cs 356 – lecture 5 more user authenticationgersch/cs356/356lecture05.pdf · • exploiting...

44
CS 356 – Lecture 5 More User Authentication Fall 2013 Tuesday, September 10, 13

Upload: others

Post on 12-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

CS 356 – Lecture 5More User Authentication

Fall 2013

Tuesday, September 10, 13

Page 2: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

CyberSecurity in the News!(again)

2

Tuesday, September 10, 13

Page 3: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Review• Chapter 1: Basic Concepts and Terminology

– Integrity, Confidentiality, Availability, Authentication, and Accountability

– Types of threats: active vs. passive, insider/outsider– Lots of terminology and general concepts

• Chapter 2: Basic Cryptographic Tools – Symmetric key encryption and secure hashing– Public key cryptography– Random Numbers

• Chapter 3 – User Authentication– Passwords– Checking passwords and other user auth techniques

Tuesday, September 10, 13

Page 4: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Proactive Password Checking• Rule Enforcement Plus User Advice, e.g.

– 8+ chars, upper/lower/numeric/punctuation– may not suffice

• Password Cracker– time and space issues

• Markov Model– generates guessable passwords– hence reject any password it might generate

• Bloom Filter– use to build table based on dictionary using hashes– check desired password against this table

Tuesday, September 10, 13

Page 5: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Token Authentication(Something You Possess)

• Object user possesses to authenticate, e.g.– embossed card– magnetic stripe card– memory card– smartcard

Tuesday, September 10, 13

Page 6: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Types of Cards Used as Tokens

Tuesday, September 10, 13

Page 7: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 8: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Memory Cards

• can store but do not process data• the most common is the magnetic stripe card• can include an internal electronic memory• can be used alone for physical access

– hotel room– ATM

• provides significantly greater security when combined with a password or PIN

• drawbacks of memory cards include:– requires a special reader– loss of token– user dissatisfaction

Tuesday, September 10, 13

Page 9: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Smartcard physical characteristics:

include an embedded microprocessora smart token that looks like a bank card can look like calculators, keys, small portable objects

interface:manual interfaces include a keypad and display for interactionelectronic interfaces communicate with a compatible reader/

writer

authentication protocol: classified into three categories: static, dynamic password

generator and challenge-response

Tuesday, September 10, 13

Page 10: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 11: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Communication Initialization

between a Smart Card and a

Reader

•Figure 3.4 Communication Initialization• between a Smart Card and a Reader•Source: Based on [TUNS06].

Tuesday, September 10, 13

Page 12: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Biometric Authentication• attempts to authenticate an individual based on

unique physical characteristics• based on pattern recognition• is technically complex and expensive when

compared to passwords and tokens• physical characteristics used include:

• facial characteristics• fingerprints• hand geometry• retinal pattern • iris • signature • voice

Tuesday, September 10, 13

Page 13: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Biometric Authentication(something you are or do)

• Authenticate User Based On One Of Their Physical Characteristics

Tuesday, September 10, 13

Page 14: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Common Biometrics

•Fingerprint •Face•Iris

•Signature •Voice PrintTuesday, September 10, 13

Page 15: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Uncommon Biometrics

•DNA •Gait

•Ear•Retina

Tuesday, September 10, 13

Page 16: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Fingerprints

• Analysis based on discrete features – Crossover– Island– Etc.

• Discrimination power based on combinatorics– More matches, more

confidence

Tuesday, September 10, 13

Page 17: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Fingerprints (II)• Oldest biometric technology

– Trained experts / court-approved– Automatic data base retrieval

• Advantages– Reliable, unique (even identical twins)– Inexpensive scanners– Cooperative subjects good fingerprints– Non-cooperative subjects latent prints

• Disadvantages– 5% of world population has no usable fingerprints– Mask-able (gloves / abrasion)– Can be faked

Tuesday, September 10, 13

Page 18: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 19: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Iris Analysis based on

discrete features Polar striations Also neoplasms, etc.

Discrimination power based on combinatorics Similar to fingerprints

Infra-red lighting

Otherwise dark-eyed people can’t be matched

Tuesday, September 10, 13

Page 20: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Iris

• New biometric technology• Advantages

– Reliable /unique (even identical twins)– Relatively inexpensive scanners

• Disadvantages– No human experts (hard to audit)– Cooperative subjects with active sensors

only– Behavior over time is unclear

Tuesday, September 10, 13

Page 21: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 22: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Face

•Fiducial Points •Eigenvectors

Tuesday, September 10, 13

Page 23: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Face

• Newest technology / least mature• Advantages

– Most people are experts– Inexpensive sensors– Cooperative subjects fairly reliable

(99%)• Disadvantages

– Non-cooperative subjects less reliable– Operates at a distance

Tuesday, September 10, 13

Page 24: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 25: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 26: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Other Biometrics• DNA

