Chapter 3 - User Authentication
Chapter 3 - User Authentication
Chapter 3 - User Authentication
User Authentication
2
Chapter 3 Overview
Learning Objectives
User Authentication
Potential
impact
Areas of
risk
Assurance Level
More Four levels
Describes an
organization’s
specifically is of
defined as: assurance
degree of
certainty that Level 1
a user has The degree of
• Little or no confidence in the
asserted identity's validity
or her identity
Level 3
• High confidence in the
asserted identity's validity
The degree of
confidence that the
individual who uses the
credential is the
individual to whom the Level 4
credential was issued • Very high confidence in the
asserted identity’s validity
Potential Impact
• FIPS 199 defines three levels of potential
impact on organizations or individuals should
there be a breach of security:
Low
• An authentication error could be expected to have a
limited adverse effect on organizational operations,
organizational assets, or individuals
Moderate
• An authentication error could be expected to have a
serious adverse effectأثر س لبي
High
• An authentication error could be expected to have a
severe or catastrophic adverse effect
13
Risk Assessment For User
Authentication
Mod/
Personal safety None None Low
High
Password Authentication
Password Vulnerabilities
• It is worthwhile to study/research
password and password vulnerabilities
Most common
Still the most efficient
18
UNIX Implementation
• Original scheme
8 character password form 56-bit key
12-bit salt used to modify DES en-
cryption into a one-way hash func-
tion
output translated to 11 character se-
quence
• Now regarded as woefully insecure
e.g. supercomputer, 50 million tests,
80 min
• Sometimes still used for compati-
bility
21
Improved Implementations
Password Cracking
• Dictionary attacks
try each word then obvious variants in large
dictionary against hash in password file
• Rainbow table attacks
a large dictionary of possible passwords
for each password:
• precompute tables of hash values for all salts
• a mammoth table of hash values: e.g. 1.4GB ta-
ble cracks 99.9% of alphanumeric Windows
passwords in 13.8 secs
not feasible if larger salt values used
23
Password Choices/Concerns
Token-based Authentication
Memory Card
Smartcard
• credit-card like
• has own processor, memory, I/O ports
ROM, EEPROM, RAM memory
• executes protocol to authenticate with reader/computer
static: similar to memory cards
dynamic: passwords created every minute;
entered manually by user or electronically
challenge-response: computer creates a ran-
dom number; smart card provides its hash
(similar to PK)
• also have USB dongles
31
Biometric Authentication
Operation of a
biometric
system
Verification is analogous to
user login via a smart card
and a PIN
Biometric Accuracy
Biometric Accuracy
• Similar approach
for token and
biometric
verification
39
Practical Application
46
Summary