Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/
Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication
1 KTH DD2395 Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 3 User Authentication KTH DD2395 Sonja Buchegger 1 More Follow-up Courses l EP2500: Networked Systems
1 KTH DD2395 Sonja Buchegger
l EP2500: Networked Systems Security, Säkra nätverkssystem –
l EP2510: Advanced Networked Systems Security, Säkra
l EP2520: Building Networked Systems Security, Bygga säkra
l Nov. 1, 12:00-14:00, there is an ‘open house’ at Osquldas vag
KTH DD2395 Sonja Buchegger 2
KTH DD2395 Sonja Buchegger 3
l fundamental security building block
l is the process of verifying an identity claimed
l has two steps:
l distinct from message authentication
KTH DD2395 Sonja Buchegger 4
l four means of authenticating user's identity l based one something the individual
l can use alone or combined l all can provide user authentication l all have issues
KTH DD2395 Sonja Buchegger 5
l widely used user authentication method
l authenticates ID of user logging and
KTH DD2395 Sonja Buchegger 6
l offline dictionary attack l specific account attack l popular password attack l password guessing against single user l workstation hijacking l exploiting user mistakes l exploiting multiple password use l electronic monitoring
KTH DD2395 Sonja Buchegger 7
l stop unauthorized access to password file l intrusion detection measures l account lockout mechanisms l policies against using common passwords but
l training & enforcement of policies l automatic workstation logout l encrypted network links
KTH DD2395 Sonja Buchegger 8
KTH DD2395 Sonja Buchegger 9
l original scheme
l now regarded as woefully insecure
l sometimes still used for compatibility
KTH DD2395 Sonja Buchegger 10
l have other, stronger, hash/salt variants l many systems now use MD5 (broken, SHA-2)
l OpenBSD uses Blowfish block cipher based
KTH DD2395 Sonja Buchegger 11
l dictionary attacks
l rainbow table attacks
KTH DD2395 Sonja Buchegger 12
l users may pick short passwords
l users may pick guessable passwords
KTH DD2395 Sonja Buchegger 13
l can block offline guessing attacks by denying
l still have vulnerabilities
KTH DD2395 Sonja Buchegger 14
l clearly have problems with passwords l goal to eliminate guessable passwords l whilst still easy for user to remember l techniques:
KTH DD2395 Sonja Buchegger 15
l rule enforcement plus user advice, e.g.
l password cracker
l Markov Model
l Bloom Filter
KTH DD2395 Sonja Buchegger 16
l object user possesses to authenticate, e.g.
KTH DD2395 Sonja Buchegger 17
l store but do not process data l magnetic stripe card, e.g. bank card l electronic memory card l used alone for physical access l with password/PIN for computer use l drawbacks of memory cards include:
KTH DD2395 Sonja Buchegger 18
l credit-card like l has own processor, memory, I/O ports
l executes protocol to authenticate with reader/
l also have USB dongles
KTH DD2395 Sonja Buchegger 19
l authenticate user based on one of their
KTH DD2395 Sonja Buchegger 20
KTH DD2395 Sonja Buchegger 21
l never get identical templates l problems of false match / false non-match
KTH DD2395 Sonja Buchegger 22
l can plot characteristic curve l pick threshold balancing error rates
KTH DD2395 Sonja Buchegger 23
l authentication over network more complex
l generally use challenge-response
l protects against a number of attacks
KTH DD2395 Sonja Buchegger 24
l client attacks l host attacks l eavesdropping l replay l trojan horse l denial-of-service
KTH DD2395 Sonja Buchegger 25
KTH DD2395 Sonja Buchegger 26
l introduced user authentication
l remote user authentication issues l example application and case study