– Slow, costly– Ultra-reliable

• Retina– Reliable– Too burdensome, even for cooperative subjects

• Gait – Supports recognition from a distance– Currently unreliable

• Ear– Supports recognition from the side– Currently unreliable

Tuesday, September 10, 13

Page 27: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Tuesday, September 10, 13

Page 28: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Uses of Biometrics

• Forensics (post-hoc identity)– Non-cooperative subjects– Latent / accidental data– Identity search

• Verification (security)– Cooperative subjects – Verify/reject a single identity

• Intelligence / Surveillance– Non-cooperative subjects– Biometrics at a distance– Watch list

Tuesday, September 10, 13

Page 29: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Fearless Predictions• Currently…

1.Forensics: Fingerprints, DNA2.Security: Fingerprint, Signature, Iris, 2D

Face3.Intelligence: Human face recognition

• In the near future….– Forensics : DNA, Fingerprints, Face– High-end Security: Iris, 3D Face– Low-end security: Fingerprint, 2D Face– Intelligence: Face, gate, ear…

Tuesday, September 10, 13

Page 30: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Operation of a Biometric

System

Tuesday, September 10, 13

Page 31: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Biometric Accuracy

• Never Get Identical Templates• Problems Of False Match/False Non-Match

Tuesday, September 10, 13

Page 32: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Biometric Accuracy• Can Plot Characteristic Curve• Pick Threshold Balancing Error Rates

Tuesday, September 10, 13

Page 33: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Remote User Authentication• Authentication Over Network More Complex

– problems of eavesdropping, replay• Generally Use Challenge-Response

– User Sends Identity– Host Responds With Random Number

(nonce challenge)– User Computes f(r,h(P)) and Sends Back– Host Compares Value From User With Own

Computed Value, • If match user authenticated

• Protects Against A Number of Attacks

Tuesday, September 10, 13

Page 34: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Remote User Authentication• authentication over a network, the Internet,

or a communications link is more complex– additional security threats such as:

– eavesdropping, capturing a password, replaying an authentication sequence that has been observed

• generally rely on some form of a challenge-response protocol to counter threats

Tuesday, September 10, 13

Page 35: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Authentication Security Issues• Client Attacks• Host Attacks• Eavesdropping• Replay• Trojan Horse• Denial-Of-Service

Tuesday, September 10, 13

Page 36: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Password Protocol

• Example of a • challenge-response

protocol

user transmits identity to remote host

host generates a random number (nonce)

nonce is returned to the user host stores a hash code of the

password function in which the password

hash is one of the arguments use of a random number helps

defend against an adversary capturing the user’s transmission

Tuesday, September 10, 13

Page 37: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Token Protocol

• Example of a • token protocol

user transmits identity to the remote host

host returns a random number and identifiers

token either stores a static passcode or generates a one-time random passcode

user activates passcode by entering a password

password is shared between the user and token and does not involve the remote host

Tuesday, September 10, 13

Page 38: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Static Biometric Protocol

• Example of a • static biometric

protocol

user transmits an ID to the host

host responds with a random number and the identifier for an encryption

client system controls biometric device on user side

host decrypts incoming message and compares these to locally stored values

host provides authentication by comparing the incoming device ID to a list of registered devices at the host database

Tuesday, September 10, 13

Page 39: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Dynamic Biometric Protocol

• Example of a • dynamic biometric

protocol

host provides a random sequence and a random number as a challenge

sequence challenge is a sequence of numbers, characters, or words

user at client end must then vocalize, type, or write the sequence to generate a biometric signal

the client side encrypts the biometric signal and the random number

host decrypts message and generates a comparison

Tuesday, September 10, 13

Page 40: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Potential Attacks, Susceptible

Authenticators, and Typical Defenses

Tuesday, September 10, 13

Page 41: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Practical Application

:Iris

Biometric System

Tuesday, September 10, 13

Page 42: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Case Study: ATM

Security Problems

Tuesday, September 10, 13

Page 43: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

Summary• four means of authenticating a user’s

identity• something the individual knows• something the individual possesses• something the individual is• something the individual does

• vulnerability of passwords• offline dictionary attack• specific account attack• popular password attack• password guessing against single user• workstation hijacking• exploiting user mistakes• exploiting multiple password use• electronic monitoring

• hashed password and salt value• password file access control

password selection strategiesuser educationcomputer generated passwordsreactive password checkingproactive password checking

Bloom filtertoken based authentication

memory cardssmart cards

biometric authenticationremote user authentication

password protocoltoken protocolstatic biometric protocoldynamic biometric protocol

Tuesday, September 10, 13

Page 44: CS 356 – Lecture 5 More User Authenticationgersch/cs356/356lecture05.pdf · • exploiting multiple password use • electronic monitoring • hashed password and salt value •

What’s Next• Read Chapter 1, 2, and 3

– Chap 1: Focus on big picture and recurring concepts– Chap 2: Identify cryptographic tools and properties– Chap 3: How can you authenticate a user?

• Homework Posted on Course Website – Due Tuesday

• Next Lecture Topics from Chapter 4– Access Control

Tuesday, September 10, 13