Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak10/
Fall 2010 Sonja Buchegger buc@kth.se Lecture 3 User Authentication
1 KTH DD2395 Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 3 User Authentication KTH DD2395 Sonja Buchegger 1 User Authentication KTH DD2395 Sonja Buchegger 2 User
1 KTH DD2395 Sonja Buchegger
KTH DD2395 Sonja Buchegger 2
KTH DD2395 Sonja Buchegger 3
fundamental security building block
is the process of verifying an identity claimed
has two steps:
distinct from message authentication
KTH DD2395 Sonja Buchegger 4
four means of authenticating user's identity based one something the individual
can use alone or combined all can provide user authentication all have issues
KTH DD2395 Sonja Buchegger 5
widely used user authentication method
authenticates ID of user logging and
KTH DD2395 Sonja Buchegger 6
offline dictionary attack specific account attack popular password attack password guessing against single user workstation hijacking exploiting user mistakes exploiting multiple password use electronic monitoring
KTH DD2395 Sonja Buchegger 7
stop unauthorized access to password file intrusion detection measures account lockout mechanisms policies against using common passwords but
training & enforcement of policies automatic workstation logout encrypted network links
KTH DD2395 Sonja Buchegger 8
KTH DD2395 Sonja Buchegger 9
original scheme
now regarded as woefully insecure
sometimes still used for compatibility
KTH DD2395 Sonja Buchegger 10
have other, stronger, hash/salt variants many systems now use MD5
OpenBSD uses Blowfish block cipher based
KTH DD2395 Sonja Buchegger 11
dictionary attacks
rainbow table attacks
KTH DD2395 Sonja Buchegger 12
users may pick short passwords
users may pick guessable passwords
KTH DD2395 Sonja Buchegger 13
can block offline guessing attacks by denying
still have vulnerabilities
KTH DD2395 Sonja Buchegger 14
clearly have problems with passwords goal to eliminate guessable passwords whilst still easy for user to remember techniques:
KTH DD2395 Sonja Buchegger 15
rule enforcement plus user advice, e.g.
password cracker
Markov Model
Bloom Filter
KTH DD2395 Sonja Buchegger 16
object user possesses to authenticate, e.g.
KTH DD2395 Sonja Buchegger 17
store but do not process data magnetic stripe card, e.g. bank card electronic memory card used alone for physical access with password/PIN for computer use drawbacks of memory cards include:
KTH DD2395 Sonja Buchegger 18
credit-card like has own processor, memory, I/O ports
executes protocol to authenticate with reader/
also have USB dongles
KTH DD2395 Sonja Buchegger 19
authenticate user based on one of their
KTH DD2395 Sonja Buchegger 20
KTH DD2395 Sonja Buchegger 21
never get identical templates problems of false match / false non-match
KTH DD2395 Sonja Buchegger 22
can plot characteristic curve pick threshold balancing error rates
KTH DD2395 Sonja Buchegger 23
authentication over network more complex
generally use challenge-response
protects against a number of attacks
KTH DD2395 Sonja Buchegger 24
client attacks host attacks eavesdropping replay trojan horse denial-of-service
KTH DD2395 Sonja Buchegger 25
KTH DD2395 Sonja Buchegger 26
KTH DD2395 Sonja Buchegger 27
introduced user authentication
remote user authentication issues example application and case study