Week 10-User Authentication
Week 10-User Authentication
USER
AUTHENTICATION
CONTENT
• USER AUTHENTICATION
• MEANS OF USER AUTHENTICATION
• PASSWORD AUTHENTICATION
• PASSWORD VULNERABILITIES
• USE OF HASHED PASSWORDS – IN UNIX
• PASSWORD CRACKING TECHNIQUES
• USING BETTER PASSWORDS
• TOKEN AUTHENTICATION
• BIOMETRIC AUTHENTICATION
USER AUTHENTICATION
1. USER AUTHENTICATION
USER AUTHENTICATION 3
2. MEANS OF USER AUTHENTICATION
• Four general means of authenticating a user's identity are based on
something:
USER AUTHENTICATION 5
4. PASSWORD VULNERABILITIES
Offline Password
guessing Workstation Eectronic
dictionary against hijacking monitoring
attack single user
Exploiting
Specific Popular Exploiting
multiple
password user
password
account attack mistakes
use
attack
USER AUTHENTICATION 6
Following are the attack strategies:
USER AUTHENTICATION 9
• A widely used password security technique.
• Use of hashed passwords and a salt value.
• Found on all UNIX and other operating systems.
1. Loading a new password:
• The user selects or is assigned a password.
• Password combined with a fixed-length salt value.
• Salt is a pseudorandom or random number.
• PW & salt serve as inputs to a hashing algorithm to produce a fixed-length
hash code.
• Hashed password then stored, together with a plaintext copy of the salt, in
the password file for the corresponding user ID.
2. Verifying a password:
• When a user attempts to log on to a system,
the user provides an ID and a password.
• OS uses the ID to retrieve the plaintext salt and
the encrypted password.
• The salt and user-supplied password are used as
input to the encryption routine.
• If the result matches the storedAvalueI,the password is accepted. 10
UNIX Implementation
original scheme
8 character password form 56-bit key
12-bit salt used to modify DES encryption into a one-way hash function
0 value repeatedly encrypted 25 times
output translated to 11 character sequence
now regarded as woefully insecure
e.g. supercomputer, 50 million tests, 80 min
sometimes still used for compatibility
Improved Implementations
Dictionary attacks
• Develop a large dictionary of possible passwords and try
each against the password file
• Each password must be hashed using each salt value and
then compared to stored hash values
USER AUTHENTICATION
7. USING BETTER PASSWORDS
• Clearly have problems with passwords
• Goal to eliminate guessable passwords
• At the same time, easy for user to remember
• Four basic techniques:
1. User education
2. Computer-generated passwords
3. Reactive password checking
4. Proactive password checking
1. User education:
• Users can be told the importance of using hard-to-guess passwords.
• Provide users with guidelines for selecting strong passwords.
• Can be problematic when have a large user population.
• Because many users will simply ignore the guidelines.
USER AUTHENTICATION 12
2. Computer-generated passwords:
• Poor acceptance by users.
• Random in nature, users will not remember.
USER AUTHENTICATION 14
8.1 MEMORY CARD / MAGNETIC STRIPS
• Store but do not process data
• Magnetic stripe card, e.g. bank card
• Electronic memory card
• Used alone for physical access
• With password/PIN for computer use
• Drawbacks of memory cards include:
– Need special reader
– Loss of token issues
– User dissatisfaction
USER AUTHENTICATION 15
8.2 SMARTCARD / EMBOSED
• Credit-Card like
• Has own processor, memory, I/O ports
– Wired or wireless access by reader
– May have crypto co-processor
– ROM, EEPROM, RAM memory
• Executes protocol to authenticate with reader/
• Also have USB dongles computer
USER AUTHENTICATION 16
9. BIOMETRIC
AUTHENTICATION
• Authenticate user based on one of their physical
characteristics
• Biometric authentication system authenticates an
individual based on unique
• Physical characteristics like Fingerprints, hand
geometry, facial characteristics, and retinal and iris
patterns.
• Dynamic characteristics like voiceprint and
signature.
17
USER AUTHENTICATION
1. Facial characteristics:
Characteristics based on location and shape of key facial res,
featu such as eyes, eyebrows, nose, lips, and chin shape.
2. Fingerprints:
The pattern of ridges and furrows on the surface of the fingertip.
3. Hand geometry:
Identify features of hand,: e.g. shape, lengths & widths of
fingers.
4. Retinal pattern:
Formed by veins beneath the retinal surface is unique.
Uses digital image of the retinal pattern by projecting a
low- intensity beam of visual or infrared light into the eye.
5. Signature: Each individual has a unique style of
handwriting, especially in signature.
USER AUTHENTICATION 18
9.1 OPERATION OF A BIOMETRIC SYSTEM
USER AUTHENTICATION 19
Operation of a biometric system.
• Each users must first be enrolled in the system.
• For biometric system, the user presents a name and a password or
PIN.
• System senses some biometric characteristic of this user (e.g.
fingerprint of right index finger).
• The system digitizes the input and then extracts a set of features
that can be stored as a number or set of numbers.
• This set of numbers is referred to as the user’s template.
• User authentication on a biometric system involves either
verification or identification.
client attacks
host attacks
eavesdropping
replay
trojan horse
denial-of-service
Practical Application
Summary