computer security dd2395
play

Computer Security DD2395 - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication KTH DD2395 Sonja Buchegger 1 More Follow-up Courses l EP2500: Networked Systems


  1. Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication KTH DD2395 Sonja Buchegger 1

  2. More Follow-up Courses l EP2500: Networked Systems Security, Säkra nätverkssystem – Period 4, Spring 2012, http://www.kth.se/student/kurser/kurs/EP2500?l=en_UK l EP2510: Advanced Networked Systems Security, Säkra nätverkssystem, fortsättningskurs – Period 2, Fall 2012, http://www.kth.se/student/kurser/kurs/EP2510?l=en_UK l EP2520: Building Networked Systems Security, Bygga säkra nätverkssystem – Period 1, Fall 2012, http://www.kth.se/student/kurser/kurs/EP2520?l=en_UK l Nov. 1, 12:00-14:00, there is an ‘open house’ at Osquldas vag 10, the 3 rd floor KTH DD2395 Sonja Buchegger 2

  3. User Authentication l fundamental security building block - basis of access control & user accountability l is the process of verifying an identity claimed by or for a system entity l has two steps: - identification - specify identifier - verification - bind entity (person) and identifier l distinct from message authentication KTH DD2395 Sonja Buchegger 3

  4. Means of User Authentication l four means of authenticating user's identity l based one something the individual - knows - e.g. password, PIN - possesses - e.g. key, token, smartcard - is (static biometrics) - e.g. fingerprint, retina - does (dynamic biometrics) - e.g. voice, sign l can use alone or combined l all can provide user authentication l all have issues KTH DD2395 Sonja Buchegger 4

  5. Password Authentication l widely used user authentication method - user provides name/login and password - system compares password with that saved for specified login l authenticates ID of user logging and - that the user is authorized to access system - determines the user’s privileges - is used in discretionary access control KTH DD2395 Sonja Buchegger 5

  6. Password Vulnerabilities l offline dictionary attack l specific account attack l popular password attack l password guessing against single user l workstation hijacking l exploiting user mistakes l exploiting multiple password use l electronic monitoring KTH DD2395 Sonja Buchegger 6

  7. Countermeasures l stop unauthorized access to password file l intrusion detection measures l account lockout mechanisms l policies against using common passwords but rather hard to guess passwords l training & enforcement of policies l automatic workstation logout l encrypted network links KTH DD2395 Sonja Buchegger 7

  8. Use of Hashed Passwords KTH DD2395 Sonja Buchegger 8

  9. UNIX Implementation l original scheme - 8 character password form 56-bit key - 12-bit salt used to modify DES encryption into a one-way hash function - 0 value repeatedly encrypted 25 times - output translated to 11 character sequence l now regarded as woefully insecure - e.g. supercomputer, 50 million tests, 80 min l sometimes still used for compatibility KTH DD2395 Sonja Buchegger 9

  10. Improved Implementations l have other, stronger, hash/salt variants l many systems now use MD5 (broken, SHA-2) - with 48-bit salt - password length is unlimited - is hashed with 1000 times inner loop - produces 128-bit hash l OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt - uses 128-bit salt to create 192-bit hash value KTH DD2395 Sonja Buchegger 10

  11. Password Cracking l dictionary attacks - try each word then obvious variants in large dictionary against hash in password file l rainbow table attacks - precompute tables of hash values - a mammoth table of hash values, hash chains - e.g. 1.4GB table cracks 99.9% of alphanumeric Windows passwords in 13.8 secs - not feasible if larger salt values used - http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/ KTH DD2395 Sonja Buchegger 11

  12. Password Choices l users may pick short passwords - e.g. 3% were 3 chars or less, easily guessed - system can reject choices that are too short l users may pick guessable passwords - so crackers use lists of likely passwords - e.g. one study of 14000 encrypted passwords guessed nearly 1/4 of them - would take about 1 hour on fastest systems to compute all variants, and only need 1 break! KTH DD2395 Sonja Buchegger 12

  13. Password File Access Control l can block offline guessing attacks by denying access to encrypted passwords - make available only to privileged users - often using a separate shadow password file l still have vulnerabilities - exploit O/S bug - accident with permissions making it readable - users with same password on other systems - access from unprotected backup media - sniff passwords in unprotected network traffic KTH DD2395 Sonja Buchegger 13

  14. Using Better Passwords l clearly have problems with passwords l goal to eliminate guessable passwords l whilst still easy for user to remember l techniques: - user education - computer-generated passwords - reactive password checking - proactive password checking KTH DD2395 Sonja Buchegger 14

  15. Proactive Password Checking l rule enforcement plus user advice, e.g. - 8+ chars, upper/lower/numeric/punctuation - may not suffice l password cracker - time and space issues l Markov Model - generates guessable passwords - hence reject any password it might generate l Bloom Filter - use to build table based on dictionary using hashes - check desired password against this table KTH DD2395 Sonja Buchegger 15

  16. Token Authentication l object user possesses to authenticate, e.g. - embossed card - magnetic stripe card - memory card - smartcard KTH DD2395 Sonja Buchegger 16

  17. Memory Card l store but do not process data l magnetic stripe card, e.g. bank card l electronic memory card l used alone for physical access l with password/PIN for computer use l drawbacks of memory cards include: - need special reader - loss of token issues - user dissatisfaction KTH DD2395 Sonja Buchegger 17

  18. Smartcard l credit-card like l has own processor, memory, I/O ports - wired or wireless access by reader - may have crypto co-processor - ROM, EEPROM, RAM memory l executes protocol to authenticate with reader/ computer l also have USB dongles KTH DD2395 Sonja Buchegger 18

  19. Biometric Authentication l authenticate user based on one of their physical characteristics KTH DD2395 Sonja Buchegger 19

  20. Operation of a Biometric System KTH DD2395 Sonja Buchegger 20

  21. Biometric Accuracy l never get identical templates l problems of false match / false non-match KTH DD2395 Sonja Buchegger 21

  22. Biometric Accuracy l can plot characteristic curve l pick threshold balancing error rates KTH DD2395 Sonja Buchegger 22

  23. Remote User Authentication l authentication over network more complex - problems of eavesdropping, replay l generally use challenge-response - user sends identity - host responds with random number - user computes f(r,h(P)) and sends back - host compares value from user with own computed value, if match user authenticated l protects against a number of attacks KTH DD2395 Sonja Buchegger 23

  24. Authentication Security Issues l client attacks l host attacks l eavesdropping l replay l trojan horse l denial-of-service KTH DD2395 Sonja Buchegger 24

  25. Practical Application KTH DD2395 Sonja Buchegger 25

  26. Summary l introduced user authentication - using passwords - using tokens - using biometrics l remote user authentication issues l example application and case study KTH DD2395 Sonja Buchegger 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend