Computer Security DD2395 - - PowerPoint PPT Presentation

computer security dd2395
SMART_READER_LITE
LIVE PREVIEW

Computer Security DD2395 - - PowerPoint PPT Presentation

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication KTH DD2395 Sonja Buchegger 1 More Follow-up Courses l EP2500: Networked Systems


slide-1
SLIDE 1

Computer Security DD2395

http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/

Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication

1 KTH DD2395 Sonja Buchegger

slide-2
SLIDE 2

More Follow-up Courses

l EP2500: Networked Systems Security, Säkra nätverkssystem –

Period 4, Spring 2012, http://www.kth.se/student/kurser/kurs/EP2500?l=en_UK

l EP2510: Advanced Networked Systems Security, Säkra

nätverkssystem, fortsättningskurs – Period 2, Fall 2012, http://www.kth.se/student/kurser/kurs/EP2510?l=en_UK

l EP2520: Building Networked Systems Security, Bygga säkra

nätverkssystem – Period 1, Fall 2012, http://www.kth.se/student/kurser/kurs/EP2520?l=en_UK

l Nov. 1, 12:00-14:00, there is an ‘open house’ at Osquldas vag

10, the 3rd floor

KTH DD2395 Sonja Buchegger 2

slide-3
SLIDE 3

KTH DD2395 Sonja Buchegger 3

User Authentication

l fundamental security building block

  • basis of access control & user accountability

l is the process of verifying an identity claimed

by or for a system entity

l has two steps:

  • identification - specify identifier
  • verification - bind entity (person) and identifier

l distinct from message authentication

slide-4
SLIDE 4

KTH DD2395 Sonja Buchegger 4

Means of User Authentication

l four means of authenticating user's identity l based one something the individual

  • knows - e.g. password, PIN
  • possesses - e.g. key, token, smartcard
  • is (static biometrics) - e.g. fingerprint, retina
  • does (dynamic biometrics) - e.g. voice, sign

l can use alone or combined l all can provide user authentication l all have issues

slide-5
SLIDE 5

KTH DD2395 Sonja Buchegger 5

Password Authentication

l widely used user authentication method

  • user provides name/login and password
  • system compares password with that saved for

specified login

l authenticates ID of user logging and

  • that the user is authorized to access system
  • determines the user’s privileges
  • is used in discretionary access control
slide-6
SLIDE 6

KTH DD2395 Sonja Buchegger 6

Password Vulnerabilities

l offline dictionary attack l specific account attack l popular password attack l password guessing against single user l workstation hijacking l exploiting user mistakes l exploiting multiple password use l electronic monitoring

slide-7
SLIDE 7

KTH DD2395 Sonja Buchegger 7

Countermeasures

l stop unauthorized access to password file l intrusion detection measures l account lockout mechanisms l policies against using common passwords but

rather hard to guess passwords

l training & enforcement of policies l automatic workstation logout l encrypted network links

slide-8
SLIDE 8

KTH DD2395 Sonja Buchegger 8

Use of Hashed Passwords

slide-9
SLIDE 9

KTH DD2395 Sonja Buchegger 9

UNIX Implementation

l original scheme

  • 8 character password form 56-bit key
  • 12-bit salt used to modify DES encryption into a
  • ne-way hash function
  • 0 value repeatedly encrypted 25 times
  • output translated to 11 character sequence

l now regarded as woefully insecure

  • e.g. supercomputer, 50 million tests, 80 min

l sometimes still used for compatibility

slide-10
SLIDE 10

KTH DD2395 Sonja Buchegger 10

Improved Implementations

l have other, stronger, hash/salt variants l many systems now use MD5 (broken, SHA-2)

  • with 48-bit salt
  • password length is unlimited
  • is hashed with 1000 times inner loop
  • produces 128-bit hash

l OpenBSD uses Blowfish block cipher based

hash algorithm called Bcrypt

  • uses 128-bit salt to create 192-bit hash value
slide-11
SLIDE 11

KTH DD2395 Sonja Buchegger 11

Password Cracking

l dictionary attacks

  • try each word then obvious variants in large

dictionary against hash in password file

l rainbow table attacks

  • precompute tables of hash values
  • a mammoth table of hash values, hash chains
  • e.g. 1.4GB table cracks 99.9% of alphanumeric Windows

passwords in 13.8 secs

  • not feasible if larger salt values used
  • http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/
slide-12
SLIDE 12

