Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
Trang 1Chapter 2:Authentication
Trang 2Objectives in this chapter
Create strong passwords and store them
securely
Understand the Kerberos authentication
process
Understand what mutual authentication is and
Create strong passwords and store them
securely
Understand the Kerberos authentication
process
Understand what mutual authentication is and
Trang 4Security of System Resources
Three-step process ( AAA )
– Predetermined level of access to resources
Three-step process ( AAA )
Trang 5Security of System Resources
Identifying who is
responsible for
Information security
ATHENA
Trang 6 Positive identification of person/system seekingaccess to secured information/services
Based on:
• Something you know (password)
• Something you have (smartcard)
• Something you are (biometrics)
• Or a combination (multi-factor)
Positive identification of person/system seekingaccess to secured information/services
Based on:
• Something you know (password)
• Something you have (smartcard)
• Something you are (biometrics)
• Or a combination (multi-factor)
Trang 8Authentication: The Big Issue
The central problem to be solved in all cases ishow to send something securely across the
network to the authenticator such that thesomething can’t be read or decrypted,etc andcan’t be successfully replayed later from
captured packets
Trang 9Usernames and Passwords
• Unique alphanumeric identifier used toidentify an individual when logging onto acomputer/network
• Secret combination of keystrokes that, whencombined with a username, authenticates auser to a computer/network
ATHENA
• Unique alphanumeric identifier used toidentify an individual when logging onto acomputer/network
• Secret combination of keystrokes that, whencombined with a username, authenticates auser to a computer/network
Trang 10Username + Password
Username/password validated against AccessServer
Trang 11Basic Rules for Password Protection
2. Use different passwords for different
functions
3. Use at least 6 characters
4. Use mixture of uppercase and lowercase
letters, numbers, and other characters
5. Change periodically
ATHENA
2. Use different passwords for different
functions
3. Use at least 6 characters
4. Use mixture of uppercase and lowercase
letters, numbers, and other characters
5. Change periodically
Trang 12Strong Password Creation Techniques
Easy to remember; difficult to recognize
• First letters of each word of a simple phrase;
add a number and punctuation
• Combine two dissimilar words and place a
number between them
Easy to remember; difficult to recognize
• First letters of each word of a simple phrase;
add a number and punctuation
• Combine two dissimilar words and place a
number between them
Trang 13Techniques to Use Multiple Passwords
Group Web sites or applications requiring
passwords by appropriate level of security
• Use a different password for each group
• Cycle more complex passwords down thegroups, from most sensitive to least
ATHENA
Group Web sites or applications requiring
passwords by appropriate level of security
• Use a different password for each group
• Cycle more complex passwords down thegroups, from most sensitive to least
Trang 14Storing Passwords
• Keep in a place you are not likely to lose it
• Use small type
• Develop a personal code to apply to the list
Electronic
• Use a specifically designed application(encrypts data)
• Keep in a place you are not likely to lose it
• Use small type
• Develop a personal code to apply to the list
Electronic
• Use a specifically designed application(encrypts data)
Trang 15Challenge Handshake Authentication Protocol (CHAP)
PPP mechanism used by an authenticator toauthenticate a peer
Uses an encrypted challenge-and-response
Trang 16CHAP Challenge-and-Response Sequence
Trang 17CHAP Security Benefits
Multiple authentication sequences throughoutNetwork layer protocol session
• Limit time of exposure to any single attack
Variable challenge values and changing
• Limit time of exposure to any single attack
Variable challenge values and changing
identifiers
• Provide protection against playback attacks
Trang 18CHAP Security Issues
Passwords should not be the same in both
• Possible for users to update passwords
Passwords should not be the same in both
Trang 20Kerberos in a Simple Environment
Trang 21Kerberos in a Simple Environment
• Small, fixed-length numerical value
• Computed as a function of an arbitrarynumber of bits in a message
• Used to verify authenticity of sender
ATHENA
• Small, fixed-length numerical value
• Computed as a function of an arbitrarynumber of bits in a message
• Used to verify authenticity of sender
Trang 22Kerberos in a Simple Environment
Trang 23Kerberos in a More Complex
Trang 24Kerberos in a More Complex Environment
Trang 25Kerberos in Very Large
Trang 26Security Weaknesses of Kerberos
Does not solve password-guessing attacks
Must keep password secret
Does not prevent denial-of-service attacks
Internal clocks of authenticating devices must
be loosely synchronized
Authenticating device identifiers must not berecycled on a short-term basis
Does not solve password-guessing attacks
Must keep password secret
Does not prevent denial-of-service attacks
Internal clocks of authenticating devices must
be loosely synchronized
Authenticating device identifiers must not berecycled on a short-term basis
Trang 28Electronic Encryption and
Trang 29Symmetric Key Cryptography
Single key – works in both directions (the samekey used to encrypt will also decrypt the
ciphertext)
Short key length – 128 up to 448 bits
(currently)
Very fast encryption/decryption
Key used for a short time and discarded
Very fast encryption/decryption
Key used for a short time and discarded
(session key)
Trang 30Asymmetric Key Cryptography
Two keys – one made public and one kept
securely private
One-way – a ciphertext encrypted with one ofthe keys can only be decrypted with the otherkey
Long length – 1024, 2048, or more bits
Long length – 1024, 2048, or more bits
Slow encryption/decryption
Trang 31Electronic Encryption and
Decryption Concepts
Certificate Authority (CA)
• Trusted, third-party entity that verifies theactual identity of an organization/individualbefore providing a digital certificate
• Practice of using a trusted, third-party entity
to verify the authenticity of a party who sends
• Practice of using a trusted, third-party entity
to verify the authenticity of a party who sends
a message
Trang 32 Electronic means of verifying identity of an
Trang 33ATHENA
Trang 34How Much Trust
Should One Place in a CA?
