1. Trang chủ
  2. » Công Nghệ Thông Tin

Computer security principles and practice 3rd by williams stallings and brown ch03

44 214 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 44
Dung lượng 12,87 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The four means of authenticating user identity are based on: The four means of authenticating user identity are based on: • Smartcard, electronic keycard, physical key Something the in

Trang 2

Chapter 3

User Authentication

Trang 3

RFC 4949

RFC 4949 defines user authentication as:

“The process of verifying an identity claimed

by or for a system entity.”

Trang 4

Presenting or generating authentication information that corroborates the binding between the entity and the identifier

Trang 5

Figure 3.1 The NIST SP 800-63-2 E-Authentication Architectural Model

Identity Proofing User Registration

To ke

n, Cr

ed en tia l

Re gis tra tio n/I ssu

an ce

Authenticated Session

Au the ntic ated Pro toco l

Exc han ge

Authenticated Assertion

Registration Confirmation

Token/Credential Validation

Relying Party (RP)

Trang 6

The four means of authenticating

user identity are based on:

The four means of authenticating

user identity are based on:

• Smartcard, electronic keycard, physical key

Something

the individual possesses (token)

• Smartcard, electronic keycard, physical key

Something

the individual is (static biometrics)

• Fingerprint, retina, face

Something

the individual is (static biometrics)

• Fingerprint, retina, face

Something

the individual does (dynamic biometrics)

• Voice pattern, handwriting, typing rhythm

Something

the individual does (dynamic biometrics)

• Voice pattern, handwriting, typing rhythm

Trang 7

Risk Assessment for User Authentication

Potential impact

Areas of risk

Areas of risk

Trang 8

More specifically is defined as:

The degree of confidence in the vetting process used

to establish the identity of the individual to whom the credential was

issued

The degree of confidence in the vetting process used

to establish the identity of the individual to whom the credential was

issued

The degree of confidence that the individual who uses the credential is the individual to whom the credential was

issued

The degree of confidence that the individual who uses the credential is the individual to whom the credential was

issued

Four levels of assurance

Four levels of assurance

Level 1

• Little or no confidence in the asserted identity's validity

Level 1

• Little or no confidence in the asserted identity's validity

Trang 10

Potential Impact Categories for Authentication Errors

Inconvenience, distress, or damage to standing or

reputation

Financial loss or organization liability

Harm to organization programs or interests

Unauthorized release of sensitive information

Personal safety

Civil or criminal violations

Assurance Level Impact Profiles

Low Mod Mod High Low Mod Mod High None Low Mod High None Low Mod High None None Low Mod/

High None Low Mod High

Maximum Potential Impacts for Each

Assurance Level

Table 3.1

Trang 11

Password Authentication

• Widely used line of defense against

intruders

o User provides name/login and password

o System compares password with the one stored for that specified login

• The user ID:

o Determines that the user is authorized to access the

system

o Determines the user’s privileges

o Is used in discretionary access control

Trang 12

Password Vulnerabilities

Popular password attack

Password guessing against single user

Password guessing against single user

Workstation hijacking

Workstation hijacking

Exploiting user mistakes Exploiting user mistakes

Exploiting multiple password use

Exploiting multiple password use

Electronic monitoring

Electronic monitoring

Trang 13

User ID Salt

Compare

Hash code

Trang 14

• Still often required for compatibility with existing account management software

or multivendor environments

Trang 15

Improved Implementations

Much stronger hash/salt

schemes available for

Unix

Recommended hash function is based on MD5

• Salt of up to 48-bits

• Password length is unlimited

• Produces 128-bit hash

• Uses an inner loop with 1000 iterations to achieve

slowdown

OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt

• Most secure version of Unix hash/salt scheme

• Uses 128-bit salt to create 192-bit hash value

Trang 16

Password Cracking

Dictionary attacks

• Develop a large dictionary of possible passwords and try each against the password file

• Each password must be hashed using each salt value and then

compared to stored hash values

Dictionary attacks

• Develop a large dictionary of possible passwords and try each against the password file

• Each password must be hashed using each salt value and then

compared to stored hash values

Rainbow table attacks

• Pre-compute tables of hash values for all salts

• A mammoth table of hash values

• Can be countered by using a sufficiently large salt value and a

sufficiently large hash length

Rainbow table attacks

• Pre-compute tables of hash values for all salts

• A mammoth table of hash values

• Can be countered by using a sufficiently large salt value and a

sufficiently large hash length

Password crackers exploit the fact that people choose

easily guessable passwords

• Shorter password lengths are also easier

to crack

Password crackers exploit the fact that people choose

easily guessable passwords

• Shorter password lengths are also easier

to crack

John the Ripper

• Open-source password cracker first developed

in in 1996

• Uses a combination of brute-force and

dictionary techniques

John the Ripper

• Open-source password cracker first developed

in in 1996

• Uses a combination of brute-force and

dictionary techniques

Trang 17

Modern Approaches

• Complex password policy

o Forcing users to pick stronger passwords

• However password-cracking techniques have also improved

o The processing capacity available for password cracking has increased dramatically

o The use of sophisticated algorithms to generate potential passwords

o Studying examples and structures of actual passwords in use

Trang 18

Figure 3.3 The Percentage of Passwords Guessed After

a Given Number of Guesses

Trang 19

Password File Access

Control

Can block offline guessing attacks by

denying access to encrypted passwords

Can block offline guessing attacks by

denying access to encrypted passwords

Accident with permissio

ns making

it readable

Users with same password

on other systems

Access from backup media

Sniff password

s in network traffic

Trang 20

Password Selection Strategies

Complex password policy

User is allowed to select their own password, however

the system checks to see if the password is allowable,

and if not, rejects it

Goal is to eliminate guessable passwords while allowing the user to select a password that is memorable

Reactive password checking

System periodically runs its own password cracker to find guessable passwords

Computer generated passwordsUsers have trouble remembering them

User education

Users can be told the importance of using hard to guess passwords and can be provided with guidelines for

selecting strong passwords

Trang 21

Proactive Password

Checking

Bloom filter

Used to build a table based

on dictionary using hashes

Check desired password against this table

Bloom filter

Used to build a table based

on dictionary using hashes

Check desired password against this table

Password cracker

Compile a large dictionary of passwords not to use

Password cracker

Compile a large dictionary of passwords not to use

Trang 23

Table 3.2

Card Type Defining Feature Example

Embossed Raised characters only, on

front

Old credit card

Magnetic stripe Magnetic bar on back, characters on front Bank card

Memory Electronic memory inside Prepaid phone card

Biometric ID card

Types of Cards Used as Tokens

Trang 24

Memory Cards

• Can store but do not process data

• The most common is the magnetic stripe card

• Can include an internal electronic memory

• Can be used alone for physical access

o ATM

• Provides significantly greater security when combined with a password or PIN

• Drawbacks of memory cards include:

Trang 25

Smart Tokens

Trang 26

Smart Cards

o Has the appearance of a credit card

o Has an electronic interface

o May use any of the smart token protocols

o Read-only memory (ROM)

• Stores data that does not change during the card’s life

o Electrically erasable programmable ROM (EEPROM)

• Holds application data and programs

o Random access memory (RAM)

• Holds temporary data generated when applications are executed

Trang 28

Electronic Identity

Cards (eID)

Use of a smart card as a

national identity card for

citizens

Use of a smart card as a

national identity card for

citizens

Can serve the same purposes as other

national ID cards, and similar cards

such as a driver’s license, for access to

government and commercial services

Can provide stronger proof of identity

and can be used in a wider variety of

applications

In effect, is a smart card that has been

verified by the national government as

valid and authentic

Most advanced deployment

is the German card neuer

Personalausweis

Most advanced deployment

is the German card neuer

• Card access number (CAN)

• Machine readable zone (MRZ)

Trang 29

Table 3.3

Electronic Functions and Data

for eID Cards

CAN = card access number

MRZ = machine readable zone

PACE = password authenticated connection establishment

PIN = personal identification number

Trang 30

Figure 3.6 User Authentication with eID

eID server

Host/application server

6 User enters PIN

1 User requests service

(e.g., via Web browser)

Trang 31

is established by the user entering the 6-digit PIN (which should only

be known to the holder of the card)

For offline applications, either the MRZ printed on the back of the

card or the six-digit card access

number (CAN) printed on the front

is used

Trang 32

Biometric Authentication

• Attempts to authenticate an individual based on unique physical characteristics

• Based on pattern recognition

• Is technically complex and expensive when

compared to passwords and tokens

• Physical characteristics used include:

Trang 34

database Name (PIN)

User interface

(a) Enrollment

Feature extractor

Biometric sensor Name (PIN)

Feature matcher

Biometric sensor

User interface

(c) Identification

Feature extractor

Feature matcher true/false

Figure 3.8 A Generic Biometric System Enrollment creates

an association between a user and the user's biometric

characteristics Depending on the application, user

authentication either involves verifying that a claimed user is

the actual user or identifying an unknown user.

Biometric database

Biometric database

Trang 35

threshold (t)

imposter profile genuine user profile of

false match possible

false nonmatch

possible

Matching score (s)

average matching value of imposter

average matching value of genuine user

Probability

density function

Figure 3.9 Profiles of a Biometric Characteristic of an Imposter and an Authorized Users In this depiction, the comparison between presented feature and a reference feature is reduced to a single numeric value If the input value (s) is greater than a

preassigned threshold (t), a match is declared.

Trang 36

Figure 3.10 Idealized Biometric Measurement Operating Characteristic Curves (log-log scale)

incr ease thr esh old inc

rea sed

secu rity ,

dec rea sed

con ven ien ce

dec rea

se t hre sho ld

dec rea sed

sec urit y,

inc eas ed

con ven ien ce

Trang 37

Voice Hand Iris

false match rate

Figure 3.11 Actual Biometric Measurement Operating Characteristic Curves,

reported in [MANS01] To clarify differences among systems, a log-log scale is used.

Trang 38

Remote User Authentication

communications link is more complex

o Eavesdropping, capturing a password, replaying an authentication sequence that has been observed

challenge-response protocol to counter threats

Trang 40

, and Typical

Defenses

Trang 41

AUTHENTICATION SECURITY ISSUES

Eavesdropping

Adversary attempts to learn the password by some sort of attack that involves the physical proximity of user and

adversary

Host Attacks

Directed at the user file

at the host where passwords, token passcodes, or biometric templates are stored

Replay

Adversary repeats a previously captured user response

Client Attacks

Adversary attempts to

achieve user authentication without access to the remote host or the intervening communications path

Trang 42

Figure 3.13 General Iris Scan Site Architecture for UAE System

Iris workstation

LAN switch

Network switch

Iris scanner

Iris workstation

Iris scanner

Iris database

Trang 43

Case Study: ATM Security Problems

Trang 44

• Biometric authentication

o Physical characteristics used in biometric

applications

o Operation of a biometric authentication system

o Biometric accuracy

• Remote user authentication

o Password protocol

o Token protocol

o Static biometric protocol

o Dynamic biometric protocol

• Security issues for user

o The vulnerability of passwords

o The use of hashed passwords

o Password cracking of user-chosen

passwords

o Password file access control

o Password selection strategies

Ngày đăng: 18/12/2017, 15:15

TỪ KHÓA LIÊN QUAN