User Authentication i
User Authentication i
User Authentication 2
Authentication & Access Control
according to Wikipedia
• Authentication is the act of establishing or confirming
something (or someone) as authentic,
– that is, that claims made by or about the subject are true. This
might involve confirming the identity of a person, tracing the
origins of an artifact, ensuring that a product is what its
packaging and labeling claims to be, or assuring that a computer
program is a trusted one.
User Authentication 3
User Authentication
User Authentication 4
Variants of Passwords
• Password
• Passcode
• Personal identification number (PIN)
User Authentication 5
Scenarios Requiring User
Authentication
• Scenarios Client
– Logging into a local computer
– Logging into a computer remotely
– Logging into a network
Password
– Access web sites
User Authentication 6
Threats to Passwords
User Authentication 7
Guessing Attacks: Two Factors for
Password Strength
• The average number of guesses the attacker must make
to find the correct password
– determined by how unpredictable the password is, including how
long the password is, what set of symbols it is drawn from, and
how it is created.
User Authentication 8
Example of Weak Passwords (from
Wikipedia)
• Default passwords (as supplied by the system vendor and
meant to be changed at installation time): password,
default, admin, guest, etc.
• Dictionary words: chameleon, RedSox, sandbags,
bunnyhop!, IntenseCrabtree, etc.
• Words with numbers appended: password1, deer2000,
john1234, etc.,
• Words with simple obfuscation: p@ssw0rd, l33th4x0r,
g0ldf1sh, etc.
• Doubled words: crabcrab, stopstop, treetree, passpass,
etc., can be easily tested automatically.
User Authentication 9
Example of Weak Passwords (from
Wikipedia)
• Common sequences from a keyboard row: qwerty, 12345,
asdfgh, fred, etc.
• Numeric sequences based on well known numbers such as
911, 314159, or 27182, etc.,
• Identifiers: jsmith123, 1/1/1970, 555–1234, "your username",
etc.,
• Anything personally related to an individual: license plate
number, Social Security number, current or past telephone
number, student ID, address, birthday, sports team, relative's or
pet's names/nicknames/birthdays, etc.,
– can easily be tested automatically after a simple investigation of
person's details.
User Authentication 10
Mechanisms to Avoid Weak Passwords
User Authentication 11
Mechanisms to Defend Against
Dictionary and Guessing Attacks
• Protect stored passwords (use both cryptography
& access control)
User Authentication 12
Spoofing & Defenses on the Web
• Phishing attacks
– attempting to acquire sensitive information such as usernames,
passwords and credit card details by masquerading as a trustworthy entity
in electronic communication.
• Website forgery
– Set up fake websites that look like e-commerce sites and trick users into
visiting the sites and entering sensitive info
• Defense methods
– Browser filtering of known phishing sites
– Cryptographic authentication of servers (will talk about in future)
– User-configured authentication of servers
• Ensures that the site is the one the human user has in mind
• E.g., site key, pre-selected picture/phrases
User Authentication 13
KeyLogging
User Authentication 14
Using Passwords Over Insecure
Channels
• One-time passwords
– Each password is used only once
– Defend against passive adversaries who eavesdrop and
later attempt to impersonate
• Challenge response
– Send a response related to both the password and a
challenge
• Zero knowledge proof of knowledge
– Prove knowledge of a secret value, without leaking any
info about the secret
User Authentication 15