 authentication factor 23
Biometrics
 Measure physical characteristics and evaluate them
against a stored pattern (verification or
identification)
 Advantage
 Hard to forget
 Problems
 Live tissue verification
 Cannot be cancelled/replaced if data is compromised
 Expensive equipment
 Reliability
 False positive: accepting an unauthorised user
 False negative: rejecting a legitimate user

SecComp Lecture 4 24
Biometrics: Methods
 Major types
 Fingerprints
 Well developed technology, widely used

 Can be used in clean environment only

 Hand anatomy
 Less frequently used

 Iris pattern
 Does not change in a lifetime

 Measurement can be difficult

 Face
 E.g. e-passports

SecComp Lecture 4 25
Fingerprints
 Has been used for more than a century
Forensic, government and civilian applications

 Sensing
 Live scan
 Traces
 Processing
 Feature extraction
3-step process: macrodetails, minutiae, dimensional attributes
Matching

 Problems
 Low-quality images
Dirt, skin texture (mutilations)
 Distortions (non-linear)
Pushing a finger against a surface
 Connotations
SecComp Lecture 4
Police / crime
26
Hand Anatomy & Related Methods
 Static methods
 Veins in the hand
 Method: Non-intrusive (uses infrared light)
 Tolerates dirty hands
 Hand geometry
 Method: Length, width, thickness and curvature of hand &
fingers
 Reliability
 Less distinctive than fingerprint
 Hands may change due to injury, weight, arthritis etc
 Dynamic methods
 Handwriting
 Method: captures writing dynamics
 Reliability: Affected by injury, fatigue, temperature,
medical conditions
 Keystroke analysis
 Method: Typing speed, time a key is held down
SecComp Lecture 4
 Reliability: Not known (new method) 27
Iris Recognition

 Iris
In the eye in front of the lens, controls pupil size

 Its textural complexity and variation across people
postulates its uniqueness to individuals
 Iris recognition
 Based on pattern matching
Steps: acquisition, segmentation (isolating from the environment),
normalisation, feature extraction (encoding), matching
 Challenges
 Acquisition: unfavourable lighting, large/variable distances,
moving subjects result in poor contrast and blurred images
 Segmentation: localise the iris position (head rotation, camera
angle etc)
 Matching: no effective theoretical model to quantify
individuality
SecComp Lecture 4 28
Face Recognition
 Motivation
Basic method for identification by humans
 Approaches
 Still face recognition
 Principal component analysis, linear discriminant analysis,
elastic graph matching
 Video recognition
 Temporal characteristics of facial motion, appearance
changes
 Often utilises images from multiple cameras
 Problems
 Disguises
 Illumination, facial expressions, natural aging

SecComp Lecture 4 29
Certificates
 Documents stating the authenticity of a
subject, product, item, art work etc
 Contain detailed information about the
subject etc
 Issued by trustworthy authorities who are
reputable themselves
 Come in different forms
Labels, stickers (e.g Microsoft), electronic
certificate
 Legally binding forms are very expensive
(need thorough verification)
SecComp Lecture 4 30
Electronic Certificates
 Electronic document to prove an identity or right to access
certain resources
 Digitally signed document binding a subject to some
information
 Name certificates
 Attribute certificates (access identity, charging
identity, role, clearance…)
 Cryptographic methods (public key encryption) are used to
 identify
 the issuer
 the subject
protect the content

 Issuer should be a Certificate Authority (CA) who
 is reliable and trustworthy
 verifies the content of a certificate
SecComp Lecture 4 31
X.509 Certificates
 The most widely used certificate type
 Structure
Version Version 1
Serial number 1988
Signature algorithm ID
Issuer name
Validity period
Subject name
Subject public key info
Issuer unique ID Version 2
Subject unique ID 1993
Extensions Version 3
Subject and issuer attributes
Key usage and policies 1996
Certification path constraints
SecComp Lecture 4 32
Public Key Infrastructure
 Certificate Authority (CA)
Trustworthy (checks the subject’s details)

 Has high availability
 Certificate chain
 A CA delegates the right of signing certain type of
certificates
 The delegate can do the same

delegates delegates
CA CA CA

 Root certificate
A self-signed certificate

 Issued by a universally trusted authority for itself
 Certificate revocation list (CRL)
List of invalid certificates
SecComp Lecture 4 33
Hierarchical Trust

Root certificate

Issuing CA certificate

User certificate

SecComp Lecture 4 34
Image source: http://www.pgpi.org/doc/pgpintro/
Pretty Good Privacy (PGP)
 Uses certificates for credentials
 A certificate can have more than one
signer
 Web of trust
 There is no root certificate
 Users start with a self-signed certificate
 Users validate each other’s certificate
(including the public key)

SecComp Lecture 4 35
Summary
 Proof-by-knowledge is the most frequently
used way of authentication
 Passwords are the typical form
 Elaborated methods exist for attack and
protection
 Biometrics is more reliable and also more
complex/expensive
 Electronic certificates are the basis of a
secure computing infrastructure

SecComp Lecture 4 36

You might also like