CH 03
CH 03
CH 03
SECURITY: • PROFESSOR
DARWIN VARGAS
PRINCIPLE
S AND
PRACTICE
CHAPTER 3
OVERVIEW
Electronic user
authentication principles
Password-based
authentication
Token-based authentication
Biometric authentication
Remote user authentication
Security issues for user
authentication
Practical application: an iris
biometric system
Case stury: security
problems for ATM systems
LEARNING OBJECTIVES
NIST SP 800-63-2 defines EUA as: the process of establishing confidence in user
identity that are electronically presented
The NIST SP 800-63-2 model
User applies to registration authority (RA) and becomes a subscriber of a
credential service provider (CSP)
RA is a trusted entity
The CSP exchanges with the subscriber
The credential (a data structure) binds an identity to a token possessed by the
subscriber
Claimant: the party to be authenticated
Verifier: the party verifying
The verifier passes an assertion about the subscriber to the relaying party (PR)
A MODEL FOR ELECTRONIC USER
AUTHENTICATION
MEANS OF USER
AUTHENTICATION
Assurance level: the degree of certainty that a user has presented a credential
that refers to his/her identity
Level 1: little confidence (an online forum)
Level 2: some confidence (professional organizations)
Level 3: High confidence (patent office applicants)
Level 4:Very high confidence (employees accessing restricted/sensitive services)
Potential impact: low, moderate, impact
Assurance Level Impact Profiles
Mod/
Personal safety None None Low
High
It is worthwhile to
study/research
password and
password
vulnerabilities
Most common
Still the most
efficient
USE OF
HASHED
PASSWORDS
WHY A SALT VALUE?
Original scheme
8 character password form 56-bit key
12-bit salt used to modify DES encryption into a one-
way hash function
output translated to 11 character sequence
Now regarded as woefully insecure
e.g. supercomputer, 50 million tests, 80 min
Sometimes still used for compatibility
IMPROVED IMPLEMENTATIONS
Dictionary attacks
try each word then obvious variants in large dictionary
against hash in password file
Rainbow table attacks
a large dict of possible passwords
for each password:
precompute tables of hash values for all salts
a mammoth table of hash values: e.g. 1.4GB table cracks
99.9% of alphanumeric Windows passwords in 13.8 secs
An analysis of passwords
used by 25,000 students
Over 10% recovered
after 10^10 guesses
PASSWORD FILE ACCESS
CONTROL
Verification is analogous to
user login via a smart card
and a PIN
Host attacks: attacker attacks the host where passwords/passcodes are stored
Countermeasure: hashing, protect password databases
AUTHENTICATION SECURITY
ISSUES
eavesdropping
replay
trojan horse
AUTHENTICATION SECURITY
ISSUES