KTH DD2395 Sonja Buchegger 12

Password Choices

l users may pick short passwords

  • e.g. 3% were 3 chars or less, easily guessed
  • system can reject choices that are too short

l users may pick guessable passwords

  • so crackers use lists of likely passwords
  • e.g. one study of 14000 encrypted passwords

guessed nearly 1/4 of them

  • would take about 1 hour on fastest systems to

compute all variants, and only need 1 break!

slide-13
SLIDE 13

KTH DD2395 Sonja Buchegger 13

Password File Access Control

l can block offline guessing attacks by denying

access to encrypted passwords

  • make available only to privileged users
  • often using a separate shadow password file

l still have vulnerabilities

  • exploit O/S bug
  • accident with permissions making it readable
  • users with same password on other systems
  • access from unprotected backup media
  • sniff passwords in unprotected network traffic
slide-14
SLIDE 14

KTH DD2395 Sonja Buchegger 14

Using Better Passwords

l clearly have problems with passwords l goal to eliminate guessable passwords l whilst still easy for user to remember l techniques:

  • user education
  • computer-generated passwords
  • reactive password checking
  • proactive password checking
slide-15
SLIDE 15

KTH DD2395 Sonja Buchegger 15

Proactive Password Checking

l rule enforcement plus user advice, e.g.

  • 8+ chars, upper/lower/numeric/punctuation
  • may not suffice

l password cracker

  • time and space issues

l Markov Model

  • generates guessable passwords
  • hence reject any password it might generate

l Bloom Filter

  • use to build table based on dictionary using hashes
  • check desired password against this table
slide-16
SLIDE 16

KTH DD2395 Sonja Buchegger 16

Token Authentication

l object user possesses to authenticate, e.g.

  • embossed card
  • magnetic stripe card
  • memory card
  • smartcard
slide-17
SLIDE 17

KTH DD2395 Sonja Buchegger 17

Memory Card

l store but do not process data l magnetic stripe card, e.g. bank card l electronic memory card l used alone for physical access l with password/PIN for computer use l drawbacks of memory cards include:

  • need special reader
  • loss of token issues
  • user dissatisfaction
slide-18
SLIDE 18

KTH DD2395 Sonja Buchegger 18

Smartcard

l credit-card like l has own processor, memory, I/O ports

  • wired or wireless access by reader
  • may have crypto co-processor
  • ROM, EEPROM, RAM memory

l executes protocol to authenticate with reader/

computer

l also have USB dongles

slide-19
SLIDE 19

KTH DD2395 Sonja Buchegger 19

Biometric Authentication

l authenticate user based on one of their

physical characteristics

slide-20
SLIDE 20

KTH DD2395 Sonja Buchegger 20

Operation of a Biometric System

slide-21
SLIDE 21

KTH DD2395 Sonja Buchegger 21

Biometric Accuracy

l never get identical templates l problems of false match / false non-match

slide-22
SLIDE 22

KTH DD2395 Sonja Buchegger 22

Biometric Accuracy

l can plot characteristic curve l pick threshold balancing error rates

slide-23
SLIDE 23

KTH DD2395 Sonja Buchegger 23

Remote User Authentication

l authentication over network more complex

  • problems of eavesdropping, replay

l generally use challenge-response

  • user sends identity
  • host responds with random number
  • user computes f(r,h(P)) and sends back
  • host compares value from user with own computed

value, if match user authenticated

l protects against a number of attacks

slide-24
SLIDE 24

KTH DD2395 Sonja Buchegger 24

Authentication Security Issues

l client attacks l host attacks l eavesdropping l replay l trojan horse l denial-of-service

slide-25
SLIDE 25

KTH DD2395 Sonja Buchegger 25

Practical Application

slide-26
SLIDE 26

KTH DD2395 Sonja Buchegger 26

Summary

l introduced user authentication

  • using passwords
  • using tokens
  • using biometrics

l remote user authentication issues l example application and case study