-
CSE543 - Introduction to Computer and Network Security Page
CSE543 - Introduction to Computer and Network Security Module: Authentication
Professor Trent Jaeger
1
1
CSE543 - Introduction to Computer and Network Security Module: - - PowerPoint PPT Presentation
CSE543 - Introduction to Computer and Network Security Page
1
1
CSE543 - Introduction to Computer and Network Security Page
2
2
CSE543 - Introduction to Computer and Network Security Page
3
3
CSE543 - Introduction to Computer and Network Security Page
4
4
CSE543 - Introduction to Computer and Network Security Page
5
5
CSE543 - Introduction to Computer and Network Security Page
6
6
CSE543 - Introduction to Computer and Network Security Page
software in this paper. He describes an approach whereby he can embed a Trojan horse in a compiler that can insert malicious code on a trigger (e.g., recognizing a login program).
Trojan horse is a program that serves a legitimate purpose on the surface, but includes malicious code that will be executed with it. Examples include the Sony/BMG rootkit: the program provided music legitimately, but also installed spyware.
used to compile compilers. Since the compiler code looks OK and the malice is in the binary compiler compiler, it is difficult to detect.
miscompiles the command to accept a particular password known to the attacker.
7
7
CSE543 - Introduction to Computer and Network Security Page
that you did not totally create yourself.” We all depend on code, but constructing a basis for trusting it is very hard, even today.
8
“A well-known scientist (some say it was Bertrand Russell) once gave a public lecture on astronomy. He described how the earth orbits around the sun and how the sun, in turn, orbits around the center of a vast collection of stars called our galaxy. At the end of the lecture, a little old lady at the back of the room got up and said: "What you have told us is
tortoise." The scientist gave a superior smile before replying, "What is the tortoise standing on?" "You're very clever, young man, very clever", said the old lady. "But it's turtles all the way down!"
8
CSE543 - Introduction to Computer and Network Security Page
9
9
CSE543 - Introduction to Computer and Network Security Page
10
10
CSE543 - Introduction to Computer and Network Security Page
11
11
CSE543 - Introduction to Computer and Network Security Page
12
12
CSE543 - Introduction to Computer and Network Security Page
13
13
CSE543 - Introduction to Computer and Network Security Page
14
14
CSE543 - Introduction to Computer and Network Security Page
15
15
CSE543 - Introduction to Computer and Network Security Page
16
16
CSE543 - Introduction to Computer and Network Security Page
You gotta tell me. Hey, I tell what I do. I give you three guesses. It's the name of a fish.
understand English? You can't come in here unless you say, "Swordfish." Now I'll give you one more guess.
You guess it.
[Marx Brothers, Horse Feathers]
17
17
CSE543 - Introduction to Computer and Network Security Page
18
18
CSE543 - Introduction to Computer and Network Security Page
19
19
CSE543 - Introduction to Computer and Network Security Page
20
20
CSE543 - Introduction to Computer and Network Security Page
21
21
CSE543 - Introduction to Computer and Network Security Page
22
22
CSE543 - Introduction to Computer and Network Security Page
23
23
CSE543 - Introduction to Computer and Network Security Page
24
24
CSE543 - Introduction to Computer and Network Security Page
25
25
CSE543 - Introduction to Computer and Network Security Page
26
26
CSE543 - Introduction to Computer and Network Security Page
27
27
CSE543 - Introduction to Computer and Network Security Page
28
28
CSE543 - Introduction to Computer and Network Security Page
29
29
CSE543 - Introduction to Computer and Network Security Page
30
30
CSE543 - Introduction to Computer and Network Security Page
31
31
CSE543 - Introduction to Computer and Network Security Page
32
32
CSE543 - Introduction to Computer and Network Security Page
33
33
CSE543 - Introduction to Computer and Network Security Page
34
34
CSE543 - Introduction to Computer and Network Security Page
35
35
CSE543 - Introduction to Computer and Network Security Page
36
36
CSE543 - Introduction to Computer and Network Security Page
37
37
CSE543 - Introduction to Computer and Network Security Page
38
basic8survey basic8 blacklistEasy comprehensive8 basic16 blacklistMedium blacklistHard dictionary8 Percentage of passwords cracked Number of guesses (log scale) 70% 60% 50% 40% 30% 20% 10% 1E0 1E1 1E2 1E3 1E4 1E5 1E6 1E7 1E8 1E9 1E10 1E11 1E12 1E13
Figure 1. The number of passwords cracked vs. number of guesses, per condition, for experiment E. This experiment uses the Weir calculator and our most comprehensive training set, which combines our passwords with public data.
38
CSE543 - Introduction to Computer and Network Security Page
39
basic8 blacklistMedium basic16 comprehensive8 P3 P4 E
60% 50% 40% 30% 20% 10% 1E6 1E9 1E12 1E6 1E9 1E12 1E6 1E9 1E12 1E6 1E9 1E12
% of passwords cracked Number of guesses (log scale)
60% 50% 40% 30% 20% 10%
Figure 4. Showing how increasing training data by adding the Openwall list (P4) and then our collected passwords (E) affects cracking, for four example conditions. Adding training data proves more helpful for the group 1 conditions (top) than for the others (bottom). 39
CSE543 - Introduction to Computer and Network Security Page
40
40
CSE543 - Introduction to Computer and Network Security Page
41
41
CSE543 - Introduction to Computer and Network Security Page
42
42
CSE543 - Introduction to Computer and Network Security Page
43
43
CSE543 - Introduction to Computer and Network Security Page
44
44
CSE543 - Introduction to Computer and Network Security Page
45
Table 2: GPs using Derived Data Data Edits % 10−13 % 10−14 % 10−15 Weak 1 1.3 2.2 3.2 Weak 2 0.3 0.5 0.8 Strong 1 2.5 4.6 18.0 Strong 2 0.4 1.3 7.6
45
CSE543 - Introduction to Computer and Network Security Page
46
Table 6: Guided Brute Force Run Times Min GP Edits Full? Run Time, 12 cores 10−9 1 Y 1.2 hours 10−9 1 N 8 minutes 10−10 1 Y 12.7 hours 10−10 1 N 1.3 hours 10−11 1 Y 1 week (est) 10−11 1 N 16.2 hours 10−9 2 Y Guessed 5.4% in 24 hours 10−9 2 N 20.4 hours
46