User Authentication
User Authentication
Areas of
risk
Assurance Level
More specifically Four levels of
is defined as: assurance
Describes an
organization’s Level 1
degree of The degree of confidence
•Little or no confidence in the
asserted identity's validity
certainty that a in the vetting process used
to establish the identity of
user has the individual to whom the
credential was issued
Level 2
•Some confidence in the asserted
presented a identity’s validity
credential that
Level 3
refers to his or her •High confidence in the asserted
identity The degree of confidence
that the individual who uses
identity's validity
Exploiting
Specific Popular password Exploiting user
multiple
account attack attack mistakes
password use
UNIX Implementation
•Original scheme
•Up to eight printable characters in length
•12-bit salt used to modify DES encryption into a one-way hash function
•Zero value repeatedly encrypted 25 times
•Output translated to 11 character sequence
•Now regarded as inadequate
•Still often required for compatibility with existing account management
software or multivendor environments
Improved
Implementations
•Dictionary attacks
•Develop a large dictionary of possible passwords and try each against the
password file
•Each password must be hashed using each salt value and then compared to
stored hash values
•Rainbow table attacks
•Pre-compute tables of hash values for all salts
•A mammoth table of hash values
•Can be countered by using a sufficiently large salt value and a sufficiently large
hash length
•Password crackers exploit the fact that people choose easily guessable passwords
•Shorter password lengths are also easier to crack
•John the Ripper
•Open-source password cracker first developed in in 1996
•Uses a combination of brute-force and dictionary techniques
Modern Approaches
• Complex password policy
o Forcing users to pick stronger passwords
• Vulnerabilities
•Weakness in the OS that allows access to the file
•Accident with permissions making it readable
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Table 3.3
• User interface:
o Manual interfaces include a keypad and display
for human/token interaction
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
Electronic
Functions
and Data
for
eID Cards
•Ensures that the contactless RF chip in the eID card cannot be read without
explicit access control
•For online applications, access is established by the user entering the 6-digit
PIN (which should only be known to the holder of the card)
•For offline applications, either the MRZ printed on the back of the card or the
six-digit card access number (CAN) printed on the front is used
Biometric Authentication
• Attempts to authenticate an individual based on
unique physical characteristics
• Based on pattern recognition
• Is technically complex and expensive when
compared to passwords and tokens
• Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Remote User Authentication
• Authentication over a network, the Internet,
or a communications link is more complex
• Additional security threats such as:
o Eavesdropping, capturing a password,
replaying an authentication sequence that has
been observed
ATM
Security
Problems
Summary
• Digital user authentication • Biometric
principles
o A model for digital user authentication
authentication o Physical characteristics used in
o Means of authentication biometric applications
o Risk assessment for user o Operation of a biometric
authentication
authentication system
• Password-based o Biometric accuracy
authentication
o The vulnerability of passwords • Remote user
o The use of hashed passwords authentication
o Password cracking of user-chosen
passwords o Password protocol
o Password file access control o Token protocol
o Password selection strategies o Static biometric protocol
• Token-based o Dynamic biometric protocol
authentication • Security issues for user
o Memory cards
o Smart cards authentication
o Electronic identity cards