Reputable CAs have several levels of
authentication that they issue based on theamount of data collected from applicants
Example: VeriSign
Reputable CAs have several levels of
authentication that they issue based on theamount of data collected from applicants
Example: VeriSign
Trang 35Security Tokens
Authentication devices assigned to specific user
Small, credit card-sized physical devices
Incorporate two-factor authentication methods
Utilize base keys that are much stronger thanshort, simple passwords a person can
remember
ATHENA
Authentication devices assigned to specific user
Small, credit card-sized physical devices
Incorporate two-factor authentication methods
Utilize base keys that are much stronger thanshort, simple passwords a person can
remember
Trang 36Types of Security Tokens
Passive
• Act as a storage device for the base key
• Do not emit, or otherwise share, base tokens
• Act as a storage device for the base key
• Do not emit, or otherwise share, base tokens
Trang 37 Strategies for generating one-time passwords
Strategies for generating one-time passwords
• Counter-based tokens
• Clock-based tokens
Trang 39How Biometric Authentication Works
1. Biometric is scanned after identity is verified
2. Biometric information is analyzed and put
into an electronic template
3. Template is stored in a repository
4. To gain access, biometric is scanned again
5. Computer analyzes biometric data and
compares it to data in template
6. If data from scan matches data in template,
person is allowed access
7. Keep a record, following AAA model
ATHENA
1. Biometric is scanned after identity is verified
2. Biometric information is analyzed and put
into an electronic template
3. Template is stored in a repository
4. To gain access, biometric is scanned again
5. Computer analyzes biometric data and
compares it to data in template
6. If data from scan matches data in template,
person is allowed access
7. Keep a record, following AAA model
Trang 40False Positives and False Negatives
False positive
• Occurrence of an unauthorized person beingauthenticated by a biometric authenticationprocess
Trang 41Different Kinds of Biometrics
Trang 42Fingerprint Biometrics
Trang 43Hand Geometry Authentication
ATHENA
Trang 44Retinal Scanning
Trang 45Iris Scanning
ATHENA
Trang 46Signature Verification
Trang 47General Trends in Biometrics
Authenticating large numbers of people over ashort period of time (eg, smart cards)
Gaining remote access to controlled areas
ATHENA
Trang 48Multifactor Authentication
Identity of individual is verified using at leasttwo of the three factors of authentication
• Something you know (eg, password)
• Something you have (eg, smart card)
• Something about you (eg, biometrics)
Identity of individual is verified using at leasttwo of the three factors of authentication
• Something you know (eg, password)
• Something you have (eg, smart card)
• Something about you (eg, biometrics)
Trang 49Authentication techniques Summary
Trang 50 Controlling Access to Computer Systems
• Restrictions to user access are stored in anaccess control list (ACL)
• An ACL is a table in the operating systemthat contains the access rights each subject (auser or device) has to a particular system
object (a folder or file)
Controlling Access to Computer Systems
• Restrictions to user access are stored in anaccess control list (ACL)
• An ACL is a table in the operating systemthat contains the access rights each subject (auser or device) has to a particular system
object (a folder or file)
Trang 51Mandatory Access Control (MAC)
A more restrictive model
The subject is not allowed to give access toanother subject to use an object
ATHENA
Trang 52Role Based Access Control (RBAC)
Instead of setting permissions for each user orgroup, you can assign permissions to a position
or role and then assign users and other objects
Trang 53Discretionary Access Control (DAC)
Least restrictive model
One subject can adjust the permissions for
other subjects over objects
Type of access most users associate with theirpersonal computers
ATHENA
Least restrictive model
One subject can adjust the permissions for
other subjects over objects
Type of access most users associate with theirpersonal computers
Trang 54Auditing Information
Security Schemes
Two ways to audit a security system
• Logging records which user performed a specific activity and when
• System scanning to check permissions assigned to a user or role; these results are compared to what is expected to detect any differences
Two ways to audit a security system
• Logging records which user performed a specific activity and when
• System scanning to check permissions assigned to a user or role; these results are compared to what is expected to detect any differences